4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

When you turn on your device’s Wi-Fi capabilities, do you ever take the time to look at some of the names of your neighbors’ connections? You’ll see some rather boring names as well; some might just use the name of their organization or the family’s name, or even just the default SSID used by the router. The fact of the matter is that a wireless network name that’s easy to gloss over is a best practice for network security.

The users who go out of their way to name their Wi-Fi networks something nonsensical have the right idea--making your SSID something that’s easy to miss is a great way to protect your network against possible infiltrators. Think about it this way; if a robber was trying to break into your home and he knew the address, it would make it much easier for him to do so. On the other hand, if he doesn’t know your address and only knows that it’s on a specific street, he’ll have to do some guesswork, which could make all the difference in preventing a robbery in the first place.

If there’s one website that showcases just how important an inconspicuous Wi-Fi network name is, it’s WiGLE. This service collected information from the countless wireless networks and places it in an online database that users can search through. WiGLE also offers the ability to map, query, and update the available databases. The information collected by WiGLE can be used for a myriad of purposes, such as research projects, journalism, site surveys, educating the public, analyzing wireless usage, and locating networks that you can connect to while you’re traveling.

Now that you know this tool exists, have you asked the important questions yet? If your information is being collected, is it at risk of being stolen and used against you? Should you be worried about someone being able to find your network through an online application? If you don’t want it to be available to the public, how can you remove your information from WiGLE? The service has answered all of these questions in its own FAQs section:

“If your network is in WiGLE and you don't like it, we'll take it out immediately, but you should look into making your network harder to detect AND more secure; remember that you're the one bombarding passers-by with your signal. We aren't affiliated directly with any particular community or interest (other than our own), but we applaud the efforts of the people who wrote the stumbling software that feeds our project, the people looking to use wireless in innovative ways, and especially the community of people who just dig wireless network access and dig sharing it.”

What do you think about WiGLE? If it has you concerned, perhaps it’s time to take a look at your organization’s network connections and see what can be done to reinforce them. To learn more, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 20 October 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Innovation Disaster Recovery IT Support Hardware Workplace Tips Business Continuity Saving Money VoIP Computer Upgrade Miscellaneous Virtualization User Tips Windows 10 Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Email Communication Network Save Money Microsoft Office Alert communications Quick Tips Mobile Office Smartphone Information Technology Social Media Smartphones BYOD Going Green Health Apps Small Business Android Office Operating System Chrome Browser Gadgets Outsourced IT Application Ransomware Tablet Firewall Productivity Avoiding Downtime Managed IT Services Disaster Risk Management Holiday The Internet of Things WiFi Remote Computing Managed IT Data Management Unified Threat Management IT Solutions Cybersecurity Spam Cybercrime Passwords BDR Telephone Systems Mobility Search Automation VPN History Hacking Remote Monitoring Best Practice Facebook Apple Hard Drives Saving Time Employer-Employee Relationship Vendor Management Budget Collaboration Wireless Technology Office Tips iPhone Customer Relationship Management Big Data Phishing Password Law Enforcement Hosted Solution Proactive IT Computers Marketing User Error Recovery Phone System Humor Money Administration Wearable Technology Current Events Maintenance PowerPoint Antivirus Virus Shortcut Printer Social USB Content Filtering Data Recovery Encryption Analytics Gmail Router Telephony Bring Your Own Device Office 365 Lithium-ion battery Data Backup Printer Server Laptop Computer Repair Data Security Wireless OneNote Unsupported Software Google Drive Trending Audit Cloud Computing Education HaaS Net Neutrality Save Time Business Intelligence Users Tech Support Windows 8 Outlook Social Engineering Work/Life Balance Government App Private Cloud Cost Management Intranet Point of Sale IT COnsultant Bandwidth Mouse Compliance Robot Computer Care Battery Efficency Two-factor Authentication Managing Stress Automobile SaaS End of Support Excel Internet Exlporer Social Networking Display Travel Internet of Things IT Support Augmented Reality Identity Theft Data Protection Update Solid State Drive Customer Service Flexibility Windows 10 Paperless Office Biometrics Retail Virtual Reality Vulnerability Fax Server Meetings Workplace Samsung Wi-Fi Streaming Media Emergency Instant Messaging Emails Uninterrupted Power Supply Applications Data Storage online currency Network Congestion HIPAA Entertainment Benefits Politics DDoS hacker Computer Accessories Help Desk Personal Information Transportation Experience Distributed Denial of Service Cast Nokia Keyboard Avoid Downtime Windows 10s Nanotechnology WIndows 7 ISP Music eWaste Inbound Marketing Hiring/Firing Tablets Hard Disk Drive Regulations Root Cause Analysis Data storage Blogging Programming Books HBO Value Smart Technology NFL Video Games best practices Cameras CrashOverride Website User Document Management Data Breach IT Management Advertising Science Word Legal Virtual Desktop data breach Presentation Settings Touchpad Best Available Hard Drive Mobile Device OneDrive Bluetooth Managed Security IT Technicians WIndows Server 2008 Amazon Scam Windows Ink risk management Co-managed IT Uograde Images SharePoint Patch Management Employer Employee Relationship Google Maps Sports Teamwork Commerce Operating Sysytem Ebay Worker Commute Regulation PDF Computing Busines Continuity Near Field Communication Scalability Networking Files Safety Sync Text Messaging IT consulting Wiring Data Loss How To Human Resources iOS Chromecast Running Cable Managed IT Service Information Upgrades Adobe Artificial Intelligence Managed IT Services Reliable Computing Debate Training Computer Fan Administrator Colocation Twitter Consultant The Blindside Of Licensing Bloatware Access Surge Protector Company Culture Black Market Dark Web Screen Mirroring Television Touchscreen IT Security 3D Printing Cleaning Branding Relocation Professional Services Gift Giving Storage IT service Domains Youtube Microblogging Taxes Sales Lifestyle Buisness Supercomputer Managed Service Provder Electronic Medical Records Webinar Software as a Service IT Budget Reputation Tutorial Google Docs Webinar Microsoft Excel Mobile IT solutions File Sharing Shadow IT