WPA2 is table stakes — but most networks stop there. Encryption protocol, password strength, router firmware, broadcast settings, firewall rules: every one of these is a door. We make sure they're all locked.

The Most Common Wi-Fi & Firewall Mistakes

These show up in nearly every home and small business we visit. Any of these sound familiar?

Default Router Password

Most routers ship with a default admin password like admin / admin or printed on a sticker. Anyone who gets on your network can access your router settings.

Fix: Change the admin username and password immediately after setup. Use something long and unique.
No Guest Network

When visitors connect to your main network, they're on the same network as your computers, phones, and smart devices. A compromised guest device can potentially reach everything else.

Fix: Set up a separate guest Wi-Fi — internet access only, no access to your main network devices.
Outdated Router Firmware

Router firmware updates patch known security vulnerabilities. Most people install their router once and never update it — leaving known exploits open for years.

Fix: Check your router's admin panel for firmware updates, or enable automatic updates if supported.
WPS Enabled

Wi-Fi Protected Setup (WPS) is a convenience feature that's been broken for years. It lets attackers brute-force their way onto your network in hours using freely available tools.

Fix: Disable WPS in your router settings. You'll connect new devices the old-fashioned way — by typing the password.
Remote Management On

Many routers have remote management enabled by default, allowing the admin panel to be accessed from the internet. Unless you specifically need this, it's an unnecessary exposure.

Fix: Disable remote management in your router settings unless you have a specific need for it.
Weak or Shared Wi-Fi Password

Short, simple passwords are cracked quickly. And when you've shared your Wi-Fi password with a dozen people over the years, you've effectively lost control of who has it.

Fix: Use a 16+ character random passphrase. Change it when employees leave or if you've shared it widely.

Frequently Asked Questions

WPA2 and WPA3 are Wi-Fi encryption standards. WPA3 is newer and significantly more secure — it uses stronger encryption and protects against offline dictionary attacks that can crack WPA2 passwords.

If your router supports WPA3, we recommend enabling it (or WPA2/WPA3 mixed mode if some of your devices are older). If your router only supports WPA2, keeping a strong, long password is your best defense.

For most homes and small businesses, a properly configured router firewall is sufficient. The key word is properly configured — most aren't.

A dedicated hardware firewall (like a pfSense or Ubiquiti device) offers more granular control and is worth considering for businesses with sensitive data or multiple employees. We'll give you an honest recommendation based on your actual risk level — not an upsell.

Most routers have a "connected devices" page in their admin panel. You can compare that list to devices you recognize. Free tools like Fing (available as a phone app) also scan your network and show everything connected.

If you see something you don't recognize, don't panic — it's often a device you forgot about. But if you can't account for it, changing your Wi-Fi password immediately removes any unauthorized access.

Hiding your SSID (network name) provides minimal security benefit — any basic scanning tool will still detect the network. It also makes your own life more annoying when connecting new devices.

A strong, unique password does far more for your security than hiding the network name. We generally don't recommend it as a security measure, though there's no harm in doing it.

There's no fixed schedule — but you should change it when: an employee or tenant who had it leaves, you've shared it with a lot of people over time, or you suspect unauthorized access.

If you have a guest network (you should), that password can be changed more freely since guest devices won't need to "remember" it the same way your personal devices do.

DNS filtering works by blocking known malicious domains before your browser can even reach them. Think of it as a blocklist that operates at the network level — covering every device on your network at once.

For businesses with employees browsing the web, it's a highly effective, low-cost layer of protection. Services like Cloudflare Gateway or Cisco Umbrella offer free or affordable tiers. We can set this up for you as part of a network hardening engagement.


Ready to Lock Down Your Network?

We'll audit your current Wi-Fi and firewall configuration and fix every gap we find. Start with a free consultation.