4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

When you turn on your device’s Wi-Fi capabilities, do you ever take the time to look at some of the names of your neighbors’ connections? You’ll see some rather boring names as well; some might just use the name of their organization or the family’s name, or even just the default SSID used by the router. The fact of the matter is that a wireless network name that’s easy to gloss over is a best practice for network security.

The users who go out of their way to name their Wi-Fi networks something nonsensical have the right idea--making your SSID something that’s easy to miss is a great way to protect your network against possible infiltrators. Think about it this way; if a robber was trying to break into your home and he knew the address, it would make it much easier for him to do so. On the other hand, if he doesn’t know your address and only knows that it’s on a specific street, he’ll have to do some guesswork, which could make all the difference in preventing a robbery in the first place.

If there’s one website that showcases just how important an inconspicuous Wi-Fi network name is, it’s WiGLE. This service collected information from the countless wireless networks and places it in an online database that users can search through. WiGLE also offers the ability to map, query, and update the available databases. The information collected by WiGLE can be used for a myriad of purposes, such as research projects, journalism, site surveys, educating the public, analyzing wireless usage, and locating networks that you can connect to while you’re traveling.

Now that you know this tool exists, have you asked the important questions yet? If your information is being collected, is it at risk of being stolen and used against you? Should you be worried about someone being able to find your network through an online application? If you don’t want it to be available to the public, how can you remove your information from WiGLE? The service has answered all of these questions in its own FAQs section:

“If your network is in WiGLE and you don't like it, we'll take it out immediately, but you should look into making your network harder to detect AND more secure; remember that you're the one bombarding passers-by with your signal. We aren't affiliated directly with any particular community or interest (other than our own), but we applaud the efforts of the people who wrote the stumbling software that feeds our project, the people looking to use wireless in innovative ways, and especially the community of people who just dig wireless network access and dig sharing it.”

What do you think about WiGLE? If it has you concerned, perhaps it’s time to take a look at your organization’s network connections and see what can be done to reinforce them. To learn more, reach out to us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 11 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware VoIP Workplace Tips User Tips Saving Money Computer Virtualization Upgrade Windows 10 Miscellaneous Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Email Alert Save Money Communication Microsoft Office Network Quick Tips Smartphone Small Business communications BYOD Information Technology Going Green Mobile Office Social Media Smartphones Health Office Apps Android Application Ransomware Operating System Chrome Browser Gadgets Managed IT Services Outsourced IT Holiday Disaster Firewall Avoiding Downtime Mobility Tablet WiFi Productivity Managed IT Cybersecurity Telephone Systems The Internet of Things Risk Management Remote Computing Unified Threat Management IT Solutions Spam Best Practice BDR Data Management Cybercrime Passwords Search Vendor Management Employer-Employee Relationship VPN Budget Automation Facebook Remote Monitoring History Hard Drives Hacking Saving Time Apple Collaboration Computers Data Backup Marketing Law Enforcement Wireless Technology Phone System Recovery Big Data iPhone Customer Relationship Management Office Tips Content Filtering Money Data Recovery Proactive IT Phishing Password User Error Hosted Solution Bring Your Own Device Telephony Work/Life Balance Current Events Office 365 Humor Administration Printer Wearable Technology Maintenance USB PowerPoint Encryption Virus Analytics Antivirus Vulnerability Gmail Router Shortcut Social Government Lithium-ion battery Printer Server Laptop OneNote Data Security Private Cloud Point of Sale IT COnsultant Trending Education Net Neutrality Computer Repair Politics Personal Information Tech Support SaaS Audit HaaS Outlook Wireless Unsupported Software Users Business Intelligence Cloud Computing Google Drive Windows 8 App Save Time Cost Management Intranet Social Engineering Data Protection Bandwidth Flexibility Sports Emails Network Congestion Instant Messaging Efficency HIPAA Entertainment Help Desk Samsung Benefits DDoS Wi-Fi Computer Accessories Artificial Intelligence Emergency Applications Mouse Compliance Display hacker Augmented Reality Two-factor Authentication Managing Stress Transportation IT Support Excel Paperless Office Computer Care Social Networking Battery Robot Windows 10 Fax Server Automobile Workplace End of Support Travel Streaming Media Uninterrupted Power Supply Update Customer Service online currency Biometrics Internet Exlporer Retail Data Storage Virtual Reality Internet of Things Meetings Identity Theft Solid State Drive Employer Employee Relationship Human Resources IT consulting Debate Running Cable Worker Commute File Sharing Operating Sysytem PDF Cast ISP Scalability Reliable Computing Files Windows 10s systems Nanotechnology Text Messaging Blogging Safety Programming Bloatware How To Tablets Chromecast Hard Disk Drive Upgrades hack Root Cause Analysis Website HBO Nokia Training Branding NFL Administrator best practices Consultant Distributed Denial of Service Cortana Colocation CrashOverride IT Management The Blindside Of OneDrive Company Culture Black Market Amazon WIndows 7 Word Access data breach Touchscreen eWaste Storage Legislation Co-managed IT Inbound Marketing Settings Regulations WIndows Server 2008 IT Security Cleaning Windows Ink risk management Lifestyle Experience Value Avoid Downtime Ebay Cameras Patch Management Keyboard Computing User Google Maps Commerce Music Hard Drive Science Presentation Regulation Hiring/Firing Virtual Desktop Bluetooth Best Available Software as a Service Data storage Uograde IT Technicians Books Images Video Games Sync Smart Technology SharePoint Document Management Data Loss iOS Managed IT Service Data Breach Advertising Legal Adobe Twitter Managed IT Services Mobile Device Teamwork Google Docs Touchpad Computer Fan Busines Continuity Surge Protector Managed Security Networking Near Field Communication Licensing Television Scam Wiring 3D Printing Microsoft Excel Dark Web Screen Mirroring Information Mobile IT solutions Supercomputer Gift Giving Electronic Medical Records FAQ Professional Services IT Budget Reputation IT service Shadow IT Comparison Relocation Domains Specifications Microblogging Youtube Conferencing Tutorial Sales Gifts Buisness Managed Service Provder Webinar Redundancy Webinar Taxes Credit Cards