West Midlands 01902 500 211 / 0121 2704796
Shropshire 01952 457 235 / 01746 335004 / 01743 296 164
Worcestershire 01562 546 129
  home   testimonials   my account   my basket   contact us  
  Wireless Network
   Wireless Network Security
   What Is Killing Your Wifi

Telford, Broseley, Much Wenlock, Newport, Shifnal, Whitchurch, Shropshire

01952 457 235

Alverley, Bridgnorth, Cleobury Mortimer, Stourbridge, Craven Arms, Hilton, Highley, Shropshire

01746 33 50 04

Alverley, Bewdley, Kidderminster, Malvern, Redditch, Bromsgrove, Stourport on Severn, Worcester, Worcestershire

01562 546129

Birmingham, Halesowen, Smethwick, Solihull, Sutton Coldfield, Walsall, West Bromwich, West Midlands

0121 270 4796

Albrighton, Bilston, Dudley, Stafford, Sedgley, Wednesbury, Wednesfield, West Bromwich, Willenhall, Wolverhampton, West Midlands

01902 500 211

Shrewsbury, Ludlow, Montford Bridge, Oswestry, Welshpool, Church Stretton, Shropshire

01743 296 164
    Wireless Network Security
Wireless Internet and Wireless networks bring great advantages to home users and small businesses, however inproper installation and configuration can leave you vulnerable to attacks from hackers, compromising your security and data.


The service comprises;

  • Wireless Site Survey - Obtain the best possible reception with less interference.
  • Wireless Lockdown - We ensure your network broadcasts are encrypted, safe from prying eyes.

What Are The Risks of An Unprotected Network:

Wireless networks broadcast over the 2.4 GHz band, a public area of radio bandwidth reserved for wireless devices such as wireless networks, wireless phones, wireless mice and keyboards.

Leaving a wireless network open brings many risks, some of which include;

  1. Anyone being able to make use of your internet connection
  2. Anyone being able to view machines connected to your network
  3. Anyone being able to view or steal files from your computers or servers
  4. Anyone being able to monitor traffic being transmitted over your network such as passwords, bank details, pin codes and emails.

Scenario 1:
A hacker or 3rd party could use a stolen credit card to purchase goods and services, Over your internet connection. All this traces back to YOU!

A 3rd party could be looking at illicit illegal images using your internet connection.
Any activity over your network is all logged against your name!

Home | Services | Data Recovery | Virus Removal | Laptop Repairs | Computer Repairs | Wireless Networks | Online Shop | Web / Internet Services | Contact
Locations | Disclaimer & Regulatory Information | Privacy Policy | Terms & Conditions
Copyright 2018. All Rights Reserved.