4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

When you turn on your device’s Wi-Fi capabilities, do you ever take the time to look at some of the names of your neighbors’ connections? You’ll see some rather boring names as well; some might just use the name of their organization or the family’s name, or even just the default SSID used by the router. The fact of the matter is that a wireless network name that’s easy to gloss over is a best practice for network security.

The users who go out of their way to name their Wi-Fi networks something nonsensical have the right idea--making your SSID something that’s easy to miss is a great way to protect your network against possible infiltrators. Think about it this way; if a robber was trying to break into your home and he knew the address, it would make it much easier for him to do so. On the other hand, if he doesn’t know your address and only knows that it’s on a specific street, he’ll have to do some guesswork, which could make all the difference in preventing a robbery in the first place.

If there’s one website that showcases just how important an inconspicuous Wi-Fi network name is, it’s WiGLE. This service collected information from the countless wireless networks and places it in an online database that users can search through. WiGLE also offers the ability to map, query, and update the available databases. The information collected by WiGLE can be used for a myriad of purposes, such as research projects, journalism, site surveys, educating the public, analyzing wireless usage, and locating networks that you can connect to while you’re traveling.

Now that you know this tool exists, have you asked the important questions yet? If your information is being collected, is it at risk of being stolen and used against you? Should you be worried about someone being able to find your network through an online application? If you don’t want it to be available to the public, how can you remove your information from WiGLE? The service has answered all of these questions in its own FAQs section:

“If your network is in WiGLE and you don't like it, we'll take it out immediately, but you should look into making your network harder to detect AND more secure; remember that you're the one bombarding passers-by with your signal. We aren't affiliated directly with any particular community or interest (other than our own), but we applaud the efforts of the people who wrote the stumbling software that feeds our project, the people looking to use wireless in innovative ways, and especially the community of people who just dig wireless network access and dig sharing it.”

What do you think about WiGLE? If it has you concerned, perhaps it’s time to take a look at your organization’s network connections and see what can be done to reinforce them. To learn more, reach out to us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Innovation IT Support Hardware Workplace Tips Disaster Recovery Saving Money Miscellaneous VoIP Business Continuity Windows 10 Computer Virtualization Upgrade User Tips Data Mobile Devices Mobile Device Management Server Mobile Computing Email Communication Network Save Money Network Security Alert Quick Tips Information Technology Microsoft Office communications Social Media Smartphones BYOD Going Green Mobile Office Apps Small Business Office Smartphone Health Browser Gadgets Android Application Ransomware Outsourced IT Operating System Tablet Firewall Avoiding Downtime Disaster Managed IT Services Holiday Chrome The Internet of Things WiFi Remote Computing Mobility Unified Threat Management IT Solutions Spam Passwords BDR Productivity Search Managed IT Risk Management Hacking Best Practice Remote Monitoring History Data Management Facebook Hard Drives Saving Time Telephone Systems Employer-Employee Relationship Budget Vendor Management Automation VPN Wireless Technology Cybersecurity Customer Relationship Management Phishing Password Big Data Cybercrime Hosted Solution Apple Computers Recovery Phone System Marketing Office Tips Wearable Technology iPhone Current Events Antivirus Law Enforcement Maintenance PowerPoint Social Virus Printer USB Content Filtering Analytics Telephony Router Gmail Proactive IT Money Bring Your Own Device User Error Lithium-ion battery Collaboration Humor Administration OneNote HaaS Trending Education Work/Life Balance Shortcut Business Intelligence Net Neutrality Office 365 Users Tech Support Social Engineering Windows 8 Outlook Encryption Private Cloud Wireless App Unsupported Software Government Cost Management Google Drive Cloud Computing Intranet Point of Sale IT COnsultant Bandwidth Save Time Printer Server Laptop Computer Repair Flexibility Audit Data Backup Social Networking Samsung Display Update Customer Service Biometrics Retail Augmented Reality Virtual Reality Meetings Paperless Office hacker Personal Information Fax Server Transportation Instant Messaging Emails IT Support Workplace HIPAA Robot Computer Care Battery Streaming Media Entertainment Benefits Uninterrupted Power Supply DDoS Computer Accessories Automobile online currency End of Support Network Congestion Compliance Mouse Help Desk Internet Exlporer Two-factor Authentication Data Storage Managing Stress Internet of Things SaaS Excel Identity Theft Data Protection Efficency Solid State Drive Employer Employee Relationship User Sports Blogging Operating Sysytem Science Programming Worker Commute Virtual Desktop Presentation PDF Cast Windows 10s Bluetooth Best Available Scalability Files Travel Website Nanotechnology IT Technicians Safety Text Messaging Data Security Hard Disk Drive SharePoint How To Chromecast Hard Drive Root Cause Analysis Upgrades OneDrive Wi-Fi Emergency Amazon Artificial Intelligence HBO best practices Teamwork Training Co-managed IT Administrator Applications Busines Continuity Colocation Uograde Images CrashOverride Consultant Networking The Blindside Of Near Field Communication IT Management Access data breach Company Culture Black Market Politics Ebay Settings Touchscreen Human Resources IT Security IT consulting Computing WIndows Server 2008 risk management Running Cable Cleaning Experience Patch Management Keyboard Reliable Computing Avoid Downtime Wiring Windows 10 Bloatware Music Information Commerce Regulation Hiring/Firing Data storage Debate Vulnerability Books Twitter Data Recovery Sync Branding Smart Technology Video Games Surge Protector iOS Distributed Denial of Service Document Management Data Breach Advertising Television Managed IT Service Managed IT Services WIndows 7 3D Printing Legal Inbound Marketing Touchpad Computer Fan eWaste Mobile Device Managed Security Regulations Nokia Scam Value Dark Web ISP Cameras Screen Mirroring IT solutions Domains Supercomputer Electronic Medical Records IT Budget Reputation Buisness Microblogging Youtube Sales Lifestyle Managed Service Provder Webinar Shadow IT Relocation Tutorial Adobe Storage Webinar IT service Gift Giving Taxes