Microage-Kingston-work-from-home-personal-social-media-scaled

Leaving the back door wide open?

Are your employees leaving the back door wide open?

work-from-home-back-door-open

Most of your employees have wireless networks set up in their homes.  Unlike your business Wi-Fi, many home users are lax about creating secure wireless networks – leaving a backdoor open to hackers.  Wi-Fi signals often broadcast far beyond your employees’ homes and out into the streets.  Drive-by hacking is popular among cybercriminals today. 

 A few tips for securing your employees’ Wi-Fi access points

  • Use stronger encryption and a more complex password 
  • Hide your wireless network name 
  • Use a firewall 

These security measures are not difficult to set up and prevent you from leaving the back door wide open.  If you have any questions or need assistance, we will be happy to help get your employees set up remotely. 

Want more tips for setting up safe Work From Home networks? Check out our free report. Or book a free 15 minute work from home security consultation. 

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

10 Keyboard Shortcuts That Work in Chrome, Edge, and Firefox Browsers

You can use many of the same keyboard shortcuts when working in Google Chrome, Microsoft Edge, and Mozilla Firefox web browsers. Here are 10 keyboard shortcuts that are handy as well as easy to remember.

Read More

Disinfect Your Devices

How to disinfect your devices and maintain a healthy work environment. MicroAge is dedicated to providing our clients with market-leading business solutions that help them…

Read More
remote-work-it-security

Rethinking Your IT With A Decentralized Workforce – Chapter 1 : Security

With an increasingly remote or hybrid workforce, we must rethink the way you look at your IT. Let’s first examine network security and how to…

Read More
8 actions to avoid ransomware

8 Actions Your Business Can Take Now to Avoid Paying a Ransom Later

The number of ransomware attacks have exploded in 2021. The month of July started out with a big bang when cybercriminals encrypted the data in…

Read More
Microsoft365-vs-AzureVirtualDesktop

Azure Virtual Desktop vs Windows 365: What is the Difference?

As we mentioned in a previous blog Desktop as a Service (DaaS) is a cloud-based offering where the backend is hosted by a third party….

Read More