facebook linkedin twitter

Computerware Blog

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Your Router

When looking to set up a Wi-Fi connection, the first variable you need to consider is your hardware. Obviously, you have a modem that connects to the line the cable company has run into your office. Today, many cable companies have started to deliver modem/router combos that have a lot of utility for individuals. The cable company will charge a small rental fee each month, but you have one device for your Internet and Wi-Fi needs. 

For the small business, you need to take a little more care, and therefore the modem/router combo isn’t probably going to work for your purposes. In fact, to be safe, businesses should purchase their own modem and their own routers (and any other hardware they’ll need). The reason is that the more control over the hardware a business owner or IT admin has, the more that hardware will be just the right specifications for that business’ needs. 

Tip #1 - Get the Router Your Business Needs

For the small business a good router will run between $200-to-$1000 and you will get what you pay for. Your IT administrator or one of the technicians from Computerware can help you determine what hardware your business needs and justify their expense over the small fee charged by the cable company for the modem/router combo.

A good small business router should have the following options:

  • WPA protection - Your business’ router needs to enhance network security. The router should have Wi-Fi Protected Access encryption built-in (WPA, WPA2, WPA3)  and also have a built-in firewall.
  • Multiple band support - Most routers today come with dual-band support built in. Depending on where your router is placed using both the 2.4 Ghz and the 5.0 Ghz bands can enhance your Wi-Fi network extensively. 
  • Multiple LAN and WAN Ports - A good rule of thumb is that you want at least three local area network (LAN) ports and at least one wide area network (WAN) port. 
  • Virtual Private Network - The VPN built into the router allows for additional encryption to be made to data when it’s sent and received.
  • Speed through protocol support- Your business’ router has to support fast and secure wireless connections. That means it at least has to support the 802.11n protocol. Most modern routers will support the 802.11ac protocol, which is markedly faster.
  • Gigabit ports - Some devices should be connected directly into the router. For these systems, you need fast ethernet connections available. 

Tip #2 - Router Placement

Once you get the hardware that you’ll need, you need to know where to put the router to get the best wireless signal possible. You may purchase the top-tier Internet package from your ISP, but unless you set your hardware up correctly, you will be wasting money. You will want to make sure to do the following things to help you get the speeds that you pay for:

  • Pick a central location - Obviously, the more centralized your router is placed, the better.
  • Raise it off the floor - The higher up you can install your router the fewer obstructions you will likely have.
  • Don’t place the router near other electronics - The more obstructions, the worse your signal strength will be. Some electronics, like microwaves, can interfere with 2.4 GHz bands.
  • Map out signal before installing everything - If you have a router that doesn’t cover the breadth of your property, you should map out your Wi-Fi strength so you know where extenders will be the most helpful. 

We hope this article will help you get the hardware you need for your uses and assist you in planning how you are going to have to set up that hardware in order to get the most out of your Wi-Fi connection. For more great tips and tricks, return regularly to our blog.

Let’s Take a Look at a Few 2021 Business Trends
You Have to Patch Your Software


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 23, 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Managed Service Provider Hosted Solutions Email Productivity IT Services Malware Efficiency Saving Money Innovation Google Small Business Computer User Tips Collaboration IT Support VoIP Data Backup Quick Tips Smartphones Network IT Support Data Recovery Mobile Devices communications Business Continuity Android Microsoft Office Gadgets Disaster Recovery Communication Cybersecurity Phishing Smartphone Social Media Upgrade Mobile Office Server Mobile Device Virtualization Miscellaneous Passwords Windows Managed IT Services Users Mobile Device Management Ransomware Holiday Operating System BDR Vendor Management Outsourced IT Apps Internet of Things Windows 10 Tech Term Facebook Remote Monitoring Automation Unified Threat Management BYOD Analytics Data Management Managed IT services Covid-19 Mobile Computing WiFi Remote Computing Apple Windows 10 Save Money Marketing Help Desk Cloud Computing Artificial Intelligence History Managed Service Spam The Internet of Things Training Browser Firewall Business Technology Bandwidth Alert Encryption Big data Health App Information Technology Office Office 365 Budget Two-factor Authentication IT Consultant Going Green Information VPN Managed IT Maintenance Bring Your Own Device Access Control Printer Antivirus Networking Windows 7 Wi-Fi Gmail Blockchain Government Hard Drives Content Filtering Cybercrime Lithium-ion Battery Retail Best Practice Outlook Computers Windows 8 Saving Time Cost Management Remote Work Healthcare Wireless Technology Virus Tech Support Search Document Management Hiring/Firing Recovery Employer-Employee Relationship IBM Project Management Hacking Augmented Reality Travel Education Humor Update Risk Management Vendor Customer Service Data Security It Management Avoiding Downtime Conferencing Patch Management Money Storage Data Loss Phone System iPhone Computing Computer Repair Running Cable Data Breach Proactive IT End of Support File Sharing Voice over Internet Protocol Password Law Enforcement Hard Drive Value Customer Relationship Management Solid State Drive Hacker Mobility Intranet Compliance Twitter Data storage PowerPoint Flexibility Meetings Administration Laptop Applications Legal Remote Save Time Wireless Router Downtime Regulations Website Current Events SaaS Hosted Solution Word Robot Social Networking Excel Securty Cortana Digital Management Google Maps Websites Fax Server Vulnerabilities Social Engineering Employee/Employer Relationship Black Market Software as a Service Cryptocurrency Cooperation User Business Growth Private Cloud Net Neutrality Virtual Desktop Chrome Social Business Intelligence Telephony Digital Payment DDoS Machine Learning Paperless Office Telephone Systems Scam Employees Sports Comparison Tablet Company Culture Disaster Monitoring Mouse Integration eWaste Evernote Identity Theft Holidays Multi-factor Authentication Notifications Programming Statistics IT service Virtual Assistant Network Congestion Telephone Managed Services Provider Lifestyle Start Menu Tech Terms Politics Display Virtual Reality Emails Gaming Console Processors Mobile Technology Automobile How To Bluetooth Chromebook Streaming Media Managed Services USB Presentation Uninterrupted Power Supply Managed IT Service Text Messaging Computing Infrastructure Hack Webcam Vulnerability Google Docs How To Memory Download Experience Specifications Safety Bitcoin Cleaning Data Protection Distribution Processor Monitors Documents Office Tips Microchip Taxes Entertainment Downloads Inbound Marketing Teamwork Heating/Cooling Smart Devices Cost Computer Accessories YouTube Time Management Solutions Distributed Denial of Service Professional Services eCommerce Unified Communications Settings User Error Pain Points Video Conferencing Co-managed IT Public Cloud Trending Licensing Redundancy Botnet Domains VoIP Communitications Legislation Webinar Error Tech Relocation Hypervisor Tablets Touchscreen News PCI DSS IT Plan Enterprise Resource Planning Banking Knowledge Shopping Accountants A.I. Fileless Malware Hybrid Cloud Archive Consultation Supply Chain Management email scam Addiction Sync Skype Permissions Public Speaking Language AI Proxy Server Azure CCTV Upselling Technology Tips Internet Service Provider Modem Strategy Shortcut Business Metrics Transportation Computer Malfunction Point of Contact Troubleshooting Music Audit IT Assessment Wireless Headphones Term Reliable Computing Video Surveillance switches Entrepreneur Writing Fake News Regulations Compliance Migration Connected Devices Electronic Medical Records HIPAA Gig Economy Equifax Fleet Tracking Directions Environment Upgrades Data Warehousing Remote Working Network Management Recording In Internet of Things Optimization Saving ZTime Hard Drive Disposal Supply Chains Device security Best Practives MSP Dark Web Free Resource Electronic Payment Access SSID LiFi Competition Emergency Finance Health IT Motion Sickness Analytic Harddrive Business Owner Computer Care Electronic Health Records Nanotechnology Social Network Processing Scalability Recycling Debate Microsoft Excel Financial Data Desktop IP Address Work/Life Balance Memes Smartwatch Startup Asset Tracking Messenger Wasting Time Tracking GPS Deep Learning Google Drive Windows Server 2008 Business Cards Service Level Agreement Microserver Logistics Virtual Machines Product Reviews 2FA Username Bookmark Rental Service Read Human Resources Spyware Mobile Payment Managing IT Services Unified Threat Management Backup and Disaster Recovery Cyber security External Harddrive Visible Light Communication Application Get More Done Gamification Employer/Employee Relationships Web Server Electricity Printing Surveillance Screen Reader Customer Resource management Google Play Telephone Service Cabling IT consulting Telework Thin CLient IT Smart Tech Printer Server Books Managing Costs Device Management Workers 3D Ebay Remote Workers Piracy Upload Turn Key Microsoft 365 Administrator HTML Trojan Browsers Supercomputer Content Management CIO cache Television Virtual Private Network Fiber-Optic Database Medical IT Trend Micro Business Managemenet Smart Phones Digital Signature Advertising Flash Mobile Security User Tip Proactive Maintenance Staffing Google Wallet WannaCry Development Organize Telephone System Security Cameras Threats Worker Windows XP FinTech Leadership Society Corporate Profile Multi-Factor Security Navigation Reading Virtual Machine Samsung online Currency Adminstration Pirating Information Displays Freedom of Information Data Storage Software License Trends Reviews Devices Data Analysis Employer Employee Relationship PDF Micrsooft Assessment SharePoint Procurement Fraud Tactics G Suite Organization UTM Content Printers Hacks SQL Server Physical Security Drones Google Calendar GDPR Managing Risk LinkedIn Best Available Keyboard Tip of the week Capital Productuvuty Personal Information 3D Printing CES Financial Managing Stress Regulation CrashOverride