CR-T Blog

This is some blog description about this site

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Posted by on in IT Blog

Securing your Wi-Fi is More Important Than Ever

Does your Wi-Fi require a secure password to allow users to access your network with their mobile devices? And no, the word "password" is not a suitable password. If your wireless network is easy to gain access to, you are opening up your sensitive data to anyone within range.

Cracking into Wi-Fi networks isn't complicated for anyone who really wants to do it, especially if you are only securing your network with WEP encryption. WEP is the most commonly used encryption available on wireless routers, and it only takes a couple searches on YouTube to find tutorials on cracking WEP Wi-Fi networks to gain access in just a few minutes.

Businesses shouldn't use WEP to secure their wireless networks, but instead should at least use WPA or WPA2. If you aren't sure what type of encryption your wireless network is using, contact CR-T at 801.222.0930 to make sure you aren't leaving yourself open for localized threats. If you know your Wi-Fi doesn't even have a password, we can enable that security for you.

Once a user can log onto your wireless network, they can start using your internet connection, but from there they could possibly be able to get deeper into your network and cause some real trouble for you. While requiring a long, secure password to log devices onto the network is inconvenient, businesses need to enforce this to prevent sensitive corporate data from getting into the wrong hands.

Last modified on
Tagged in: Privacy Security WiFi
My Background has been developing CR&T, an IT services MSP (managed services) and enterprise fulfillment company. I enjoy helping companies and individuals find their way through the thick of things. I think technology is only as good as it is used.


  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Saturday, 30 August 2014



Tag Cloud

Unified Threat Management Small Business Privacy Alerts Alert Twitter Augmented Reality Content Filtering Admistrator Webinar Social Wearable Technology Lithium-ion Battery Mobile Intranet Scheduling Communication History Keyboard Shortcuts Value VPN Maintenance Streaming Media Apps Tutorials Mobile Device IT Solutions Current Events Spam Windows Conferencing Work Station Microsoft Office Tools Phone Systems Remote Monitoring Workplace Tips Administration Document Management Best Practice Cloud Vendor Management Video Surveillance Malware Artificial Intelligence Productivity Business Intelligence Hackers Data Phone System Money Managed Service Provider Big Data IT Support Piracy Fax Server Application Mobile Office Tablet Touchscreen Windows 8.1 Update File Sharing Avoiding Downtime ebay Saving Time Company Culture PowerPoint Display Recycling App User Error Law Firm IT Quick Tips Efficiency The Cloud Bluetooth Help Desk VOIP Technology Gadget Social Networking The Internet of Things Webcam Printer Android Antivirus User Tips Social Media Congratulations People Computer Accessories WiFi Training Java Google Hosted Solutions Facebook Holiday Gaming Console Mouse Computer Best Practices Operating System Smartphones Network Disaster Recovery 3D Mobile Devices Browser It Issues Information Technology Web Marketing Managed Service Providers Mobile Computing Inbound Marketing Point of Sale Outlook Online Currency BYOD Best Available Virus Internet Users Trending Digital Payment Marketing Mobile Device Management PC Care Excel IBM Security Hardware Business Computing Business Continuity Health Microsoft Bring Your Own Device Software Apple Macro Computer Repair IT Services Office Email Gadgets Remote Computing Innovation Save Money Wireless Technology Humor Hard Drives Trojan Server Crowdfunding Memory Samsung Co-managed IT Print Server Net Neutrality Going Green Sports Text Messaging Analytics Upgrade Leadership Windows 8 Firewall Thank You Smartphone Passwords iPhone Router Virtualization IT Consultant Outsourcing Proactive IT Backup Remote Support Skype LinkedIn Miscellaneous Scam Tech Support Customer Relationship Management Business Management Saving Money Statistics


Latest Blog Entry

Understanding Basic Formulas in Microsoft Excel 2013
It can be difficult to keep track of your budget and expenses, especially when prices and needs are always changing. But perhaps the biggest annoyance is the intense paper trail that you leave behind ...
Continue Reading...

Latest News

Our Site Has Launched!


Welcome to Our New Site!
We are proud to announce the unveiling of our new website at CR-T!


Contact Us

Learn more about what CR-T can do for your business.


Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#