4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

When you turn on your device’s Wi-Fi capabilities, do you ever take the time to look at some of the names of your neighbors’ connections? You’ll see some rather boring names as well; some might just use the name of their organization or the family’s name, or even just the default SSID used by the router. The fact of the matter is that a wireless network name that’s easy to gloss over is a best practice for network security.

The users who go out of their way to name their Wi-Fi networks something nonsensical have the right idea--making your SSID something that’s easy to miss is a great way to protect your network against possible infiltrators. Think about it this way; if a robber was trying to break into your home and he knew the address, it would make it much easier for him to do so. On the other hand, if he doesn’t know your address and only knows that it’s on a specific street, he’ll have to do some guesswork, which could make all the difference in preventing a robbery in the first place.

If there’s one website that showcases just how important an inconspicuous Wi-Fi network name is, it’s WiGLE. This service collected information from the countless wireless networks and places it in an online database that users can search through. WiGLE also offers the ability to map, query, and update the available databases. The information collected by WiGLE can be used for a myriad of purposes, such as research projects, journalism, site surveys, educating the public, analyzing wireless usage, and locating networks that you can connect to while you’re traveling.

Now that you know this tool exists, have you asked the important questions yet? If your information is being collected, is it at risk of being stolen and used against you? Should you be worried about someone being able to find your network through an online application? If you don’t want it to be available to the public, how can you remove your information from WiGLE? The service has answered all of these questions in its own FAQs section:

“If your network is in WiGLE and you don't like it, we'll take it out immediately, but you should look into making your network harder to detect AND more secure; remember that you're the one bombarding passers-by with your signal. We aren't affiliated directly with any particular community or interest (other than our own), but we applaud the efforts of the people who wrote the stumbling software that feeds our project, the people looking to use wireless in innovative ways, and especially the community of people who just dig wireless network access and dig sharing it.”

What do you think about WiGLE? If it has you concerned, perhaps it’s time to take a look at your organization’s network connections and see what can be done to reinforce them. To learn more, reach out to us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Business Management Hosted Solutions Managed Service Provider Malware Google IT Services Business Efficiency IT Support Windows Disaster Recovery Innovation Business Continuity Hardware Workplace Tips VoIP User Tips Saving Money Computer Mobile Devices Virtualization Windows 10 Network Security Upgrade Miscellaneous Mobile Device Management Data Server Email communications Mobile Computing Alert Communication Network Save Money Microsoft Office Quick Tips Smartphone Small Business Social Media BYOD Going Green Mobile Office Managed IT Services Outsourced IT Information Technology Smartphones Office Apps Health Android Browser Gadgets Operating System Chrome Application Ransomware Mobility Disaster Tablet Productivity WiFi Managed IT Holiday Cybersecurity Firewall The Internet of Things Avoiding Downtime Data Recovery Unified Threat Management IT Solutions Spam Risk Management BDR Data Backup History Best Practice Search Data Management Cybercrime Passwords Telephone Systems Remote Computing Budget Vendor Management Marketing Automation Hard Drives Saving Time Hacking Remote Monitoring VPN Apple Facebook Employer-Employee Relationship Big Data Recovery Phone System Content Filtering Money Proactive IT Office Tips iPhone User Error Customer Relationship Management Collaboration Phishing Password Wireless Technology Hosted Solution Law Enforcement Computers Printer USB Analytics Encryption Gmail Humor Router Administration Government Wearable Technology Intranet Maintenance Antivirus PowerPoint Shortcut Lithium-ion battery Virus Social Current Events Work/Life Balance Telephony Bring Your Own Device Vulnerability Office 365 Tech Support Politics Point of Sale Personal Information IT COnsultant Outlook Computer Repair Wireless SaaS Unsupported Software App Audit Cost Management HaaS Cloud Computing Google Drive Data Security Business Intelligence Bandwidth Save Time Printer Server Laptop Users Data Protection Flexibility OneNote Windows 8 Social Engineering Trending Education Net Neutrality Private Cloud Augmented Reality Benefits Network Congestion Applications DDoS Computer Accessories Data Loss Paperless Office hacker Help Desk Compliance Mouse Fax Server Transportation Redundancy Data Storage Workplace Two-factor Authentication Computer Care Battery Robot Managing Stress Streaming Media Excel Automobile Uninterrupted Power Supply online currency End of Support Data Breach Social Networking Travel Internet Exlporer Internet of Things Update Customer Service Biometrics Identity Theft Efficency Solid State Drive Retail Virtual Reality Sports Meetings IT Support Instant Messaging Emails Samsung Windows 10 Wi-Fi Display HIPAA Emergency Artificial Intelligence Entertainment Colocation Consultant The Blindside Of Sync Company Culture iOS Black Market Access Lifestyle Branding Touchscreen Managed IT Service Ebay IT Security Computing Managed IT Services Distributed Denial of Service Adobe Google Docs Cleaning Computer Fan Nokia WIndows 7 Experience Inbound Marketing Keyboard Avoid Downtime eWaste Storage Licensing Microsoft Excel Regulations Dark Web Screen Mirroring Music Value Hiring/Firing File Sharing Cameras Data storage Twitter User Cast Books Smart Technology Windows 10s Video Games Science Surge Protector Virtual Desktop systems Presentation Nanotechnology Document Management Advertising Television Bluetooth Best Available Tablets 3D Printing Hard Disk Drive Legal IT Technicians hack Mobile Device Root Cause Analysis Hard Drive Touchpad SharePoint HBO Managed Security NFL Scam best practices Cortana Uograde ISP CrashOverride Images Teamwork IT Management Word Busines Continuity Employer Employee Relationship data breach Project Management Networking Legislation Near Field Communication Programming Settings Worker Commute Blogging Operating Sysytem PDF WIndows Server 2008 Windows Ink risk management Scalability Files MSP Human Resources IT consulting Website Safety Text Messaging Running Cable Patch Management Google Maps Wiring How To Chromecast Information Reliable Computing Upgrades OneDrive Commerce Amazon Regulation Bloatware Software as a Service Debate Training Co-managed IT Administrator Conferencing Microsoft Word Gifts Device Security Shadow IT Relocation Webinar Devices Tutorial IT service Credit Cards Mobile IT solutions Spyware Domains FAQ Professional Services Fraud Charger Edge Wireless Charging Microblogging Youtube Ciminal Gift Giving Buisness Taxes WannaCry Sales Supercomputer Electronic Medical Records Managed Service Provder Evernote Webinar Comparison IT Budget Workers Blockchain Reputation Specifications Updates Identities