CR-T Blog

CR-T has been serving the Orem area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Securing your Wi-Fi is More Important Than Ever

Does your Wi-Fi require a secure password to allow users to access your network with their mobile devices? And no, the word "password" is not a suitable password. If your wireless network is easy to gain access to, you are opening up your sensitive data to anyone within range.

Cracking into Wi-Fi networks isn't complicated for anyone who really wants to do it, especially if you are only securing your network with WEP encryption. WEP is the most commonly used encryption available on wireless routers, and it only takes a couple searches on YouTube to find tutorials on cracking WEP Wi-Fi networks to gain access in just a few minutes.

Businesses shouldn't use WEP to secure their wireless networks, but instead should at least use WPA or WPA2. If you aren't sure what type of encryption your wireless network is using, contact CR-T at 801.222.0930 to make sure you aren't leaving yourself open for localized threats. If you know your Wi-Fi doesn't even have a password, we can enable that security for you.

Once a user can log onto your wireless network, they can start using your internet connection, but from there they could possibly be able to get deeper into your network and cause some real trouble for you. While requiring a long, secure password to log devices onto the network is inconvenient, businesses need to enforce this to prevent sensitive corporate data from getting into the wrong hands.


No comments yet
Already Registered? Login Here
Sunday, 28 August 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Business Management Microsoft Internet Saving Money Privacy Tip of the Week Small Business Workplace Tips Managed Service Provider Backup Software Quick Tips Mobile Office Hardware Cloud Data Productivity Social Media Gadgets Hackers Best Practices Email Business Computing Google Users Malware Mobile Devices Network Hosted Solutions Windows Business IT Services Virtualization IT Support Upgrade Microsoft Office Communication Computer VOIP Passwords Miscellaneous WiFi Smartphones Windows 10 Efficiency Business Continuity Innovation Smartphone Holiday Marketing Vendor Management Server Disaster Recovery Mobile Device Management Current Events Android User Tips Apple Facebook Operating System Best Practice Office Spam Remote Computing Browser Outlook Going Green Bring Your Own Device App Mobile Computing History Wireless Technology Remote Monitoring Alert Lithium-ion Battery Trending The Internet of Things Health Information Technology Windows 8 Ransomware Printer Big Data Humor Apps Content Filtering Gmail Customer Relationship Management IT Solutions Tutorials Social Office Tips Excel Password Artificial Intelligence Fax Server Unified Threat Management Maintenance Avoiding Downtime Internet of Things Retail IT Consultant Application Computer Repair Save Money Saving Time Tech Support Proactive IT Data Management PowerPoint Router Customer Service Administration Firewall Presentation Robot Virus Automation iPhone Inbound Marketing Phone System The Cloud Google Analytics Hard Drives BYOD Network Security Education Sports User Error Hacking Computers Antivirus Digital Payment Business Growth How To Money Point of Sale Risk Management Competition Data storage Upgrades Tools VPN Safety Bandwidth Phishing Printing Social Networking Net Neutrality Recovery Settings Wi-Fi Video Surveillance User Business Owner End of Support Tablet Search Running Cable Display LiFi Piracy Analyitcs Cybercrime Downtime Website Legal Augmented Reality Mobile Touchscreen Chrome Employer-Employee Relationship Mouse Laptop IBM Hacker Outsourcing Experience Word Keyboard Shortcuts Chromebook Save Time Bitcoin Phone Systems IP Address Memory Virtual Desktop ebay Gaming Console eWaste Scheduling Emoji Hiring/Firing Document Management Hacks Scam Storage Company Culture 3D Printing People File Sharing Text Messaging Environment Macro Wearable Technology Alerts PC Care Wireless Dark Data Conferencing Unsupported Software Hosted Solution Troubleshooting Computing Remote Support Leadership Managed Service Providers Mobile Data Statistics It Issues communications Refrigeration USB Trojan Google Wallet Work Station Halloween 5G Webinar Value Physical Security Print Server Unified Communications 3D Webcam Java Drones Recycling Streaming Media Web Marketing Scary Stories Two-factor Authentication Consumers Network Congestion Skype IT service Personal Information Debate Law Firm IT Undo Collaboration Help Desk Budget Monitors LinkedIn Business Intelligence Office 365 Electronic Medical Records Deep Learning Computer Accessories Intranet Writing Best Available Buisness Fun Specifications Co-managed IT Entrepreneur Virtual Reality Programming Bluetooth Alt Codes Domains Disaster Windows 8.1 Update Social Engineering Samsung Encryption Cortana SaaS Typing Mobile Device Public Speaking Google Drive Managed IT Services Crowdfunding Gadget YouTube Knowledge Update Licensing Cryptocurrency Training Admistrator Google Docs Online Currency Twitter

Latest Blog Entry

Technology grows more mobile with each passing moment, and emojis have popped up in places that nobody could have dreamt of. In particular, business communications have experienced a surge of emojis, ...

Latest News

  • Private Screening of The Hobbit III

    By invitation only

    CR&T’s 18th annual client appreciation event: THE HOBBIT III. This is a private pre-screening before the world premiere.

    Location: Thanksgiving Point Theater
    Time: December 16th 8:30AM (REMEMBER THIS IS 1 DAY PRIOR TO THE WORLD PREMIERE) seating is first come.


Contact Us

Learn more about what CR-T can do for your business.


Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#