Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.
But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer.
They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.
Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP.
It is recommended that wireless router/access point setup be always done though a wired client.
Change default administrative password on wireless router/access point to a secured password.
Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it.
Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.
Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.
Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.
Block anonymous Internet requests or pings.
On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point.
Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
You can test your hardware and personal firewalls using Shields Up test available at http://www.grc.com
All computers should have a properly configured personal firewall in addition to a hardware firewall.
Update router/access point firmware when new versions become available.
Locate router/access point away from strangers so they cannot reset the router/access point to default settings.
Locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.
While none of the measure suggested above provides full protection as counter measures exist, a collection of suggested measures will act as a deterrent against attacker when other insecure networks represent easier targets.
The author of this article ia a software developer, consultant and author of numerous books. Visit his site for more information about the Top Spyware Removal Software.
![]() |
|
![]() |
|
![]() |
|
![]() |
File sharing on p2p is soaring despite the music and... Read More
Today the internet is a mine field of malicious code... Read More
Identity Theft is one of the most serious problems facing... Read More
Sooner or later everyone with an email account will receive... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
To blog or not to blog? Well, why not? Lots... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
If spyware were a person and he set himself up... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Some months ago, before there was much publicity regarding phishing... Read More
So you want to know who your kids are chatting... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Viruses are, however, not the only malicious software programs out... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
In 1997, I decided after 15 years as a practicing... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
If you are a parent, you have probably wondered at... Read More
A few nights ago I received an email from "2CO"... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Threats we ordinary Web users face online leave us no... Read More
Despite the current wave of identity theft and corporate security... Read More
Long gone are the days that we could feel secure... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Working from home has its advantages, including no commute, a... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Imagine my surprise when I received a phone call from... Read More
I am the victim of an internet scam. It is... Read More
There is nothing more important that password security in world... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Fishing on the Internet has come a long way. However,... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
If you are a parent, you have probably wondered at... Read More
No longer are viruses the only threat on the internet.... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Let us take the example of scrambling an egg. First,... Read More
Long gone are the days that we could feel secure... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Viruses are, however, not the only malicious software programs out... Read More
There you are busily typing away on your PC or... Read More
Today the internet is a mine field of malicious code... Read More
Recently I have received email from my bank/credit Card Company,... Read More
You and I are a lot alike. We are both... Read More
The Message Must Get Through The year is 300A.D.,... Read More
We all get the odd virus now and then, but... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
When it comes to reporting Internet scams most of us... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
At this point, if you've got the whole "turning the... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Spyware is software or hardware installed on a computer without... Read More
Did you know...? 1 in 5 children who use computer... Read More
Have been an Internet user for more than 9 years,... Read More
A new variation of the Nigerian Scam theme ... Read More
Every single time you access a website, you leave tracks.... Read More
Internet Security |