lutz logo
lutz logo
  • Services
  • News & Insights
  • About
  • Client Portal
Search
  • Services
  • Accounting
  • Advisory
  • Financial
  • M&A
  • Talent
  • Tech
  • Accounting Services
Services
  • Audit & Assurance
  • Client Advisory Services
  • Outsourced Accounting
  • Tax
  • Business Valuation
  • Litigation Support & Forensic
View All
Industries
  • Agribusiness
  • Construction
  • Family Office
  • Healthcare
  • Manufacturing & Distribution
  • Nonprofit
View All
News & Insights
Financial Access Checklist
Guide
Financial Access Checklist

Share this information with your spouse to assure you each have access to manage important financial tasks independently.

Read More
  • Advisory Services
Services
  • Accounting
  • Financial
  • M&A
  • Talent
  • Tech
View All
Resources
The Art of Budgeting
Recording
The Art of Budgeting + Smart Saving Strategies
Learn how to get your finances under control and increase your savings! Hear real-life examples and best practices to secure a successful future.
Watch Now
Business Insights
Comparing Business Valuation Methods
Blog
Comparing Business Valuation Methods: Which is Right for You?
Valuation experts rely on three primary approaches to determine the value of a business: income approach, asset approach, and market approach.
Read More
  • Financial Services
Services
  • Financial Planning
  • Investment Advisory
  • Retirement Plan Services
  • Pooled Employer 401(k) Plan
View All
Resources
  • Lutz Financial Blog
  • Our Team
  • Client Portal
  • Charles Schwab Login
  • Send Files Securely
Contact Us
NEWS & INSIGHTS
Website Featured Content Images
Market Commentary
Financial Market Updates

Read our latest financial market updates and sign up to receive them straight to your inbox.

Read More
  • M&A Services
Services
  • Sell-Side Representation
  • Transaction Advisory
  • Exit Planning
  • Business Valuation
View All
Resources
Selling a C Corporation
Blog
Factors to Consider When Selling a C Corporation

Understand the tax issues affecting both buyers and sellers involved in C corporation merger and acquisition transactions

Read More
Business Insights
Post-Acquisition Checklist
Guide
Post-Acquisition Checklist for a Seamless Transition
To help you navigate this critical period, we've compiled a comprehensive checklist covering key areas that demand attention after the deal closes. 
Read More
  • Talent Services
Services
  • Search & Staffing
  • Outsourced HR
  • HR Consulting
View All
Candidate Resources
  • Job Seeker Process
  • Current Opportunities
  • Lutz Internships
Contact Us
News & Insights
Overcoming Bias in Recruitment
Blog
Unconscious Bias in Recruitment: How to Overcome It
Learn how to take the bias out of recruitment and build a diverse, talented workforce with these tips.
Read More
  • Tech Services
Services
  • Outsourced IT
  • Data Analytics
  • Technology Strategy
  • Software Consulting
View All
Resources
When to outsource your IT
Blog
How to Know When It's Time to Partner with an IT Pro

One day your technology seems manageable, and the next you're wondering if you need more support. Here are the clear signs it's time to outsource your IT.

Read More
Business Insights
Untitled design (1)-Mar-08-2024-08-50-35-9527-PM
Video
Pella Client Testimonial
"I've used them for valuation work, stock transfers, hosting all of my technology, and now data analytics. I'd say they lead the pack in terms of anticipating what I'm going to need before I even know I need it."
View Now
Business Insights
BLOG
Explore Topics

Get the latest news and insights on relevant topics that matter most to you.

View All
Webinars & Events
Events
Register Today

Register for an upcoming event or access our library of on-demand recordings.

View All
Market Updates
COMMENTARY
Stay Informed

Catch up on market moves with our weekly update, featuring in-depth insights and analysis.

View All
Resources
EBOOKS & GUIDES
Download Now

Take a deep dive into challenging business topics with these free educational resources. 

View All
  • News & Insights
  • Business Insights
  • Webinars & Events
  • Market Updates
  • Resources
Business Insights
BLOG
Explore Topics

Get the latest news and insights on relevant topics that matter most to you.

View All
  • About
About

Lutz is a business solutions firm for people seeking a partner to help energize and heighten economic and organizational success.

Our Company
Our Team
Offices
Careers
Internships
Contact Us
  • Contact
Client Portal

Log in to your relevant client portal to access your account, upload documents, or make a payment.

