Borrowing + Wireless = Hacking

A residential homeowner mentioned something to me recently that was both alarming and share-worthy! Periodically, an SUV would park at the end of their driveway, and with laptop in hand, the driver would bang away on the keyboard. At my suggestion, when the SUV appeared again, the homeowner disconnected the residential wireless router, and the SUV quickly drove away.

We will never know the truth behind the hard-working SUV owner; but the scenario described should serve as a reminder to all of us about the risks associated with the use of wireless internet/intranet networks.

It is true that the internet has provided us a means to streamline our lives by providing access to a vast amount of information. But this convenience provides a simple vehicle for opportunity. An individual pirating your wireless network could access unethical websites, perform illegal activities and/or acquire sensitive data, which would be traced back to your computer via your network address registered in your name. Network addresses are similar to driver’s license numbers or social security numbers…the owner is identifiable. And there is a high probability that you will be held responsible for the activity.

Common utilities and software exist; some free of charge that easily allows hijackers to pirate your login. However, recognize that no system of control is fail-proof. Below are some simple practices to ward-off wireless hijackers:

  1. Educate yourself on the threats and practices. The hackers’ motto: “ignorance is bliss.” Being uninformed is an invitation.
  2. Know what technology you are using and whether the technology is current or dated.
  3. Change commonly known factory configuration settings:
    1. Administrator password
    2. SSID
  4. Disable SSID broadcasting
  5. Use the strongest encryption available for your computer.
  6. Use router firewalls.
  7. Change your passwords frequently.
  8. Keep your antivirus and firewall software on all computers attached to the network up to date.
  9. Strategically position the router to reduce access points from intruders outside of the home/business (signal will carry only so far, so be aware of how far your signal travels).
  10. Take the router access point down during periods of infrequent or non-use.
  11. Be proactive - observe your surroundings.

It is critical that you are vigilant in protecting access and monitoring threats.

© 2013 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

This advice is not intended or written to be used for, and it cannot be used for, the purpose of avoiding any federal tax penalties that may be imposed, or for promoting, marketing or recommending to another person, any tax related matter.


our thoughts on

array(1) { [0]=> string(2) "11" }
Artificial Intelligence in Higher Education
Why Higher Education Institutions Must Comply with GDPR
Minimizing Higher Ed Risks - Utilizing Internal Audit and Data Analytics
Enterprise Risk Management in Higher Education, and How Internal Audit Can Help
Financial Institutions - Regs on Regs on Regs
RPAs Have a Role in SOX Cost Reduction and Efficiency

Register to receive our weekly newsletter with our most recent columns and insights.

Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us

contact us

Map of Pittsburgh Office

One PPG Place, Suite 1700
Pittsburgh, PA 15222
p:412.261.3644     f:412.261.4876

Map of Columbus Office

65 East State Street, Suite 2000
Columbus, OH 43215
p:614.621.4060     f:614.621.4062