Top 10 User Wi-Fi Safeguards

Your users are your first line of defense. They need to play an active role in helping to protect information systems. Listed below are the Top 10 steps they can take when using wireless networks.

  1. Signal strength. In general, the closer the user is to the access point, the stronger the signal and the faster the transfer rate. Rogue (unauthorized) access points may or may not be in the same facility as authorized devices. Users should know that signal strength alone, is not sufficient to determine authorized networks.
  2. Manual connection. Portable devices such as laptops and handhelds should be configured so that they do not automatically connect to wireless networks. A manual process helps ensure that the device connects to the appropriate wireless network.
  3. Legitimate network. Since Wi-Fi signals can travel a long distance, users should check with the management of the facility that provides the connectivity to ensure they are connecting to the appropriate network. Unauthorized "evil twin" networks can capture logon credentials and other sensitive information.
  4. Encryption. There are many different types of encryption methods used to secure wireless networks. Wired Equivalent Privacy (WEP) is the oldest and least preferred. Wi-Fi Protected Access (WPA) is newer and offers better protection. WPA2 is the newest and should be used if possible. Users should use Virtual Private Network (VPN) when connecting to corporate systems.
  5. Shoulder surfing. Ensure that others cannot obtain the user's ID and password as it is typed. In addition, sensitive information should not be able to be read on the screen by unauthorized personnel.
  6. Screen aware Users should look at the address bar URL. This will help protect against phishing attacks. Secure pages typically have a URL starting with https and include a secure page notification such as a lock.
  7. Firewalls. Firewalls help restrict traffic to and from the device. Users should ensure the firewall is turned on so it can actively protect the device.
  8. Patch management. Users should ensure that operating system and security protection software is patched and up-to-date. Ensure browsers and updates to third party software packages are applied in a timely manner. Critical updates should be tested and applied as soon as possible.
  9. Battery saver. Portable devices constantly search for available networks. Users can increase battery life by turning off Wi-Fi when it isn't needed. This also helps ensure that an intruder can't connect to the device.
  10. Incident management. Users should inform the appropriate personnel if they believe they logged into the wrong network, sensitive information such as their ID/password was compromised, their device was lost or stolen, etc.

Network security audits help organizations identify, manage, and reduce their risks related to mobile computing devices and communicating with wireless networks.  Formal and documented policies ensure a top down approach to managing network security risks.

Security Blog
verified If You Want a "Security Audit"
You Need a Certified Auditor.
Certified Information Systems Auditors

Unlike a security consultant, Altius IT is certified as a Certified Information Systems Auditor to perform a security audit of your environment and issue reports and recommendations to secure your systems. After your audit, Altius IT's Auditor Opinion Letter and Secure Seal let your clients and prospects know you meet security best practice/compliance requirements.

See our In the News page for video clips of our experts on national television as well as over 40 publications featuring Altius IT. In addition to our auditor certifications we hold many security, technical, and project management credentials. More information is available on our About Us page.

Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your information systems, applications, and network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets