Give us a call

Ferrum Technology Services Blog

Ferrum Technology Services has been serving the Elgin area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Who’s Leeching Service from Your WiFi Network?

b2ap3_thumbnail_stealing_my_wifi_400.jpgWireless connections like WiFi can be tricky at times. Either they don’t work, the connection isn’t a very good one, or there are too many people using it for it to be effective. Whatever the reason, you can bet that there are people using your WiFi who shouldn’t be can be. This can lead to many problems including security concerns, slow browsing speeds, and more.

There’s a way to check who’s actively using your network in the form of a free application called Who is On My WiFi. If you’re careless about your network security, you’ll want to be especially cautious about who is lurking behind the scenes. An unsecured network could leave you completely open to attacks from malicious entities.

whos on my wifi

Of course, even those who have encryption are at risk of getting infiltrated by hackers. After all, nobody is completely safe, especially considering the amount of threats on the loose. If you’re careless (and even if you’re cautious) you’re always at risk of a hack. For example, Who is On My WiFi won’t be able to tell you if someone accessed your network before or after the check. It can only tell you what devices are connected at the current moment.

To use this application, follow these instructions.

  • Install the application, Who is On My WiFi.
  • Open the app, then follow the tutorial steps. Your network scan should start.
  • Notice the list of IP addresses connected to your network. Each device should have a MAC address, as well as the local IP address of the modem you use to connect to the Internet.
  • Identify the different devices connected to your network. You’ll have to assign labels to your devices so you can tell which IP address belongs to which device. You can assign labels by using the Description box. Afterward, click Save. If you know your MAC addresses, you’ll have a much easier time identifying which device is which.
  • Look for unknown devices on your WiFi network. If you have some that are connected, you’ll probably want to change your password.

If you have any concerns at all with your business’s wireless network security, Ferrum Technology Services has the solution for you. Our trusted IT technicians can configure your router to lock unwelcome devices out of it, and with our remote monitoring solution, we can analyze your network’s traffic patterns for any out-of-place activity. Just give us a call at (847) 697-3282 to learn more.

How Much is it the Employer’s Responsibility to En...
Tip of the Week: How to Troubleshoot A Failed Back...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, 29 April 2024

Captcha Image

Blog Archive

2024
May
June
July
August
September
October
November
December
2012
January
February
March
April
May
June
July
August
September
October
November
December
2011
January
February
March
April
May
June
July
August
September
October
November
December
2010
January
February
March
April
May
June
July
August
September
October
November
December
2009
January
February
March
April
May
June
July
August
September
October
November
December
2008
January
February
March
April
May
June
July
August
September
October
November
December
2007
January
February
March
April
May
June
July
August
September
October
November
December

Mobile? Grab this Article

QR Code