Tips: Safely Using Wireless Networks

CPP offers nine tips for safely using wireless networks.

  1. Use encryption on your wireless access points (WAP) -- Make sure you have Wi-Fi Protected Access 2 (WPA2) -- the latest security standard introduced by global, non-profit industry association, the Wi-Fi Alliance.
  2. By implementing a Virtual Private Network (VPN) you can create a secure wireless network.  This is achieved by encrypting all of the data that passes over the 'insecure' network so that it cannot be accessed by an eavesdropper.
  3. Install a firewall on any network you use (an electronic barrier that sits on a network server and protects the PCs hidden behind).
  4. All wireless routers should have obscure IDs. Rather than put in any real information that can make it clear who owns the connection or that can reveal your location or business name, use something common like "wireless" or "router 1" that doesn't give away anything critical.
  5. Try to position access points, which transfer data between your devices, away from the outside wall of your building to minimize leakage of radio signals. This limits the chances of interception from outside.
  6. If you run a business, don't allow employees to add access points without your authorization.
  7. Be aware of what information you are accessing online, specifically when using public hotspots. Remember that any information you submit, including usernames and passwords, can be read by others.
  8. Make sure you check your bank statements regularly to monitor for suspicious transactions.
  9. Remember the Golden Rule: Identity thieves are experts at spotting an opportunity to steal your identity and only need a few personal details.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3