4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

When you turn on your device’s Wi-Fi capabilities, do you ever take the time to look at some of the names of your neighbors’ connections? You’ll see some rather boring names as well; some might just use the name of their organization or the family’s name, or even just the default SSID used by the router. The fact of the matter is that a wireless network name that’s easy to gloss over is a best practice for network security.

The users who go out of their way to name their Wi-Fi networks something nonsensical have the right idea--making your SSID something that’s easy to miss is a great way to protect your network against possible infiltrators. Think about it this way; if a robber was trying to break into your home and he knew the address, it would make it much easier for him to do so. On the other hand, if he doesn’t know your address and only knows that it’s on a specific street, he’ll have to do some guesswork, which could make all the difference in preventing a robbery in the first place.

If there’s one website that showcases just how important an inconspicuous Wi-Fi network name is, it’s WiGLE. This service collected information from the countless wireless networks and places it in an online database that users can search through. WiGLE also offers the ability to map, query, and update the available databases. The information collected by WiGLE can be used for a myriad of purposes, such as research projects, journalism, site surveys, educating the public, analyzing wireless usage, and locating networks that you can connect to while you’re traveling.

Now that you know this tool exists, have you asked the important questions yet? If your information is being collected, is it at risk of being stolen and used against you? Should you be worried about someone being able to find your network through an online application? If you don’t want it to be available to the public, how can you remove your information from WiGLE? The service has answered all of these questions in its own FAQs section:

“If your network is in WiGLE and you don't like it, we'll take it out immediately, but you should look into making your network harder to detect AND more secure; remember that you're the one bombarding passers-by with your signal. We aren't affiliated directly with any particular community or interest (other than our own), but we applaud the efforts of the people who wrote the stumbling software that feeds our project, the people looking to use wireless in innovative ways, and especially the community of people who just dig wireless network access and dig sharing it.”

What do you think about WiGLE? If it has you concerned, perhaps it’s time to take a look at your organization’s network connections and see what can be done to reinforce them. To learn more, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 24 May 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Productivity Hackers Backup Business Management Hosted Solutions Managed Service Provider Business Malware IT Services Google Innovation Efficiency Windows IT Support Workplace Tips Hardware Saving Money Computer Miscellaneous Windows 10 Disaster Recovery VoIP Upgrade Business Continuity Virtualization Mobile Devices Data User Tips Server Mobile Computing Mobile Device Management Save Money Communication Network Security Quick Tips Network Alert Information Technology Going Green Mobile Office Email Social Media Office Smartphones Smartphone Health BYOD Microsoft Office Apps Small Business communications Operating System Gadgets Application Ransomware Disaster Firewall Tablet Browser Managed IT Services Search Passwords Mobility Holiday Avoiding Downtime Remote Computing Unified Threat Management Android WiFi Saving Time Telephone Systems BDR Employer-Employee Relationship Automation Vendor Management Hacking Chrome The Internet of Things Best Practice Risk Management Data Management IT Solutions History Remote Monitoring Hard Drives Outsourced IT Spam Budget Apple Recovery Marketing Office Tips VPN Wireless Technology Facebook Big Data Customer Relationship Management Productivity Cybercrime Managed IT Analytics Computers Telephony Gmail Router Law Enforcement Phone System User Error Lithium-ion battery Collaboration Bring Your Own Device Current Events Money Antivirus Humor Administration Social Wearable Technology Printer iPhone Password Maintenance USB Content Filtering PowerPoint Encryption Virus Users Proactive IT Private Cloud Government Cybersecurity Windows 8 Work/Life Balance Cost Management Intranet Bandwidth Printer Server Laptop Point of Sale HaaS IT COnsultant Trending Education Net Neutrality Computer Repair Wireless Tech Support Phishing Save Time Social Engineering Hosted Solution Identity Theft Workplace Solid State Drive Emails Instant Messaging Flexibility Streaming Media HIPAA Entertainment Uninterrupted Power Supply App Benefits online currency DDoS Computer Accessories Samsung Mouse Office 365 Two-factor Authentication Network Congestion Efficency Managing Stress hacker SaaS OneNote Personal Information Help Desk Transportation Battery Robot Automobile Business Intelligence Unsupported Software Shortcut Display End of Support Update Customer Service Biometrics Google Drive Cloud Computing Retail Internet Exlporer Virtual Reality Paperless Office Social Networking Internet of Things Outlook Fax Server Human Resources IT consulting Hard Disk Drive Running Cable Data Protection Images Sports Employer Employee Relationship Uograde Worker Commute Reliable Computing Operating Sysytem best practices PDF Files Bloatware Scalability Twitter data breach Safety Text Messaging Surge Protector Chromecast How To Branding Wi-Fi Television risk management Upgrades Distributed Denial of Service 3D Printing Emergency Artificial Intelligence Compliance Wiring Administrator Training Information Applications WIndows 7 Colocation Consultant eWaste The Blindside Of Debate Inbound Marketing Regulations Access ISP Company Culture Black Market Touchscreen Politics IT Security Excel Value Cameras Programming Cleaning Blogging Experience User Audit Keyboard Science Avoid Downtime Presentation Computer Care Virtual Desktop Website Nokia Bluetooth Music Best Available IT Technicians Hiring/Firing Travel Data storage OneDrive SharePoint Amazon Books Smart Technology Co-managed IT Video Games Document Management Augmented Reality Teamwork Data Breach Advertising Legal Busines Continuity Networking Ebay Near Field Communication Touchpad Windows 10s Mobile Device Meetings Computing Managed Security Hard Drive Scam Taxes Microblogging Youtube Tutorial Supercomputer Electronic Medical Records Sales Managed Service Provder IT Budget Webinar Reputation Windows 10 Storage Gift Giving IT service Vulnerability Shadow IT Domains Relocation iOS Managed IT Services Webinar IT solutions Buisness Lifestyle