Your router’s default admin password is probably on Google. Default credentials are public knowledge — and the usual suspects know them. Most people set up a router once and never touch it again. Here’s how to actually lock the door.

Every WiFi network is a potential entry point. Unsecured or poorly configured networks allow attackers to intercept traffic, position themselves between you and the internet, and compromise connected devices. Your home router is the gateway between your private network and everything else — and most folks have never changed its default settings.


WiFi Encryption Standards

Standard Security Level Notes
WEP None — broken Do not use. Crackable in minutes. Deprecated.
WPA Poor Significant vulnerabilities. Replaced by WPA2.
WPA2 (Personal) Good Current standard. Use WPA2-PSK with AES encryption.
WPA2 (Enterprise) Better Requires RADIUS server — for businesses.
WPA3 Best Newer standard. Use if your router and devices support it.

Check your router’s encryption: Log into your router admin panel → WiFi settings → ensure WPA2 or WPA3 is selected. WEP and WPA should never be used.


Router Hardening

Access your router admin panel:

Steps to actually lock this down:

  1. Change the default admin username and password — default credentials are documented publicly; change them now
  2. Update router firmware — routers receive security updates just like your phone; check the admin panel for updates
  3. Disable remote management — prevents access to the admin panel from the internet
  4. Disable WPS (WiFi Protected Setup) — WPS has known vulnerabilities; disable it entirely
  5. Enable the firewall — most routers have a built-in firewall; ensure it’s active
  6. Review connected devices — check the device list regularly; anything you don’t recognize is a problem
  7. Change the default DNS to a privacy-respecting DNS: Cloudflare (1.1.1.1) or Quad9 (9.9.9.9)

SSID Configuration

Your SSID is the name of your WiFi network as it appears to anyone in range — in your building, on the street, in a parked car outside.

What NOT to do:

Best practices:


WPA2-PSK + AES — The Target Configuration

For most home networks, this is what your settings should show:


MAC Address Filtering

Every network device has a unique MAC address — a hardware identifier. MAC filtering lets you create an allowlist: only pre-approved devices can connect.

How to enable:

  1. Log into router admin panel → WiFi or Security settings → MAC Filtering
  2. Enable MAC filtering → add the MAC addresses of all your devices
  3. Deny all others

Limitation: MAC addresses can be spoofed (faked) by attackers who know what they’re doing. MAC filtering is an additional layer, not a primary defense. Don’t skip strong encryption just because you enabled this.


HTTPS

HTTPS encrypts the connection between your browser and the websites you visit. Even on a compromised network, HTTPS prevents attackers from reading the content of your traffic — they can see you’re connected somewhere, but not what you’re doing or sending.

Verify HTTPS:

Enable HTTPS-only mode:


Public WiFi

Assume all public WiFi is compromised. Treat it like someone is watching — because on some networks, someone is.


Log into your router admin panel today. Change the default admin password. Check that WPA2-AES is selected. These take five minutes and most people rolling the dice on default settings have been rolling them for years.