CR-T Blog

CR-T has been serving the Orem area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Securing your Wi-Fi is More Important Than Ever

Does your Wi-Fi require a secure password to allow users to access your network with their mobile devices? And no, the word "password" is not a suitable password. If your wireless network is easy to gain access to, you are opening up your sensitive data to anyone within range.

Cracking into Wi-Fi networks isn't complicated for anyone who really wants to do it, especially if you are only securing your network with WEP encryption. WEP is the most commonly used encryption available on wireless routers, and it only takes a couple searches on YouTube to find tutorials on cracking WEP Wi-Fi networks to gain access in just a few minutes.

Businesses shouldn't use WEP to secure their wireless networks, but instead should at least use WPA or WPA2. If you aren't sure what type of encryption your wireless network is using, contact CR-T at 801.222.0930 to make sure you aren't leaving yourself open for localized threats. If you know your Wi-Fi doesn't even have a password, we can enable that security for you.

Once a user can log onto your wireless network, they can start using your internet connection, but from there they could possibly be able to get deeper into your network and cause some real trouble for you. While requiring a long, secure password to log devices onto the network is inconvenient, businesses need to enforce this to prevent sensitive corporate data from getting into the wrong hands.


No comments yet
Already Registered? Login Here
Friday, 30 September 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Business Management Microsoft Tip of the Week Internet Saving Money Privacy Small Business Workplace Tips Managed Service Provider Hardware Backup Software Mobile Office Quick Tips Productivity Cloud Data Social Media Gadgets Hackers Best Practices Email Business Computing Google Users Malware Mobile Devices Network Virtualization Hosted Solutions IT Services Windows Business Upgrade Microsoft Office IT Support Computer Communication VOIP Passwords Smartphones WiFi Miscellaneous Windows 10 Business Continuity Efficiency Smartphone Innovation Holiday Disaster Recovery Mobile Device Management Marketing User Tips Server Vendor Management Facebook Best Practice Office Remote Computing Android Current Events Apple Operating System Bring Your Own Device Mobile Computing Browser Outlook Spam App Alert Going Green Lithium-ion Battery Apps Trending The Internet of Things Remote Monitoring History Health Wireless Technology Content Filtering Information Technology Ransomware Big Data Tutorials Gmail Windows 8 Printer Customer Relationship Management Humor IT Solutions Fax Server Save Money IT Consultant Application Maintenance Computer Repair Avoiding Downtime Saving Time Office Tips Password Social Artificial Intelligence Robot Automation Unified Threat Management Excel Internet of Things Retail Network Security Hard Drives Google Analytics Hacking Computers Business Growth Money Sports Proactive IT Antivirus Data Management Digital Payment Customer Service The Cloud BYOD PowerPoint User Error Presentation Administration Tech Support Virus Router iPhone Inbound Marketing Phone System Firewall Education Augmented Reality Laptop Touchscreen Hacker How To Competition Risk Management Mouse Data storage IBM Upgrades Safety Twitter Bandwidth Point of Sale Phishing Printing Mobile Net Neutrality Hosted Solution Recovery Computing VPN Wi-Fi Settings User Tablet End of Support Business Owner Social Networking Running Cable Search Display LiFi Video Surveillance Tools Analyitcs Cybercrime Downtime Website Legal Piracy Samsung Cortana Chrome Employer-Employee Relationship Public Speaking Google Drive It Issues Crowdfunding Trojan Knowledge Managed IT Services YouTube Cryptocurrency Licensing Webinar Update Bluetooth Google Docs Online Currency Webcam Java Experience Word Bitcoin Save Time Mobile Device Web Marketing Chromebook IP Address Memory Help Desk eWaste Virtual Desktop Emoji Hacks Hiring/Firing Training Storage Company Culture Environment People 3D Printing Black Market Phone Systems Co-managed IT Wireless Dark Data Troubleshooting ebay Gaming Console Unsupported Software Processors Document Management communications Text Messaging Statistics Mobile Data File Sharing Wearable Technology Refrigeration Google Wallet Alerts USB PC Care Gadget 5G Conferencing Halloween Unified Communications Admistrator Physical Security Drones Remote Support Leadership Outsourcing Skype Two-factor Authentication Network Congestion Managed Service Providers Consumers Scary Stories Keyboard Shortcuts IT service Debate Personal Information Undo Budget Work Station Collaboration LinkedIn Office 365 Monitors Value Scheduling Deep Learning 3D Scam Electronic Medical Records Print Server Recycling Macro Intranet Best Available Fun Writing Streaming Media Specifications Buisness Entrepreneur Alt Codes Programming Virtual Reality Law Firm IT Domains Disaster Windows 8.1 Update Social Engineering Business Intelligence Encryption Typing Computer Accessories SaaS

Latest Blog Entry

Moving to the cloud is not an easy task, and it’s certainly not a process that will be the same for every SMB. Therefore, you need to be open to adaptation as the process wears on. Unplanned-for issue...

Latest News

  • Private Screening of The Hobbit III

    By invitation only

    CR&T’s 18th annual client appreciation event: THE HOBBIT III. This is a private pre-screening before the world premiere.

    Location: Thanksgiving Point Theater
    Time: December 16th 8:30AM (REMEMBER THIS IS 1 DAY PRIOR TO THE WORLD PREMIERE) seating is first come.


Contact Us

Learn more about what CR-T can do for your business.


Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#