NWA-PCUG Newsletter Article, September 2008
Make Your Wireless Network Safe
By Marjie Tucker, Editor,
Mountain Computer User Group
http://www.mcug.org
mcug(at)dnet.net (click to email author)


Obtained from APCUG with the author's permission for publication by APCUG member groups.

Wireless networks are becoming more and more popular, but they do add some additional security risks. You need to spend a little extra time to ensure that your data and your identity are secure.

What are the Risks?
Because wireless networks don't require a cable between the computer and your Internet connection, it's relatively easy for someone else to use your Internet connection for free, to hijack your messages, or to sneak into your computer and view or steal your data.

So What Should I Do?
There are several important steps that you should follow to protect yourself and your computer:

1. Don't use a default password on your wireless equipment. Most networking devices are pre-configured by the manufacturer with a simple password to simplify the setup process. This is the password that allows you to access the router configuration. These "default" passwords are well known by anyone who has used a similar device and they are available online, eroding any protection they might have provided. Check the instructions that came with your device and immediately change the password.

Remember that the best passwords contain both upper and lowercase letters as well as numbers. And, always shy away from passwords that can be easily guessed by your friends - such as the names of your children or your dog.

Experts suggest using a poem to derive a "pass phrase." You merely take a line from a poem or poem title and use the first letter of each word. For example, using the poem "Mary had a little lamb" you would use the letters from the first line - Mary had a little lamb; its fleece was white as snow - mhallifwwas. Add at least one uppercase letter by capitalizing the M for Mary - Mhallifwwas. Next add at least one number by changing some of the letters to numbers, such as making the first letters for little and lamb into 1s. Now we have a phrase (Mha11ifwwas) that is reasonably secure and very easy to remember.

2. Restrict your network to only your computers. Every computer device has an embedded address on it called a media access control (MAC) address. Wireless access points and routers can be configured to exclude all other MAC addresses.

3. Encrypt the data on your network. Encryption prevents outsiders from viewing your transmissions. There are two methods of ensuring that your information is adequately protected, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Because WEP has several security issues associated with it, WPA is considered the more effective method, if it is supported by your equipment. However, since this is another area where a secure password is important, you should use a passphrase like I described in item #1.

4. Choose a unique SSID. You equipment may have a default same that identifies your network, called an SSID. Be sure to setup a unique name and, if possible, avoid broadcasting that name. That will make it harder for outsiders to find your network.

5. Install a firewall for your network. Microsoft Vista and XP both provide a firewall that is designed to protect your computer, but your network itself will be safer with its own firewall. A host based firewall is easy to obtain (some of them are free over the Internet) and can be installed directly onto your wireless device.

6. Install and regularly update both anti-virus and anti-spyware software. You can keep attackers at bay with these protective programs. However, remember to update both of them on a regular basis. New viruses and spyware attacks are being developed daily; so your software must be updated to be effective.

This article has been provided to APCUG by the author solely for publication by APCUG member groups. All other uses require the permission of the author (see e-mail address above).

Click here to return to top



==================================================================