CR-T Blog

This is some blog description about this site

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Posted by on in IT Blog

Securing your Wi-Fi is More Important Than Ever

Does your Wi-Fi require a secure password to allow users to access your network with their mobile devices? And no, the word "password" is not a suitable password. If your wireless network is easy to gain access to, you are opening up your sensitive data to anyone within range.

Cracking into Wi-Fi networks isn't complicated for anyone who really wants to do it, especially if you are only securing your network with WEP encryption. WEP is the most commonly used encryption available on wireless routers, and it only takes a couple searches on YouTube to find tutorials on cracking WEP Wi-Fi networks to gain access in just a few minutes.

Businesses shouldn't use WEP to secure their wireless networks, but instead should at least use WPA or WPA2. If you aren't sure what type of encryption your wireless network is using, contact CR-T at 801.222.0930 to make sure you aren't leaving yourself open for localized threats. If you know your Wi-Fi doesn't even have a password, we can enable that security for you.

Once a user can log onto your wireless network, they can start using your internet connection, but from there they could possibly be able to get deeper into your network and cause some real trouble for you. While requiring a long, secure password to log devices onto the network is inconvenient, businesses need to enforce this to prevent sensitive corporate data from getting into the wrong hands.

Last modified on
Tagged in: Privacy Security WiFi
My Background has been developing CR&T, an IT services MSP (managed services) and enterprise fulfillment company. I enjoy helping companies and individuals find their way through the thick of things. I think technology is only as good as it is used.


  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Thursday, 31 July 2014



Tag Cloud

Mobile Computing VOIP Co-managed IT Remote Monitoring Router Windows Malware Cloud Intranet Users Hardware Social Networking Wearable Technology Congratulations Fax Server Marketing Mobile Devices Help Desk Outlook Apple Bluetooth Health Spam Privacy Touchscreen Current Events Tech Support WiFi Business Intelligence Web Marketing Windows 8 Recycling Online Currency Browser Holiday 3D Tools IBM Wireless Technology Security Antivirus Information Technology Computer Repair Law Firm IT User Tips Conferencing Customer Relationship Management Microsoft Office App Piracy Passwords Leadership Workplace Tips Office Scam Artificial Intelligence ebay IT Consultant Mobile Computer Computer Accessories Lithium-ion Battery Work Station Alert Skype Managed Service Providers Mobile Office Business Management Macro Scheduling Hosted Solutions Printer Sports Phone System PC Care Admistrator Bring Your Own Device User Error Alerts Digital Payment PowerPoint Video Surveillance Remote Support File Sharing Saving Time Remote Computing Network Disaster Recovery Avoiding Downtime VPN Gadget Email Administration Tablet Smartphones Innovation Thank You Gaming Console Keyboard Shortcuts Hackers Business Computing Best Available Miscellaneous Saving Money Text Messaging Software It Issues Quick Tips Java Windows 8.1 Update Apps Excel Mobile Device Management Value Outsourcing Augmented Reality Best Practice Print Server Virus Upgrade Save Money Display Point of Sale BYOD Webcam Internet Backup LinkedIn Technology Tutorials Gadgets IT Services Microsoft Efficiency Phone Systems Firewall Managed Service Provider Mouse IT Support Business Continuity History Analytics Proactive IT Going Green The Internet of Things Trojan Server Virtualization Unified Threat Management Vendor Management Trending Communication Humor Company Culture Social Operating System Small Business Android Inbound Marketing Training Maintenance Webinar The Cloud Productivity Best Practices Facebook iPhone Samsung Mobile Device Content Filtering Smartphone Application Twitter Document Management Google Hard Drives IT Solutions Social Media Streaming Media Data Net Neutrality


Latest Blog Entry

A Teenage Girl’s Phone Explodes! [VIDEO]
Any user of the latest mobile technology may have noticed their device running a little hot. In normal circumstances, a device that's warm to the touch is nothing to be concerned about. Although, ther...
Continue Reading...

Latest News

Our Site Has Launched!


Welcome to Our New Site!
We are proud to announce the unveiling of our new website at CR-T!


Contact Us

Learn more about what CR-T can do for your business.


Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#