Wireless Security

What are the different credentials that you would seek? Why are these important to you and how would they support the organization’s security program.

What are the security risks of not using wireless security protocols on your home network? Why do you think so many people don’t lock their home WiFi networks?

Certified Ethical Hacker is the first on my list. Gaining a preliminary certification from the EC (Electronic Commerce) Council not only looks good, but would be a great start to a profession as a network defender. Because how can you defend against attacks you know nothing about? By learning to think offensively, you can appropriately test your network, and not rely on checkbox compliance for your network security. CEH is also a DoD Approved Baseline Certification, which means it would help you get a job in Government. Further down the road, I hope to be good enough to attack the OSCP. Either of which should be more than enough to properly configure a wireless router.

But wireless routers often go unconfigured these days. Many people forsake security for the convenience of easy internet access. Little do these lazybones know, that even a secured wireless network on a separate subnet can still be breached by the deftest of hackers. In the instance of such a targeted attack, your data most likely wouldn’t stand a chance, but you can prevent your average ne’er do well from accessing your files or leaching your bandwidth by implementing WPA3 wherever possible, and ensuring your sensitive documents aren’t in a shared folder.

Leave a Comment