Make a Payment
Accounting Client Portal
Financial Client Portal
Charles Schwab Login
Send Files Securely
Contact Us
  • Cybersecurity

Is Your Business Wi-Fi Secure?

Dan Mendoza
July 12, 2018
Is Your Business Wi-Fi Secure?

The convenience, flexibility, and agility that a business Wi-Fi network delivers make it an essential networking solution for most organizations today. However, these features can come at a price if the network is not secure. Unsecured Wi-Fi networks leave an organization open to attacks that could lead to the theft of valuable customer information and company data. Just last year, a flaw in the WPA2 protocol resulted in a cyber attack dubbed KRACK, which compromised Wi-Fi security for thousands of organizations. Stolen passwords, hijacked traffic, and malware were only a few of the issues experienced. What's required to avoid these vulnerabilities? Your organization needs a robust Wi-Fi security policy that will protect its network from unauthorized access; without compromising the network availability or productivity for authorized users. In this article, we'll look at four best practices that will help you ensure your business’s Wi-Fi network offers the highest level of protection to your organization.  

 

Which Encryption Protocol is Best?

One of the most important considerations when setting up a business Wi-Fi network is the encryption protocol your network will use. The Wired Equivalent Privacy (WEP) encryption protocol is no longer sufficient for a business network as WEP encryption keys can be cracked easily, often within minutes. WPA2, on the other hand, offers advanced protection that scrambles the encryption key and verifies that it stays the same throughout the data transfer process.  

 

The Importance of Assigning an SSID

The SSID (Service Set IDentifier) allows you to set a name for your network so that it can be found easily by users and applications. Out of the box, all routers have a default SSID. This should be changed before your router starts receiving or transmitting any data. Hackers use what is known as a Rainbow Table to look up default SSID names for thousands of different router models. If a hacker can gain access to a wireless network through its default SSID it makes it easier to attempt to crack your WPA2 encryption. By giving your network an SSID that is difficult for unauthorized users to guess, you automatically add another layer of protection to your network.  

 

Choosing a Robust Password for Your Network

Once you have created a strong SSID for your network, you will need to change the default admin password on your router to a strong password for your pre-shared key. Again, hackers can refer to a Rainbow Table to look up default passwords in the same way they can look up SSID names. The maximum length of a WPA2-PSK password is 64 characters, and you should look to create a long password that contains a combination of capital letters, numbers, and symbols. Since most Wi-Fi devices create a cache of the password, users will usually only need to enter this password once. A good rule of thumb is to set your password to a length of no less than 16 characters.  

 

Is Your Firmware Up to Date?

To ensure that your network is protected against the latest vulnerabilities, such as the KRACK attack, you should ensure that your Wi-Fi router's firmware is up to date. Setting firmware to update automatically will ensure you are protected whenever your router vendor releases a critical patch or routine system update. With these basic tips, you can begin the first step in securing your business's network from future cyber threats. For additional information about our technology services or questions, contact us to see how we can help.

Recent News & Insights

Manufacturing
Tax Considerations for Remodeling or Expanding a Manufacturing Facility
Planning to modernize or expand your manufacturing facility? The tax implications could have a ...
Read More
Market Commentary
Time in the Market + 5.28.25
For anyone interested in following the markets, there has never been a better environment than ...
Read More
Accounting
Tax Highlights of the Proposed “The One, Big, Beautiful Bill”
On May 22, 2025, the U.S. House of Representatives passed a sweeping 1,116-page bill titled ...
Read More
Recent News
Lutz Announces Redemption of Ron Nebbia’s Shares
Lutz, a Nebraska-based business solutions firm, announces the redemption of ownership held by ...
Read More
module-bg-desktop module-bg-mobile

Let’s get you where you want to go.

We work to simplify complexities, help make critical business decisions, and confidently focus on the things that are truly important to you. We embrace your business as our own to spark the right solutions and help you thrive.
Contact Us
Lutz-Logo-white
  • Services
    • Accounting
    • Consulting
    • Financial
    • M&A
    • Talent
    • Tech
  • About
    • Our Company
    • Our Team
    • Offices
    • Careers
    • Internships
    • Current Opportunities
  • Client Portal
    • Make a Payment
    • Accounting Client Portal
    • Financial Client Portal
    • Send Files Securely
    Submit RFP
TOLL-FREE: 866.577.0780 | © Lutz & company, PC 2025 | Privacy Policy
Follow us on Facebook Follow us on LinkedIn Twitter - X Logo Follow us on Instagram Follow us on Facebook