Description
Your Wi-Fi network connection is secured with a weak password -- the default password, a password that can easily be guessed, or no password at all. This means that someone can break in and "eavesdrop" on your wireless networks. People around you, including the government, may be able to see to what’s in your internet traffic. This includes personal data such as login credentials, credit card details, and personal photos or videos. Furthermore, an attacker can use your network to conduct additional attacks and criminal activity. You are liable if such attacks are traced back to your network.
Solution
To solve this problem, you must create a stronger password for your wireless network and all devices connected to it. To make your password as strong as possible, be sure to include both upper-case and lower-case letters, numbers, and special characters. We also strongly advise you to use the "WPA2" encryption.
Select your router manufacturer below to view further instructions on how to configure your network:
Tips
- Rename your network. Some routers come with default network names (or SSID) like NETGEAR, Linksys, etc. We recommend to use a different name because a default name unnecessarily identifies the make of your router, making it easier for attackers to break in.
- Do not configure your wireless router to hide the SSID. By making your Wi-Fi network invisible, you are configuring your other devices (such as your PC, tablet, phone, etc.) to broadcast the network name themselves, which may be even more dangerous.
- Regularly check who is connected to your network. The router admin interface usually has a section called "Device List", which shows the names of all devices that are connected to the wireless network. Routine checks may reveal unwelcome visitors.
- Don't bother with MAC address access filters. They may seem like a good way to safeguard the network, but in fact they are very easy to bypass. They are just not worth the trouble.
- Advanced users can change the subnet from 192.168.0.x / 192.168.1.x to something like 10.x.x.x. This is an easy way to increase security, because many attacks today are performed by web snippets trying to access the 192.168.0.x / 192.168.1.x addresses (the most common).