If you are setting up a home or small office network, here are some best practices you can follow to enhance the security of your computer and your network.
General network security recommendations
The following are general security guidelines for all home and small office networks.
Keep your computer up to date
To help keep the computers on your network safer, turn on Automatic Updates on each computer. Updates are additions to software that can prevent or fix problems, enhance the security of a computer, or improve a computer's performance.
Use a firewall
A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through a network or the Internet. A firewall can also help stop your computer from sending malicious software to other computers.
Run antivirus software on each computer
Firewalls help keep out worms and hackers, but they're not designed to protect against viruses; so you should install and use antivirus software. Viruses can come from attachments in e-mail messages, files on CDs or DVDs, or files downloaded from the Internet. Make sure that the antivirus software is up to date and set to scan your computer regularly.
Use a router to share an Internet connection
Consider using a router (also called a residential gateway device) to share an Internet connection. These devices usually have built-in firewalls and other features that can help keep your network better protected against hackers.
Don't stay logged on as an administrator
When you are using programs that require Internet access, such as a web browser or an e-mail program, we recommend that you log on as a standard user rather than an administrator. That's because many viruses and worms can't be stored and run on your computer unless you're logged on as an administrator.
Wireless network security recommendations
If you have a wireless network, there are some additional security precautions that you should take.
Use a network security key
If you have a wireless network, you should set up a network security key, which turns on encryption. With encryption, people can't connect to your network without the security key. Also, any information that is sent across your network is encrypted so that only computers that have the key to decrypt the information can read it. This can help avert attempts to access your network and files without your permission. Common wireless network encryption methods are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) and WPA-2.
Change the default administrator name and password on your router or access point
If you have a router or access point, you probably used a default name and password to set up the equipment. Most manufacturers use the same default name and password for all of their equipment, which someone could use to access your router or access point without you knowing it. To avoid that risk, change the default administrator user name and password for your router. Check the information that came with your device for instructions about how to change the name and password.
Change the default SSID
Routers and access points use a wireless network name called a service set identifier (SSID). Most manufacturers use the same SSID for all of their routers and access points. We recommend that you change the default SSID to keep your wireless network from overlapping with other wireless networks that might be using the default SSID. It makes it easier for you to identify which wireless network is yours, if there is more than one nearby, because the SSID is typically shown in the list of available networks. Check the information that came with your device for instructions about how to change the default SSID.
Position your router or access point carefully
Wireless signals can transmit a few hundred feet, so the signal from your network could be broadcast outside of your home. You can help limit the area that your wireless signal reaches by positioning your router or access point close to the center of your home rather than near an outside wall or window.
Tuesday, October 6, 2009
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment