{"id":82,"date":"2024-09-23T16:38:38","date_gmt":"2024-09-23T16:38:38","guid":{"rendered":"https:\/\/computerbasicshub.net\/?page_id=82"},"modified":"2025-06-24T20:59:18","modified_gmt":"2025-06-24T20:59:18","slug":"modemsecurity","status":"publish","type":"page","link":"https:\/\/computerbasicshub.net\/index.php\/modemsecurity\/","title":{"rendered":"Modem Security"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-container-core-group-is-layout-4 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-group alignwide has-base-2-background-color has-background is-layout-flow wp-block-group-is-layout-flow\" style=\"border-radius:16px;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group alignwide has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<!DOCTYPE html>\n<html>\n<head>\n\t<meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\"\/>\n\t<title><\/title>\n\t<meta name=\"generator\" content=\"LibreOffice 7.6.0.3 (Windows)\"\/>\n\t<meta name=\"created\" content=\"2022-06-23T16:56:59.349000000\"\/>\n\t<meta name=\"changed\" content=\"2023-11-27T16:01:36.598000000\"\/>\n\t<style type=\"text\/css\">\n\t\t@page { margin: 2cm }\n\t\ttd p { line-height: 115%; margin-bottom: 0.25cm; background: transparent }\n\t\tp { line-height: 115%; margin-bottom: 0.25cm; background: transparent }\n\t<\/style>\n<\/head>\n<body lang=\"en-US\" dir=\"ltr\"><p style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"center\" style=\"margin-bottom: 0cm\"><b>Modem Security<\/b><\/p>\n<dl><dd>\n\t<table width=\"770\" cellpadding=\"0\" cellspacing=\"0\" style=\"page-break-inside: avoid\">\n\t\t<col width=\"770\"\/>\n\t\t<tr>\n\t\t\t<td width=\"770\" valign=\"top\" style=\"border: none; padding: 0cm\"><p align=\"right\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/computerbasicshub.net\/netsecurityicon.png\" name=\"Image1\" align=\"right\" width=\"140\" height=\"137\" border=\"0\"\/>\n<br\/>\n\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t<\/tr>\n\t<\/table>\n<\/dd><\/dl>\n<p align=\"center\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p style=\"margin-left: 0.7cm; margin-right: 1.7cm; page-break-after: auto\">\nModem security is essential for a home or business network to be\nsecure from network threats and data breaches. With good practices\nmaintained, Malwarebytes or other antimalware and antivirus apps\nbeing utilized on computers, access to the modem\/router limited and\npasswords to networking devices kept secure, modems can be kept\nsecure from external threats. A number of important things to keep in\nmind when it comes to modem security are the following.<\/p>\n<p style=\"margin-left: 1.3cm; page-break-after: auto\"><br\/>\n<br\/>\n\n<\/p>\n<ul>\n\t<li><p style=\"margin-right: 1.7cm; background: transparent\">Never\n\tshare your modem&#8217;s password with other people who do not live in the\n\tsame password for sharing a home network connection beyond your\n\thome&#8217;s property.<\/p><\/li>\n\t<li><p style=\"background: transparent\">It is best to keep your\n\tmodem&#8217;s ISP-given password unchanged if possible.<\/p><\/li>\n\t<li><p style=\"background: transparent\">Avoid placing your modem in a\n\tvisible place to people who do not reside in your home.<\/p><\/li>\n\t<li><p style=\"background: transparent\">The modem&#8217;s configuration\n\tinterface signed out of unless it has to be accessed for a valid\n\treason.<\/p><\/li>\n\t<li><p style=\"background: transparent\">Turn on WiFi encryption.<\/p><\/li>\n\t<li><p style=\"background: transparent\">Ensure that the modem\u2019s\n\tfirewalls are kept on.<\/p><\/li>\n\t<li><p style=\"margin-right: 1.7cm; background: transparent\">Ensure\n\tthat the firmware of the modem is not out of date. Your ISP would\n\tadvise you if a firmware update is required for your modem or\n\trouter.<\/p><\/li>\n<\/ul>\n<p style=\"margin-right: 1.7cm; background: transparent\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\nBelow, are a number of links to web pages on modem and router\nsecurity.<\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\n<b>Links on modem security:<\/b><\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\n<a href=\"https:\/\/www.wired.com\/story\/secure-your-wi-fi-router\/\"><font color=\"#0000ff\">How\nto Secure Your Wi-Fi Router and Protect Your &#8230; &#8211; WIRED<\/font><\/a><\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\n<a href=\"https:\/\/routersecurity.org\/\"><font color=\"#0000ff\">Router\nSecurity<\/font><\/a><\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\n<a href=\"https:\/\/www.pcworld.com\/article\/395054\/how-to-secure-your-home-wi-fi-network-and-router.html\"><font color=\"#0000ff\">How\nto secure your home Wi-Fi network and router &#8211; PCWorld<\/font><\/a><\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\n<a href=\"https:\/\/www.hellotech.com\/blog\/which-router-security-option-should-you-choose\"><font color=\"#0000ff\">The\nBest Router Security Settings to Protect Your WiFi Network<\/font><\/a><\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\n<a href=\"https:\/\/www.networkworld.com\/article\/3316567\/what-is-wpa3-wi-fi-security-protocol-strengthens-connections.html\"><font color=\"#0000ff\">What\nis WPA3? And some gotchas to watch out for in this Wi &#8230;<\/font><\/a><\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\n<a href=\"https:\/\/www.makeuseof.com\/tag\/never-share-wifi-password\/#:~:text=By%20allowing%20someone%20access%20to,the%20identities%20of%20its%20users.\"><font color=\"#0000ff\">Why\nYou Should Never Share Your Wi-Fi Password<\/font><\/a><\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\n<a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/default-password\"><font color=\"#0000ff\">What\nis default password? &#8211; Definition from WhatIs.com<\/font><\/a><\/p>\n<p style=\"text-indent: 0.2cm; margin-left: 1.4cm; background: transparent\">\n<br\/>\n<br\/>\n\n<\/p>\n<p align=\"left\" style=\"text-indent: 0.2cm; margin-left: 0.5cm; page-break-after: auto\">\n<a href=\"https:\/\/computerbasicshub.net\/computerbasicshub.html\"><font color=\"#ff0000\">Cumputer\nBasics Hub<\/font><\/a><\/p>\n<\/body>\n<\/html>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Modem Security Modem security is essential for a home or business network to be secure from network threats and data breaches. With good practices maintained, Malwarebytes or other antimalware and antivirus apps being utilized on computers, access to the modem\/router limited and passwords to networking devices kept secure, modems can be kept secure from external [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"page-no-title","meta":{"footnotes":""},"class_list":["post-82","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/82","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":5,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/82\/revisions"}],"predecessor-version":[{"id":407,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/82\/revisions\/407"}],"wp:attachment":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/media?parent=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}