Hackers stealing government and consumers information has become almost a routine headline. Now maybe you don’t have huge valuable industrial secrets on your home server, but you do have valuable personal stuff such as family photos and videos that would be a devasting loss should you be hacked. Not to mention banking and credit card info, online shopping accounts and so on that would prove costly if your machine or phone were hacked.

This who wish you harm have increasingly sophisticated ways to spread malware or ransomware or even steal data from you.

So now we know this, what should we do?

How You Can Protect Your Wireless Network

To completely protect our wireless local area network, we need to implement both encryption and authentication security procedures:

Encryption scrambles your data so that it is difficult for someone to read unless they have the proper code known as a “key”.

A hacker can detect the signals on your network, but your data will look like random garbage to them. So they will not be able to see your passwords, credit card number, social security number, or any other personal information.

Authentication is a procedure that ensures a user is who he says he is, based on pre-defined credentials. Such credentials might include passwords and digital certificates.

6 Ways to Secure Your Router

1. Keep your router’s firmware up to date.
It’s a good idea for you to regularly check the manufacturer’s support website manually for firmware updates for your router models. Some routers do automatic checkups and updates.

2. Turn on HTTPS access to the router interface, if available, and always log out when done.
Use the browser incognito or in private mode when working with the router so that no session cookies are left behind and never allow the browser to save the router’s username and password.

3. Change the router’s LAN IP address if possible.
Most of the time, routers will be assigned the first address in a predefined netblock. If offered the option, change this to 192.168.0.99 or something else that’s easy to remember and is not part of the DHCP pool. The entire netblock used by the router can also be changed to one of those reserved for private networks. Doing this will protect against cross-site request forgery (CSRF) attacks that try to access routers through users’ browsers by using the default IP addresses commonly assigned to such devices.

4. Even inside the LAN, it’s good to restrict which IP (Internet Protocol)
If this option is available, it’s best to allow access from a single IP address that is not part of the pool of IP addresses assigned to computers via DHCP (Dynamic Host Configuration Protocol). For example, configure the router’s DHCP server to assign IP addresses from 192.168.0.1 to 192.168.0.50 and then configure the web interface to only allow access from 192.168.0.53. The computer should be manually configured to use this address only when you need to connect to the router.

5. Change the default admin password
Many routers come with default administrator passwords and attackers constantly try to break into devices using these publicly known credentials. After you connect to the router’s management interface for the first time through your browser the address should be the router’s default IP address found on its bottom sticker or found in the set-up guide make sure the first thing you do is change the password.

6. Avoid using routers supplied by ISPs
These routers are typically less secure than those sold by manufacturers to consumers.

We understand that some of this will scarily technical to the average use, this is routine for us here at TechWorX, all our installations have these protections implemented by default. If you want us to secure your system at home or in your workplace give us a call now. It costs nothing to talk.