Your IT Support Experts

We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

  

USA Computer Services Blog

USA Computer Services has been serving small and medium sized businesses since 2012, providing IT Support such as technical helpdesk support, computer support and consulting.

Tip of the Week: Who’s Leeching Service from Your WiFi Network?

b2ap3_thumbnail_stealing_my_wifi_400.jpgWireless connections like WiFi can be tricky at times. Either they don’t work, the connection isn’t a very good one, or there are too many people using it for it to be effective. Whatever the reason, you can bet that there are people using your WiFi who shouldn’t be can be. This can lead to many problems including security concerns, slow browsing speeds, and more.

There’s a way to check who’s actively using your network in the form of a free application called Who is On My WiFi. If you’re careless about your network security, you’ll want to be especially cautious about who is lurking behind the scenes. An unsecured network could leave you completely open to attacks from malicious entities.

whos on my wifi

Of course, even those who have encryption are at risk of getting infiltrated by hackers. After all, nobody is completely safe, especially considering the amount of threats on the loose. If you’re careless (and even if you’re cautious) you’re always at risk of a hack. For example, Who is On My WiFi won’t be able to tell you if someone accessed your network before or after the check. It can only tell you what devices are connected at the current moment.

To use this application, follow these instructions.

  • Install the application, Who is On My WiFi.
  • Open the app, then follow the tutorial steps. Your network scan should start.
  • Notice the list of IP addresses connected to your network. Each device should have a MAC address, as well as the local IP address of the modem you use to connect to the Internet.
  • Identify the different devices connected to your network. You’ll have to assign labels to your devices so you can tell which IP address belongs to which device. You can assign labels by using the Description box. Afterward, click Save. If you know your MAC addresses, you’ll have a much easier time identifying which device is which.
  • Look for unknown devices on your WiFi network. If you have some that are connected, you’ll probably want to change your password.

If you have any concerns at all with your business’s wireless network security, USA Computer Services has the solution for you. Our trusted IT technicians can configure your router to lock unwelcome devices out of it, and with our remote monitoring solution, we can analyze your network’s traffic patterns for any out-of-place activity. Just give us a call at (704) 665-1619 to learn more.

How Much is it the Employer’s Responsibility to En...
Tip of the Week: How to Troubleshoot A Failed Back...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Sunday, April 28, 2024

Captcha Image

Customer Login

Contact Us

Learn more about what USA Computer Services can do for your business.

Headquarters:
525 North Tryon St. #1600
Charlotte, NC 28202

Additional Location:
859 Willard St #400
Quincy, MA 02169
Additional Location:
60 State Street #700
Boston, MA 02129