Although the most convenient thing is to start using the Internet as soon as the operator installs the router at home, it does not cost too much to enter its configuration menu and briefly review its settings to ensure that the device is as protected as possible against attempts. hacking. In just a few minutes, we can have it ready, and anyone can do it with hardly any technical knowledge.
From the National Cybersecurity Institute (INCIBE), they have shared an infographic that is very useful to know what these essential settings are that we should have activated to reinforce our router.
There are many times that we have covered news about hacks of this type of home network devices. The most dangerous thing is that they can hack it without us realizing it, and it becomes part of a botnet that spies on our data without our knowledge.
To do the most possible on our part, we can review these 8 aspects of our router:
- Change default passwords.
- Set the best supported security protocol, such as WP2 or WP3.
- Change or hide the network name or SSID.
- Activate MAC address filtering so that only your devices can connect.
- Disable remote access.
- Protect your router’s ports so that there are no open avenues available for hackers.
- Create a network of guests to use at specific times.
- Make sure to update your router firmware whenever a new version is released.
To do these checks, you can enter the router’s configuration, connecting to it and entering the address in the browser of your mobile or PC, which is almost always written on a sticker on the back of the device. In any case, it is usually [192.168.1.1] either [192.168.0.1]. You will have to enter a username and password that should also be detailed on the router, and if not, your operator can provide them to you.
Reduce attack surface
In large part, what it is about is reducing the attack surface, which is nothing more than the number of ways through which a cybercriminal could access our router. By limiting the number of ports, determining the specific MAC addresses that are allowed to connect, and disabling remote access, we reduce the paths that a hacker could use to acquire information about or connect to the device.
If we make all these adjustments, you would only have to keep in mind, for example, that when you purchase a new PC, smartphone or other device, you will have to add its MAC address to the router list, so that it can connect.
Likewise, if you are going to use a video game console or a Smart TV, you will have to see which port exactly they are going to use to connect, so that you have it activated. Even so, routers normally have more ports than we will need, hence the usefulness of deactivating them so that they are inaccessible.