Anyone who likes to access the network wirelessly at home should generally pay attention to a few security aspects.

As our cooperation partner checked4you advises, when it comes to internet security you shouldn't play the self-service shop for neighbors and passers-by.

Being able to access the Internet on the balcony, during breakfast or from the toilet is great.

At the same time, however, the misuse can be unpleasant for the connection owner: If someone uses your WLAN for illegal file sharing or worse, that could become your problem or that of your parents.

The federal government has largely abolished this principle of “troubleshooting liability”, but risks still remain - and in addition, with open WiFi networks, there is still the risk that strangers will take the files or devices from your computers, tablets, smartphones, etc infect with viruses.

Then it's better to secure yourself. And like this:

First of all:

It's better not to trust the factory settings , but rather make your own settings! Routers from one manufacturer can all have the same standard password or can even be set to “Universal Plug&Play” so that they can be accessed by everyone.

Router password:

As I said, it's best to change your password immediately the first time you use it, but then use one that is as secure as possible! more about choosing the right password here .

Encryption:

Probably the most important thing in the whole story. It is important to set up WPA2 encryption (also known as 802.11i). So not just “WPA” and certainly not “WEP”. WEP in particular is all too easy to crack.

MAC address:

It has nothing to do with Apple, but stands for “Media Access Control”. This is, so to speak, the individual chassis number of a network card that is used to access the router. You can set on the router that only certain WLAN cards are allowed to access and which ones they are. To do this, enter the corresponding MAC address(es) in the router menu.

Switch off:

The radical method, so to speak “WPA7”. Some routers offer the option of setting specific shutdown times (e.g. at night). Or they simply have a switch for it. But at least one cable that can be pulled out – which also saves energy .

Firmware update:

It doesn't hurt to update the router's operating software from time to time. This allows new functions to be gained or security gaps to be closed. The security vulnerability in the WPA2 protocol known as “KRACK” has e.g. B. impressively demonstrated how important such security updates can be. It should usually be enough to simply google the exact router name or search on the manufacturer's website to find what you are looking for. At best, the router even offers an “automatic updates” function where it automatically downloads and installs the firmware from the provider.

So, if you want to know more, you can find more detailed information at the Federal Office for Information Security:


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )