{"id":44957,"date":"2020-03-16T11:22:28","date_gmt":"2020-03-16T17:22:28","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=44957"},"modified":"2024-02-08T11:42:01","modified_gmt":"2024-02-08T16:42:01","slug":"secure-home-wifi-remote-work","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work","title":{"rendered":"How to Secure a Home WiFi Network for Remote Work"},"content":{"rendered":"\n

Here at JumpCloud, security is built into everything we do. In light of recent events, many of our customers and partners have been looking for guidance on how to maintain network security during a shift toward remote work. Here are six concrete steps for securing a home network that you can share with your employees, straight from one of our own security engineers, Philip Deuchler. <\/em><\/p>\n\n\n\n

1. Own your router and modem instead of renting. <\/h2>\n\n\n\n

Whoever controls your router and modem controls your network. If you don\u2019t own your router or modem, you\u2019re giving someone else that control. Data from every internet-connected device in your home passes through your modem\/router, and internet service providers (ISPs) have been known to sell data collected from their rented devices. And the benefits of buying your own modem\/router go beyond security: you can usually make your money back within a year if you buy instead of rent. <\/p>\n\n\n\n

Your ISP\u2019s website should have a list of compatible modems. This page<\/a> is also a good resource for researching router capabilities.  <\/p>\n\n\n\n

2. Keep your router up to date.<\/h2>\n\n\n\n

Most modem\/router combos make updates easy via a web-based settings panel. Outdated router firmware is a major vector for attackers, especially if you combine that with an insecure internet-connected appliance (think smart home \/ internet-of-things products like Ring cameras, internet-connected Roombas, WiFi-enabled dryers, etc.). <\/p>\n\n\n\n

You can update practically any router by visiting the router\u2019s IP address in a web browser and logging into its admin console. You can almost always find the IP address and default credentials labeled on the bottom of the router. If you\u2019re having trouble finding the default credentials, you can usually turn them up in a quick Google search. And if you’ve changed the credentials before and since forgotten them, you can do a hard reset and then use the default creds. Once you\u2019re logged in, all you should have to do is find the router’s settings menu and click the update<\/em> button. <\/p>\n\n\n\n

3. Ensure your router admin credentials are secure.<\/h2>\n\n\n\n

If you can<\/em> still log into your router\u2019s settings with the default credentials, we recommend changing the password. Hard-to-guess passwords with 32 or more characters are ideal here. You can store this new password in a password manager like LastPass. <\/p>\n\n\n\n

4. Ensure your WiFi network password is strong, and you’re using WPA2 security.<\/h2>\n\n\n\n

Your WiFi password should include numbers and letters, and be longer than 12 characters. You can combine multiple words or phrases to make a secure passphrase that’s possible to memorize. We also recommend using WPA2 security \u2014 this can be changed in your router\u2019s admin console as described in step 2 above. At the minimum, standard WPA is necessary. WEP security, on the other hand, is extremely outdated and easy to crack with just a laptop and some off-the-shelf software.<\/p>\n\n\n\n

5. Remove unnecessary connected devices.<\/h2>\n\n\n\n

Do you really need that internet-connected toaster? And if you do, do you need it open to the outside internet? Probably not. Every connected device in your network is a potential vulnerability, and chances are, your WiFi-connected washing machine doesn’t get security updates as frequently as your MacBook\u00ae<\/sup>. You can reduce risk by reducing the number of connected devices on your home network. Alternatively, think about setting up a separate network for your IoT devices.<\/p>\n\n\n\n

6. Consider periodically rotating your WiFi password.<\/h2>\n\n\n\n

WiFi passwords are like any other password: They’re only good as long as they\u2019re secret. The longer you have the same password, the more people and devices have that password. It’s actually pretty painless to rotate your WiFi credentials, and getting in the habit can be very helpful to your WiFi security. <\/p>\n\n\n\n

Additional Security Measures for Remote Work <\/h2>\n\n\n\n

Looking for additional steps to maximize security in the new era of remote work? One key measure is to use a unique, long, and complex password to log into your Mac or Windows device. On top of that, we recommend protecting your login process with the added layer of multi-factor authentication<\/a>. And, to secure your data in the event your laptop is lost or stolen, it\u2019s important to have full disk encryption<\/a> enabled.\u00a0\u00a0<\/p>\n\n\n\n

Learn how IT admins can implement these measures remotely<\/a> across your entire organization using JumpCloud.\u00a0\u00a0
<\/p>\n","protected":false},"excerpt":{"rendered":"

Take these six concrete steps to ensure that your home WiFi network and asociated hardware is secure and properly configured for remote work.<\/p>\n","protected":false},"author":91,"featured_media":44958,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2337],"tags":[],"collection":[2775,2780],"platform":[],"funnel_stage":[3016],"coauthors":[2529],"acf":[],"yoast_head":"\nHow to Secure a Home WiFi Network for Remote Work - JumpCloud<\/title>\n<meta name=\"description\" content=\"Take these six concrete steps to ensure that your home WiFi network and asociated hardware is secure and properly configured for remote work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Secure a Home WiFi Network for Remote Work\" \/>\n<meta property=\"og:description\" content=\"Take these six concrete steps to ensure that your home WiFi network and asociated hardware is secure and properly configured for remote work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-16T17:22:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-08T16:42:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/03\/secure-home-wifi-network-remote-work.png\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mike Ranellone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Ranellone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work\"},\"author\":{\"name\":\"Mike Ranellone\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/24d4cb0cb7a9c71b168baee4234925c1\"},\"headline\":\"How to Secure a Home WiFi Network for Remote Work\",\"datePublished\":\"2020-03-16T17:22:28+00:00\",\"dateModified\":\"2024-02-08T16:42:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work\"},\"wordCount\":730,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/03\/secure-home-wifi-network-remote-work.png\",\"articleSection\":[\"Best Practices\",\"Remote Work\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work\",\"url\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work\",\"name\":\"How to Secure a Home WiFi Network for Remote Work - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/03\/secure-home-wifi-network-remote-work.png\",\"datePublished\":\"2020-03-16T17:22:28+00:00\",\"dateModified\":\"2024-02-08T16:42:01+00:00\",\"description\":\"Take these six concrete steps to ensure that your home WiFi network and asociated hardware is secure and properly configured for remote work.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/03\/secure-home-wifi-network-remote-work.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/03\/secure-home-wifi-network-remote-work.png\",\"width\":780,\"height\":520,\"caption\":\"How to Secure a Home WiFi Network for Remote Work\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Secure a Home WiFi Network for Remote Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/24d4cb0cb7a9c71b168baee4234925c1\",\"name\":\"Mike Ranellone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/c369c2a0c9f206bb9873a0446a15bcf5\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3db264ca258363eb5ba4360ddf0bed4c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3db264ca258363eb5ba4360ddf0bed4c?s=96&d=mm&r=g\",\"caption\":\"Mike Ranellone\"},\"description\":\"Mike is a writer at JumpCloud who's especially interested in the changing role of tech in society. He cut his teeth in the ad agency world and holds an M.F.A. in creative writing from the University of Colorado-Boulder and a B.A. in English and music from St. Lawrence University in Canton, NY. Outside of JumpCloud, he's an avid skier, cellist, and poet.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Secure a Home WiFi Network for Remote Work - JumpCloud","description":"Take these six concrete steps to ensure that your home WiFi network and asociated hardware is secure and properly configured for remote work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work","og_locale":"en_US","og_type":"article","og_title":"How to Secure a Home WiFi Network for Remote Work","og_description":"Take these six concrete steps to ensure that your home WiFi network and asociated hardware is secure and properly configured for remote work.","og_url":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work","og_site_name":"JumpCloud","article_published_time":"2020-03-16T17:22:28+00:00","article_modified_time":"2024-02-08T16:42:01+00:00","og_image":[{"width":780,"height":520,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/03\/secure-home-wifi-network-remote-work.png","type":"image\/png"}],"author":"Mike Ranellone","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mike Ranellone","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work"},"author":{"name":"Mike Ranellone","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/24d4cb0cb7a9c71b168baee4234925c1"},"headline":"How to Secure a Home WiFi Network for Remote Work","datePublished":"2020-03-16T17:22:28+00:00","dateModified":"2024-02-08T16:42:01+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work"},"wordCount":730,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/03\/secure-home-wifi-network-remote-work.png","articleSection":["Best Practices","Remote Work"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work","url":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work","name":"How to Secure a Home WiFi Network for Remote Work - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/03\/secure-home-wifi-network-remote-work.png","datePublished":"2020-03-16T17:22:28+00:00","dateModified":"2024-02-08T16:42:01+00:00","description":"Take these six concrete steps to ensure that your home WiFi network and asociated hardware is secure and properly configured for remote work.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/03\/secure-home-wifi-network-remote-work.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/03\/secure-home-wifi-network-remote-work.png","width":780,"height":520,"caption":"How to Secure a Home WiFi Network for Remote Work"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/secure-home-wifi-remote-work#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"How to Secure a Home WiFi Network for Remote Work"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/24d4cb0cb7a9c71b168baee4234925c1","name":"Mike Ranellone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/c369c2a0c9f206bb9873a0446a15bcf5","url":"https:\/\/secure.gravatar.com\/avatar\/3db264ca258363eb5ba4360ddf0bed4c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3db264ca258363eb5ba4360ddf0bed4c?s=96&d=mm&r=g","caption":"Mike Ranellone"},"description":"Mike is a writer at JumpCloud who's especially interested in the changing role of tech in society. He cut his teeth in the ad agency world and holds an M.F.A. in creative writing from the University of Colorado-Boulder and a B.A. in English and music from St. Lawrence University in Canton, NY. Outside of JumpCloud, he's an avid skier, cellist, and poet."}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/44957"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/91"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=44957"}],"version-history":[{"count":2,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/44957\/revisions"}],"predecessor-version":[{"id":105574,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/44957\/revisions\/105574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/44958"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=44957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=44957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=44957"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=44957"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=44957"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=44957"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=44957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}