{"id":5213,"date":"2014-12-15T04:21:11","date_gmt":"2014-12-15T09:21:11","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5213"},"modified":"2020-02-26T15:10:44","modified_gmt":"2020-02-26T15:10:44","slug":"seven-tips-on-how-to-make-your-home-wi-fi-more-safe","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/seven-tips-on-how-to-make-your-home-wi-fi-more-safe\/5213\/","title":{"rendered":"Seven tips on how to make your home Wi-Fi more safe"},"content":{"rendered":"<p>Time and time again did we write about the dangers public <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/tag\/wi-fi\" target=\"_blank\" rel=\"noopener\">Wi-Fi<\/a> hotspots pose to users, but today we are talking about threats coming specifically from home wireless networks. Many wireless router users do not remotely consider them to be a threat, but we are here to bring this illusion down. This guide is by no means complete, but several great tips can help you to increase the level of your home network security.<\/p>\n<h3>Step 1. Changing the admin password<\/h3>\n<p>One of the most common\u00a0mistakes is using a default out-of-box admin password (likes of frequently used \u201cadmin:admin\u201d and \u201c1234\u201d). Combined with some non-critical remote vulnerability or open wireless connection, it might give hackers the ability to fully control the router. We strongly recommend <a href=\"https:\/\/www.kaspersky.com\/blog\/10-worst-password-ideas-as-seen-in-the-adobe-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">updating the password to a more complicated one<\/a>:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195827\/wifi-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5214\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195827\/wifi-1.jpg\" alt=\"wifi-1\" width=\"1024\" height=\"533\"><\/a><\/p>\n<p>To illustrate our point, we present screenshots of TP-Link router settings. Naturally, not all router access points look like this, however the general settings will remain the same.<\/p>\n<h3>Step 2. Disable remote management<\/h3>\n<p>The second problem is open access to the router\u2019s control interface. Usually manufacturers enable only LAN-based router control by default, but this isn\u2019t always the case. Make sure you check whether you router\u2019s control interface is available on the internet.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195826\/wifi-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5215\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195826\/wifi-2.jpg\" alt=\"wifi-2\" width=\"1024\" height=\"464\"><\/a><\/p>\n<p>In most cases, in order to disable remote management, you should enter the <strong>0.0.0.0<\/strong> address into the appropriate field or de-check the box. It also makes sense to block access to the router through Telnet or SSH protocols (provided your connection supports them). Proficient users might apply restrictions to control capabilities over LAN based on hardware\u2019s MAC addresses.<\/p>\n<h3>Step 3. Disable\u00a0Broadcast SSID<\/h3>\n<p>As a rule, a wireless router transmits your Wi-Fi network ID (the so-called SSID) to everyone. You can actually disable the broadcast of the SSID by selecting the option below. \u00a0This means that you\u2019ll still be able to connect to the network, however it won\u2019t be visible in the wireless selection\u00a0menu. \u00a0This makes it that little bit harder for attackers to spot your network.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195823\/wifi-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5216\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195823\/wifi-3.jpg\" alt=\"wifi-3\" width=\"1024\" height=\"497\"><\/a><\/p>\n<h3>Step 4. Using reliable encryption<\/h3>\n<p>Enabling encryption on the Wi-Fi broadcast means\u00a0that people will need to know a password before joining your network. \u00a0However, not enabling encryption means that anybody can join your network and download what they wish. \u00a0It\u2019s a lot simpler than it appears to enable encryption and having strong security on the network goes a long way to making sure it\u2019s safe for every user. \u00a0The first step is making sure that the encryption is strong enough. \u00a0WPA2 is currently one of the strongest encryptions available so you should make sure you choose it if you can.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195822\/wifi-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5217\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195822\/wifi-4.jpg\" alt=\"wifi-4\" width=\"1024\" height=\"778\"><\/a><\/p>\n<p>Once you\u2019ve selected WPA2 setting, it\u2019ll ask you for a password. \u00a0Remember to ensure that this is as <a href=\"https:\/\/www.kaspersky.com\/blog\/remember-strong-passwords\/\" target=\"_blank\" rel=\"noopener nofollow\">strong as possibles<\/a>.<\/p>\n<h3>Step 5. UPnP et al.<\/h3>\n<p>Today\u2019s wireless routers are not only capable of serving a internet access; they also support different protocols to automatically\u00a0connect smart devices:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195820\/wifi-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5219\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195820\/wifi-5-1024x460.jpg\" alt=\"wifi-5\" width=\"1024\" height=\"460\"><\/a><\/p>\n<p>Universal Plug and Play (UPnP), DLNA support (Digital Living Network Alliance) and alike are better off disabled if not in use \u2014 you run a lower risk of being affected by vulnerabilities in software using those features.<\/p>\n<h3>Step 6. Updating built-in software<\/h3>\n<p>Updating firmware is something of a dark art and as such, the majority of users will never even think about it. \u00a0However, if you\u2019re up to the challenge, it\u2019s worth researching as some hardware is patched significantly after launch and the only way to get these updates is through firmware. \u00a0What\u2019s worth noting however is that most modern routers now have the ability to update themselves, without user intervention.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195818\/wifi-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5220\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/12\/05195818\/wifi-6.jpg\" alt=\"wifi-6\" width=\"1024\" height=\"519\"><\/a><\/p>\n<p>If you do need to update the firmware, the instruction are usually stored on a separate tab in the router\u2019s web interface. All you need to do is download the firmware\u2019s image, back-up the router configuration (sometimes the older file cannot be used with the new firmware, and in that case you might need to run the process from the beginning), run the update and restore configuration after restarting your system.<\/p>\n<h3>Step 7. Not only router<\/h3>\n<p>\u2018Ultimate\u2019 protection does not exist, as the years have proved. \u00a0A sensible approach to router settings, using strong passwords and encryption, and timely updates to firmware will significantly contribute to a higher level of safety of your wireless network, but it does not 100% guarantee your network is safe from hacking.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">7 tips for securing your connected home. <a href=\"http:\/\/t.co\/YMdv5vGrLj\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/YMdv5vGrLj<\/a> by <a href=\"https:\/\/twitter.com\/JacobyDavid?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@JacobyDavid<\/a> via <a href=\"https:\/\/twitter.com\/Securelist?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Securelist<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/IoT?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#IoT<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/537674772847804417?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 26, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The protection should employ a complex approach, so we recommend using latest firewalls and antivirus software, with latest malware databases. Take <a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security 2015<\/a> \u2014 it allows you to check the level of security for your wireless network and offer suggestions on applying correct settings.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Time and time again did we write about the dangers public Wi-Fi hotspots pose to users, but today we are talking about threats coming specifically from home wireless networks. Many<\/p>\n","protected":false},"author":40,"featured_media":5223,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026,9],"tags":[187,383,97,855,131,854,174],"class_list":{"0":"post-5213","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-passwords","10":"tag-router","11":"tag-security-2","12":"tag-setting","13":"tag-tips","14":"tag-wan-networks","15":"tag-wi-fi"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/seven-tips-on-how-to-make-your-home-wi-fi-more-safe\/5213\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/passwords\/","name":"passwords"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5213"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5213\/revisions"}],"predecessor-version":[{"id":19169,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5213\/revisions\/19169"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5223"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}