Archives - WiFi


Avoid unknown access points

Wi-Fi access points should have built-in wireless intrusion protection to ensure unknown access points aren’t being targeted. By requiring intrusion protection at all access points, you make it easier to spot an interfering AP or shut down rogue devices that might pose a threat. The network will alert your IT administrator (you) if necessary.

Lockdown your router

When you connect a computer to the internet, it’s also connected to millions of other computers—a connection that could allow attackers access to your computer. Although cable modems, digital subscriber lines (DSLs), and internet service providers (ISPs) have some level of security monitoring, it’s crucial to secure your router—the first securable device that receives information […]

Adjust your Android settings to reduce the possibility of overheating

Cellphone overheating is a real risk that can dramatically impact the functionality of your device. To avoid this issue, turn off your Wi-Fi and Bluetooth connections if you’re not actively using them. Then, turn down your brightness, and exit any minimized programs running in the background. For help with this last part, you may have […]

Use guest mode for Chromecast Audio

Keeping a close guard on the password for your Wi-Fi network is a security best practice. However, if you’re having an outdoor gathering and you want to be a gracious host, you can still let your guests connect to Chromecast-enabled audio devices so they can select the music. While you’re logged into the same Wi-Fi […]

Be careful when shopping online

Anytime you enter payment information on a website, you should be extra careful, since that data could potentially be tracked and harvested by hackers. Before purchasing anything, make sure you’re on a safe network, as in a network that you own, not a public Wi-Fi server. As a rule of thumb, don’t buy anything online […]

Always use WPA2 encryption for your wireless networks

It’s never a good idea to leave your Wi-Fi network open, since it can then be accessed by anyone in range. Make sure a password is required and that the network is encrypted by WPA2 – not by either the original WPA or WEP, both of which are outdated and have known exploits.