Graphics Union

Uniting Creativity and Technology

Technology

Wi-Fi Fragility And Weak Passwords

It has been said that Wi-Fi passwords with little or no combination between letters, symbols, and numbers are not enough to prevent a system attack. That is why, in addition to passwords, there are other entries where cybercriminals manage to invade a router.

Because of that, some actions should be considered when configuring a new router, as well as during maintenance, of course, when updating passwords and when opening logins for visitors. Here are some suggestions:

  1. When using the SSID- Service set identifier, factory pattern, it is suggested to change the name. Failure to do so may increase the chances of breaking a password once the settings are also common and known.
  2. Another option is not having a network in sight. People look for open Wi-Fi signals to connect, and if the network is one of the names that appear on the list, they will be more susceptible to attacks. Therefore, especially in locations with a high concentration of devices, such as commercial buildings, skipping network identification is the optimal choice.
  3. In a company, another point to consider is that each user has their login and access password to the Wi-Fi signal, so that it is viable to track who is connected, and who is a guest to the network.
  4. Another vulnerability, which, although it is little known is possible, happens when users accidentally connect to neighboring Wi-Fi networks as soon as they arrive at the office. The problem is that the devices connected without cable are weaker, and make it easier for users of another network to access their data.
  5. Create a specific login for a visitor. It is an exciting activity, especially to delimit your navigation, keep the leading network reserved, and with more excellent protection. Therefore, this network of visitors needs to be correctly configured to avoid bridging the main network.
  6. Awareness of users is a fundamental point in maintaining the health of a network. Even if you are a friend who is visiting at work, it is crucial not to share your password. Ideally, look for another form of access. Click this link now.
  7. When configuring a router, it is necessary to use stronger protections, such as the WPA2 security protocol, replacing the old WEP and thus reduce the possibility of violating the password.
  8. Disabling the remote management resource of the wireless router is essential to prevent experienced hackers from invading the router.
  9. Everything mentioned above, will not work at all if there is the possibility of entering people outside the place where the routers without cable and other network components are located. At the press of a button, people who know systems can redefine the access points, reactivating the main factory settings, creating insecure access to the network. In addition to this action, it is advisable to continually change the administrator’s passwords and never maintain the factory settings.

After these suggestions, in summary, those responsible for network security should keep their signals hidden as best as possible, to avoid being recognized or found. The configurations must follow the current market regulations, as well as the equipment authorized to access the signal.

Sarah Davis: Sarah, a data scientist, shares insights on big data, machine learning, AI, and their applications in various industries.