Microage-Kingston-work-from-home-personal-social-media-scaled

Leaving the back door wide open?

Are your employees leaving the back door wide open?

work-from-home-back-door-open

Most of your employees have wireless networks set up in their homes.  Unlike your business Wi-Fi, many home users are lax about creating secure wireless networks – leaving a backdoor open to hackers.  Wi-Fi signals often broadcast far beyond your employees’ homes and out into the streets.  Drive-by hacking is popular among cybercriminals today. 

 A few tips for securing your employees’ Wi-Fi access points

  • Use stronger encryption and a more complex password 
  • Hide your wireless network name 
  • Use a firewall 

These security measures are not difficult to set up and prevent you from leaving the back door wide open.  If you have any questions or need assistance, we will be happy to help get your employees set up remotely. 

Want more tips for setting up safe Work From Home networks? Check out our free report. Or book a free 15 minute work from home security consultation. 

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

Microsoft windows end of life

Which Microsoft Operating Systems and Applications Are Coming to End of Support and How You Can Prepare

One of the great rules of technology is that it is always advancing. Moving forward also means that older technology cannot be supported forever by…

Read More
microsoft azure

How Microsoft Azure Changed these Businesses

Recent trends indicate that more than 1.2 million websites are adopting the capabilities of Microsoft Azure. Azure’s ability to provide businesses with better management, added security, and…

Read More
email threats

13 Email Threat Types To Know About Right Now

A cyber-attack can have serious consequences for a business depending on the nature of the threat. It can result in a severe financial loss –…

Read More
cyber incident response plan

What Should Be Included In A Cyber Incident Response Plan

Protecting your business against cyberattacks involves ensuring that you have in place the different security layers including protecting the network, patching applications, protecting the endpoints,…

Read More

What the End of Support for Windows Server 2008 Means for You

Cloud services that allow us to store data online are critical to the operations of thousands of businesses around the world. However, as technology marches…

Read More