4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

When you turn on your device’s Wi-Fi capabilities, do you ever take the time to look at some of the names of your neighbors’ connections? You’ll see some rather boring names as well; some might just use the name of their organization or the family’s name, or even just the default SSID used by the router. The fact of the matter is that a wireless network name that’s easy to gloss over is a best practice for network security.

The users who go out of their way to name their Wi-Fi networks something nonsensical have the right idea--making your SSID something that’s easy to miss is a great way to protect your network against possible infiltrators. Think about it this way; if a robber was trying to break into your home and he knew the address, it would make it much easier for him to do so. On the other hand, if he doesn’t know your address and only knows that it’s on a specific street, he’ll have to do some guesswork, which could make all the difference in preventing a robbery in the first place.

If there’s one website that showcases just how important an inconspicuous Wi-Fi network name is, it’s WiGLE. This service collected information from the countless wireless networks and places it in an online database that users can search through. WiGLE also offers the ability to map, query, and update the available databases. The information collected by WiGLE can be used for a myriad of purposes, such as research projects, journalism, site surveys, educating the public, analyzing wireless usage, and locating networks that you can connect to while you’re traveling.

Now that you know this tool exists, have you asked the important questions yet? If your information is being collected, is it at risk of being stolen and used against you? Should you be worried about someone being able to find your network through an online application? If you don’t want it to be available to the public, how can you remove your information from WiGLE? The service has answered all of these questions in its own FAQs section:

“If your network is in WiGLE and you don't like it, we'll take it out immediately, but you should look into making your network harder to detect AND more secure; remember that you're the one bombarding passers-by with your signal. We aren't affiliated directly with any particular community or interest (other than our own), but we applaud the efforts of the people who wrote the stumbling software that feeds our project, the people looking to use wireless in innovative ways, and especially the community of people who just dig wireless network access and dig sharing it.”

What do you think about WiGLE? If it has you concerned, perhaps it’s time to take a look at your organization’s network connections and see what can be done to reinforce them. To learn more, reach out to us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 June 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Business Computing Internet software Hackers Backup Hosted Solutions Productivity Business Management Managed Service Provider Business Malware IT Services Google Innovation Efficiency Windows IT Support Hardware Workplace Tips Saving Money Disaster Recovery Upgrade Computer Miscellaneous VoIP Business Continuity Windows 10 Virtualization Data Mobile Devices Mobile Device Management Server Mobile Computing User Tips Communication Save Money Network Security Network Quick Tips Going Green Mobile Office Alert Email Information Technology Smartphones Smartphone Apps Small Business Health Social Media communications Microsoft Office Office BYOD Gadgets Operating System Application Disaster Managed IT Services Tablet Browser Firewall Android Ransomware BDR Search WiFi Mobility Holiday Chrome The Internet of Things Avoiding Downtime Remote Computing Passwords Unified Threat Management Spam Automation Saving Time Outsourced IT Risk Management Hacking Remote Monitoring History Best Practice Data Management Telephone Systems Employer-Employee Relationship IT Solutions Budget Vendor Management Hard Drives Productivity Office Tips Customer Relationship Management Wireless Technology VPN Cybercrime Apple Facebook Big Data Marketing Recovery Analytics Gmail Router Humor Managed IT Administration User Error Wearable Technology iPhone Cybersecurity Law Enforcement Lithium-ion battery Antivirus Maintenance PowerPoint Collaboration Social Password Current Events Computers Telephony Money Printer Bring Your Own Device USB Content Filtering Phone System Point of Sale Encryption IT COnsultant Save Time Proactive IT Computer Repair Government App Cost Management HaaS Intranet Work/Life Balance Bandwidth Printer Server Laptop Virus Users Phishing Windows 8 Education Social Engineering Trending Hosted Solution Net Neutrality Wireless Private Cloud Tech Support Cloud Computing Mouse Internet Exlporer Workplace Streaming Media Internet of Things Identity Theft Two-factor Authentication Solid State Drive Managing Stress Uninterrupted Power Supply SaaS Flexibility online currency Audit Social Networking Samsung Business Intelligence Shortcut Update Office 365 Customer Service Efficency Biometrics OneNote Retail Virtual Reality hacker Personal Information Transportation Display Computer Care Battery Instant Messaging Robot Emails HIPAA Augmented Reality Unsupported Software Automobile Entertainment Network Congestion Paperless Office Benefits End of Support DDoS Computer Accessories Google Drive Outlook Fax Server Help Desk Distributed Denial of Service Legal Compliance Mobile Device Windows 10s Touchpad WIndows 7 Nokia Managed Security Nanotechnology Scam eWaste Inbound Marketing Regulations Hard Disk Drive Data Protection Root Cause Analysis Twitter Employer Employee Relationship Excel Sports Value Cameras Worker Commute best practices Operating Sysytem PDF User Surge Protector Television Scalability Science Files 3D Printing Presentation data breach Virtual Desktop Bluetooth Text Messaging Best Available Safety IT Technicians How To Chromecast Travel Upgrades Hard Drive Wi-Fi risk management SharePoint Artificial Intelligence ISP Emergency Training Administrator Uograde Consultant Images Applications Windows 10 Colocation Teamwork Programming Blogging The Blindside Of Company Culture Black Market Access Busines Continuity Near Field Communication Touchscreen Politics Vulnerability Networking Meetings Website IT Security Cleaning IT consulting Experience iOS Human Resources Running Cable Avoid Downtime OneDrive Keyboard Wiring Amazon Reliable Computing Information Co-managed IT Music Computer Fan Hiring/Firing Debate Bloatware Data storage Books Dark Web Video Games Ebay Smart Technology Document Management Computing Data Breach Data Backup Branding Advertising Storage Tutorial Taxes IT service Supercomputer Domains Electronic Medical Records CrashOverride IT Budget Reputation Gift Giving Microblogging Youtube Buisness Sales Managed Service Provder Webinar Shadow IT Relocation Managed IT Services Webinar Lifestyle IT solutions