Wi-Fi Security Best Practices

Practical steps to strengthen home and office Wi-Fi against unauthorized access and common attacks.

This page runs entirely in your browser. No data is sent anywhere.

Follow these steps to protect your Wi-Fi network from unauthorized access and potential security threats. These practices are recommended for both home and office networks.

Recommended Enhancements

  • Router Placement and Physical Access — Place the router centrally, away from windows and publicly accessible areas. Restrict physical access to prevent resets or tampering.
  • Automatic Updates and Scheduled Reboots — Enable automatic firmware updates if available. Consider scheduling periodic reboots to clear cached sessions and refresh connections.
  • Router Logging and Notifications — Turn on logs and alerts for new device joins or failed admin logins. Many routers can email or push notifications for unusual activity.
  • IoT and Smart-Device Segmentation — Put cameras, TVs, assistants, and other smart devices on a separate guest network or VLAN to keep them isolated from laptops and workstations.
  • Encrypted DNS (DoH/DoT) — Use DNS-over-HTTPS or DNS-over-TLS at the router or device level for encrypted lookups. If unavailable on the router, enable secure DNS in your browser settings.
  • Emergency Recovery Steps — If compromise is suspected, disconnect the router, perform a factory reset, update to the latest firmware, and reconfigure with a strong unique admin password before reconnecting.
Tip. If your router brand exposes a “remote management,” “cloud access,” or “WAN admin” feature, leave it disabled unless you truly need it and can secure it with strong MFA.
Advanced Practices
  • Disable UPnP unless a specific service explicitly requires it.
  • Change the SSID to a neutral name that does not reveal brand, address, or identity.
  • IPv6 hardening — disable if unused, or configure properly with firewall rules.
  • Enable router firewall/IDS features if available, and review alerts weekly.
  • Per-device controls — limit bandwidth and schedule internet downtime for high-risk devices.
  • Browser secure DNS — in Chrome or Edge, go to Settings → Privacy and security → Security → “Use secure DNS.” Choose a trusted provider or your custom DoH endpoint.
  • Example DoT (systemd-resolved) — add to /etc/systemd/resolved.conf: DNSOverTLS=yes; restart with sudo systemctl restart systemd-resolved.