Wolf TG Blog | Business IT Insights

How Hackers are Using GPUs to Crack WPA2 WiFi Passwords

Posted by Gregory Wolf on Mar 29, 2016 8:00:00 AM

Did you know WiFi can provide hackers with access to your network resources without the perpetrators ever stepping foot inside of your office building? That's a scary prospect, considering the fact that your business could become a victim of a cyber crime without the hacker leaving a shred of physical evidence.

You've probably heard that WPA2 is the most secure wireless networking encryption scheme on the market today. While this is generally true, WPA2-PSK still has its fair share of security risks. For example, did you know that a hacker can rapidly speed up the process of bruteforcing your wireless networking password by using a powerful GPU that can be found inside of a high end graphics card? Learn what this means for your business:

Read More

Topics: Wireless

Why is My Wireless Connection Weak?

Posted by Gregory Wolf on Mar 15, 2016 8:00:00 AM

Don't you just hate it when your WiFi signal icon reads only 1 or 2 bars? It could be even more troublesome if the connection doesn't show at all, leaving you to walk around the building looking for a stronger signal.

WiFi connectivity problems always seems to happen when users need to rapidly connect to the corporate WiFi in order to pull up a presentation, an important document, or a website during a collaboration session.

In these scenarios, having a weak WiFi presence not only impacts corporate productivity, it also harms the image of the IT department, which has seemingly failed in providing a reliable WiFi service.

Read More

Topics: Wireless

Is My Wireless Network Really Secure?

Posted by Gregory Wolf on Mar 8, 2016 8:00:00 AM

When you setup a wireless network for your small business, it is important to implement the best practices of wireless security in order to deliver a positive experience for your end users. After all, a malicious hacker could potentially sit in the parking lot of your business and hack your network, if the proper precautions haven't been taken. This begs the question: Is your wireless network really secure?

Read More

Topics: Wireless

Should Your Business Upgrade to Enterprise Wireless?

Posted by Gregory Wolf on Mar 1, 2016 9:00:00 AM

As your business begins to expand, the scope of the services that you must provide to guests and users will have to grow with it. One of the critical services that small businesses often struggle with providing is wireless network access.

At first glance, it may seem like businesses are reinventing the wheel with providing wireless network access. After all, you can buy a low-end wireless router for about $30 at your local computer hardware store. Couldn’t you just buy one, plug it in, and effectively extend your organization’s wireless infrastructure?

While going the cheap route may seem like a suitable solution, businesses can gain tremendous benefits by implementing an enterprise grade wireless network infrastructure. Before we go any deeper into this topic, let's first look at what constitutes an enterprise wireless solution.

Read More

Topics: Wireless

Demystifying the Differences Between Wireless G, Wireless N, and Wireless AC Networks

Posted by Gregory Wolf on Feb 23, 2016 10:49:51 AM

When you build out a wireless network, it is important to consider the different types of wireless broadcasting methods available.

It can be difficult to decipher the difference between Wireless G, Wireless N, and Wireless AC. In this guide, we'll demonstrate the differences of the various wireless transmission standards, and translate that into what you need to know for your enterprise wireless deployment.

Read More

Topics: Wireless

5 Strategies for Wireless Network Security

Posted by Gregory Wolf on Feb 16, 2016 8:00:00 AM

At Wolf Technology Group, we can help your business with everything from network design to remote monitoring. While we can’t determine what websites you visit, how you protect your internal server closet, or maintain total control over your outgoing wireless network, we can suggest some ways you can maintain IT security by protecting your wireless network.

Read More

Topics: Wireless

A Fixed Wireless Broadband Connection May be the Solution You've Been Looking For!

Posted by Gregory Wolf on Feb 2, 2016 8:00:00 AM

Is your business expanding faster than you expected, leaving you trying to figure out how to keep several buildings worth of employees all operating on one Local Area Network (LAN)? Or are you trying to start a company in a less-developed area where wired infrastructure just isn't an option? Before you get too stressed and declare it "impossible" to find a solution, there is actually a simple, cost effective fix for these situations called a fixed wireless broadband connection.

Read More

Topics: Wireless

Does Your Business Need a 5.8 GHZ Wireless Router?

Posted by Gregory Wolf on Jan 26, 2016 8:00:00 AM

It's probably safe to say that you didn't wake up this morning thinking about the channel your business class router operates on. But, if you've been suffering from slow or inconsistent web connections and have been wondering why, it turns out you were thinking about your wireless channel, you just didn't know it! If your wireless connection isn't what it used to be, you may only need to make one simple change.

Read More

Topics: Wireless

How To Secure Your Wireless Network

Posted by Gregory Wolf on Nov 3, 2015 4:56:00 PM

Did you know that if an infected computer connects to your wireless network, it could put the other devices on your network at risk?

Not only that, malicious parties can always launch attacks over the internet using your originating IP address. Do you know what's currently being sent out over the internet through your wireless router?

It's important to implement security measures that ensure the utmost safety for your WiFi networks. Hackers are more sophisticated than ever in their efforts to steal information being broadcast over wireless networks. Therefore, it's imperative that you take proper precautions in order to secure your wireless networks from those with malicious intent.

Read More

Topics: Networks, Wireless