Filing Taxes Online This Year? Take Steps to Protect Your Information!
If your computer runs Windows XP, you must update it now!
Why Should You Report Security Incidents? And How Do You Report One?
Photo and Video Privacy Issues
The Password is Dead, Long Live the Password!
Data Privacy Month: NSA Surveillance Panel at the National Constitution Center
Protecting Your Finances During This Year’s Holiday Shopping Season
Beware of Phishing E-mails in the Wake of Typhoon Haiyan
No E-mail from Penn Will Ask For Your Username/Password or SSN
The Children's Online Privacy Protection Act: Does It Apply to Your Website?
October: National Cyber Security Awareness Month; Free Secure Disposal of Paper and Electronics
What Basic Rules Protect Student Information at Penn? (September 2013)
Protecting Privacy and Security on Penn + Box
Security Starts With You
New Regulatory Changes: Do They Apply to Your Area?
Tagged with security , home computing , wireless
Tuesday, April 3, 2007 - Almanac Vol. 53, No. 28
Securing your home wireless network
The affordability and ease of use of basic wireless access points (WAPs) has prompted many Penn users to set up "hot spots" at home. If you choose to set up your own wireless network, be aware of the following security issues and guidelines to prevent others from accessing your network and your data.
- Change the default passwords on all WAPs you use on your wireless network to strong passwords of your own choosing. This prevents intruders from taking control of your network by using published lists of manufacturers’ default account names and passwords or by simply guessing frequently used ones. Being in control of your own network is just as important as being in control of your own computer.
- Change the default SSID, or "name" of each WAP to a unique name of your own choosing.
- Disable broadcasting of your network name (SSID) to make your network less visible to unauthorized users.
- Enable and require the strongest encryption that your WAPs offer in order to encrypt traffic traveling across your wireless network. In many cases this will be 128-bit Wireless Encryption Protocol (WEP), but many units now offer a superior alternative, Wi-Fi Protected Access (WPA).
- Regularly check for, and install, updated versions of the firmware for your WAPs and software drivers for your wireless Ethernet adapters.
- Enable and require MAC (Media Access Control) address filtering on each WAP. This will let you specify which individual computers may access the WAP, identified by the unique MAC addresses associated with their Ethernet adapters.
For more information about securing home wireless networks, read the Guide to Information Security at www.upenn.edu/computing/security/brochure/brochure_current.html.