Wireless hardware manufacturers have made installing and configuring new access points and routers pretty simple, for both consumer and enterprise devices. This ease of installation can lull the inexperienced tech into a false sense of security and lead them to make mistakes during configuration.
Whether you're installing a wireless access point in a home, small office, or large building, following a few best practices can make the difference between a reasonably secure network and one that screams "hack me now!"
During this week's TR Dojo episode, I discuss five blatant security mistakes to avoid when deploying a new wireless access point.
Check out the following TR Dojo episodes for more security tips:
- Configure wireless network settings via Group Policy
- Give your old Wi-Fi router new life with open source firmware
- Wi-Fi thief's tale reminds IT to enforce home office security
- How to spoof a MAC address
- Five tips for improving Linux security
For those who prefer text to video, click the View Transcript link below the video player window or check out Brian Posey's article, "10 tips for deploying new wireless access points," on which this video is based.
You can also sign up to receive the latest TR Dojo lessons through one or more of the following methods:
Bill Detwiler has nothing to disclose. He doesn't hold investments in the technology companies he covers.
Bill Detwiler is Managing Editor of TechRepublic and Tech Pro Research and the host of Cracking Open, CNET and TechRepublic's popular online show. Prior to joining TechRepublic in 2000, Bill was an IT manager, database administrator, and desktop support specialist in the social research and energy industries. He has bachelor's and master's degrees from the University of Louisville, where he has also lectured on computer crime and crime prevention.