CR-T Blog

CR-T has been serving the Orem area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Securing your Wi-Fi is More Important Than Ever

Does your Wi-Fi require a secure password to allow users to access your network with their mobile devices? And no, the word "password" is not a suitable password. If your wireless network is easy to gain access to, you are opening up your sensitive data to anyone within range.

Cracking into Wi-Fi networks isn't complicated for anyone who really wants to do it, especially if you are only securing your network with WEP encryption. WEP is the most commonly used encryption available on wireless routers, and it only takes a couple searches on YouTube to find tutorials on cracking WEP Wi-Fi networks to gain access in just a few minutes.

Businesses shouldn't use WEP to secure their wireless networks, but instead should at least use WPA or WPA2. If you aren't sure what type of encryption your wireless network is using, contact CR-T at 801.222.0930 to make sure you aren't leaving yourself open for localized threats. If you know your Wi-Fi doesn't even have a password, we can enable that security for you.

Once a user can log onto your wireless network, they can start using your internet connection, but from there they could possibly be able to get deeper into your network and cause some real trouble for you. While requiring a long, secure password to log devices onto the network is inconvenient, businesses need to enforce this to prevent sensitive corporate data from getting into the wrong hands.


No comments yet
Already Registered? Login Here
Friday, 21 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Microsoft Business Management Tip of the Week Internet Saving Money Privacy Small Business Workplace Tips Managed Service Provider Backup Software Hardware Quick Tips Mobile Office Productivity Cloud Data Social Media Best Practices Gadgets Hackers Email Business Computing Google Users Malware Mobile Devices Network Hosted Solutions Virtualization Windows IT Services Business IT Support Computer Upgrade Microsoft Office Communication Smartphones VOIP Passwords Miscellaneous Windows 10 WiFi Business Continuity Efficiency Smartphone Innovation Disaster Recovery Mobile Device Management Holiday Marketing Vendor Management User Tips Server Remote Computing Android Facebook Office Best Practice Apple Operating System Alert Current Events Spam Browser Outlook App Going Green Health Bring Your Own Device Mobile Computing History Apps Remote Monitoring Lithium-ion Battery Trending The Internet of Things Wireless Technology Information Technology Printer Humor Ransomware Content Filtering Big Data Gmail Customer Relationship Management IT Solutions Tutorials Windows 8 Excel Save Money Social Fax Server Office Tips Robot Maintenance Unified Threat Management Password Avoiding Downtime Artificial Intelligence Internet of Things BYOD Automation Network Security IT Consultant Retail Application Computer Repair Saving Time Antivirus Digital Payment Router Twitter Education Hacking Computers Firewall Hacker Business Growth PowerPoint Money Proactive IT Data Management Administration Customer Service Virus Presentation iPhone The Cloud Inbound Marketing Phone System User Error Google Analytics Hard Drives Tech Support Sports Chrome Risk Management Samsung Cortana How To Employer-Employee Relationship Point of Sale Data storage Laptop Upgrades Competition Bandwidth VPN Printing Hosted Solution Computing Social Networking Safety Settings Phishing Net Neutrality End of Support Video Surveillance Recovery Wi-Fi User LiFi Mobile Tablet Piracy Business Owner Running Cable Search Legal Display Augmented Reality Analyitcs Touchscreen Cybercrime Downtime Website Mouse IBM Tools Training Scheduling Chromebook Scam Bitcoin Macro Public Speaking Virtual Desktop Crowdfunding Knowledge Phone Systems Emoji Hacks Licensing Online Currency Storage ebay Gaming Console Document Management Experience 3D Printing Black Market Word Save Time File Sharing IP Address Dark Data Text Messaging It Issues Alerts Trojan eWaste PC Care Memory Wearable Technology Unsupported Software Processors Conferencing Webinar Hiring/Firing Company Culture Remote Support Java Environment communications Leadership People Webcam Mobile Data Notifications Managed Service Providers Google Wallet Web Marketing Wireless Halloween Physical Security Work Station Help Desk Troubleshooting Unified Communications Crowdsourcing Value Drones Scary Stories 3D Print Server Network Congestion Personal Information Recycling Statistics Government Streaming Media Co-managed IT Refrigeration Budget USB Law Firm IT 5G Monitors Electronic Medical Records Deep Learning Work/Life Balance Business Intelligence Buisness Skype Two-factor Authentication Writing Computer Accessories Consumers Virtual Reality IT service Alt Codes Debate Undo Gadget Collaboration Encryption LinkedIn Bluetooth Office 365 Social Engineering SaaS Typing Admistrator Intranet Google Drive Outsourcing Specifications YouTube Mobile Device Best Available Keyboard Shortcuts Fun Managed IT Services Update Entrepreneur Cryptocurrency Programming Windows 8.1 Update Domains Google Docs Disaster

Latest Blog Entry

How many hours a day do you work? Chances are that, as a business owner, you put in more than the average worker. Your team might put in the requisite eight hours, but you might find yourself putting ...

Latest News

  • Private Screening of The Hobbit III

    By invitation only

    CR&T’s 18th annual client appreciation event: THE HOBBIT III. This is a private pre-screening before the world premiere.

    Location: Thanksgiving Point Theater
    Time: December 16th 8:30AM (REMEMBER THIS IS 1 DAY PRIOR TO THE WORLD PREMIERE) seating is first come.


Contact Us

Learn more about what CR-T can do for your business.


Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#