How to secure your Wi-Fi devices and personal data

Here are a few key things that Wi-Fi users can do to secure their Wi-Fi devices and personal data:

  • Set home Wi-Fi networks for WPA2™ security – Wi-Fi Protected Access® 2 (WPA2) is the latest in network security technology. It controls who connects to the network and encrypts data for privacy. It is important to note that the security level of a home network is determined by the least capable device and many devices ship with security options disabled as the default. For the most up-to-date protection, a network should include only products capable of WPA2 security.
  • Look for Wi-Fi CERTIFIED™ products – Wi-Fi CERTIFIED devices are required to implement WPA2 security.
  • Look for devices with Wi-Fi Protected Setup™ – With an action as simple as the push of a button, new devices can be added to an existing network securely.
  • Create strong passwords – Ensure that your network password is at least 8 characters long, does not include any dictionary words or personal information, and is a mix of upper and lower case letters and symbols. A tip that might make password management easier is to create an acronym from easy-to-remember phrases. For example, “my daughter’s birthday is July 7, 1987” could become the password “MDBi7787.”
  • Be smart about hotspot use – Most public hotspots leave security protections turned off, so while connecting to a public Wi-Fi hotspot is great for general internet surfing, users should not transmit sensitive data, such bank account login information.
  • Turn off automatic connecting – Many products such as mobile phones and notebooks are set by default to sense and automatically connect to any available wireless signal. Users should turn off automatic connecting and only connect to and from networks and devices they are familiar with.

The foregoing were published by the Wi-Fi Alliance in a new release to educate users about securing their wireless networks and devices. You may read the complete news release here.

Related Posts

Opera 26 released. Install it on Linux Mint 17.1 and Ubuntu 14.10 I don't quite remember the last time I used Opera browser, but it's been a very long time ago. I didn't even think that the company is still developin...
Got a PRISM and Boundless Informant problem? Whisper and Tor can help PRISM and Boundless Informant. Don't you just love names like that. They have a nice ring to them. But do not be fooled. Those are bad for your privac...
How to upgrade Ubuntu 14.10 kernel to version 3.17.1 Upgrading a distribution's kernel is something I tend to shy away from. There was a time, though, when recompiling the Linux kernel was fun. But that ...
With Btrfs the default on openSUSE, when will other distros follow suit One change that was implemented in openSUSE 13.2 makes Btrfs the default file system for the root (main) partition. That makes openSUSE the first desk...
How to install Takeoff Launcher on Fedora 16 KDE Takeoff Launcher is one of my favorite menu styles and I consider it one of 2 cool reasons to use the K Desktop Environment. Though it is not in Fedor...
Ubuntu 12.10 installation and disk partitioning guide Alternate titles: How to create partitions in Ubuntu 12.10 manually; Manual disk partitioning guide for Ubuntu 12.10. Ubiquity, the graphical insta...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Links 4/2/2011: GNOME 3.0 Laptop Debate, Unified Packaging Arguments | Techrights

Leave a Comment

Your email address will not be published. Required fields are marked *

*