Wireless network security
Wireless internet access can offer convenience and mobility. There are steps that can be taken to protect a wireless network and the electronic devices on it. The steps discussed below are recommended by the Federal Trade Commission (FTC). The tips are designed to help businesses be on guard against internet fraud, secure their computers and protect confidential information.
Use encryption
Encryption scrambles the information a worker sends over the internet into a code that is not accessible to others. Using encryption is the most effective way to secure a company network from intruders.
- Two main types of encryption are available: Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). The company computer, router and other equipment must use the same encryption. WPA2 is strongest; use it if you have a choice. It should protect you against most hackers. Some older routers use only WEP encryption, which may not protect your company from some current common hacking programs. Consider buying a new router with WPA2 capability.
- Wireless routers often come with the encryption feature turned off. This must be turned on. The directions that come with the router should explain how. If they do not, check the manufacturer's website.
Secure computer and router
- Most wireless routers have a mechanism, called identifier broadcasting. Turn it off so your computer won't send a signal to any device in the vicinity announcing its presence.
- Change the identifier on your router from the default so a hacker can't use the manufacturer's default identifier to try to access your network.
- If the firewall was shipped in the "off" mode, turn it on.
- Change the pre-set password of the router for administration to something more secure and only known to those who have a need to know. The longer the password, the tougher it is to crack.
- Allow only specific computers on your wireless network. Set the router to allow only devices with particular media access control (MAC) addresses to access the network.
- Use anti-virus and anti-spyware software and keep them updated.
Limit access to network
- Allow only specific computers to access your wireless network. Every computer that is able to communicate with a network is assigned a unique media access control (MAC) address. Wireless routers usually have a mechanism to allow only devices with particular MAC addresses to access the network. Some hackers have mimicked MAC addresses, so do not rely on this step alone.
- Turn off your wireless network when you know you will not use it. Hackers cannot access a wireless router when it is shut down. If you turn the router off when you are not using it, you limit the amount of time that it is susceptible to an intrusion.
Use precautions when accessing public Wi-Fi networks
- Be cautious about the information you access or send from a public wireless network. Many cafés, hotels, airports and other public places offer wireless networks for their customers to use. These "hot spots" are convenient, but they may not be secure.
- When using a hotspot, log in or send personal information only to websites you know are fully encrypted. To be secure, your entire visit to each site should be encrypted—from the time you log in to the site until you log out. If you think you are logged in to an encrypted site but find yourself on an unencrypted page, log out right away.
- Do not stay permanently signed in to accounts. When you have finished using an account, log out.
- Do not use the same password on different websites. It could give someone who gains access to one of your accounts access to many of your accounts.
- Many web browsers alert users who try to visit fraudulent websites or download malicious programs. Pay attention to these warnings, and keep your browser and security software up to date.
- Consider changing the settings on your mobile device so that it does not automatically connect to nearby Wi-Fi. That way, you have more control over when and how your device uses public Wi-Fi.
- If Wi-Fi hotspots are regularly accessed, use a virtual private network (VPN) on the company's computers/servers. VPNs encrypt traffic between your computer and the internet, even on unsecured networks. You can get a personal VPN account from a VPN service provider. In addition, some organizations create VPNs to provide secure, remote access for their employees. VPN options are available for mobile devices, and they can encrypt information you send through mobile apps.
- Installing browser add-ons or plug-ins can help. For example, there are add-ons that force a browser to use encryption on popular websites that usually are not encrypted. They do not protect you on all websites—look for https in the URL to know a site is more secure.
Protect network during mobile access
- Use a strong password on any app that accesses your network. Log out of the app when you are not using it. That way, no one else can access the app if your phone is lost or stolen.
- Password protect your phone or other mobile device. Even if your app has a strong password, it is best to protect your device with one, too.
To learn more about Hanover Risk Solutions, visit hanoverrisksolutions.com
Copyright ©2018, ISO Services Properties, Inc.
The recommendation(s), advice and contents of this material are provided for informational purposes only and do not purport to address every possible legal obligation, hazard, code violation, loss potential or exception to good practice. The Hanover Insurance Company and its affiliates and subsidiaries ("The Hanover") specifically disclaim any warranty or representation that acceptance of any recommendations or advice contained herein will make any premises, property or operation safe or in compliance with any law or regulation. Under no circumstances should this material or your acceptance of any recommendations or advice contained herein be construed as establishing the existence or availability of any insurance coverage with The Hanover. By providing this information to you, The Hanover does not assume (and specifically disclaims) any duty, undertaking or responsibility to you. The decision to accept or implement any recommendation(s) or advice contained in this material must be made by you.
LC OCT 2018 10-179H
171-0939 (11/18)