• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Secure
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Umbrella and SecureX
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella Package Comparison
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
      • What is Security Service Edge (SSE)
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • For Customers
      • Support
      • Customer Success Webinars
      • Cisco Umbrella Studio
    • Get the 2022 Cloud Scurity Comparison Guide
  • Trends & Threats
    • Market Trends
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
      • Cyber Threat Categories and Definitions
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Security

Understanding Your Home Network and Keeping It Secure

By Dominic Bannister, Jr.
Posted on October 9, 2014
Updated on March 5, 2020

Share

FacebookTweetLinkedIn

Hi, I’m Dominic Bannister, customer support representative team lead here at OpenDNS. As you know, our service helps users connect with confidence on any device, anywhere, anytime. However, there’s more you can do to protect your home networks—for example, securing the very devices you use to connect to the Internet. Some examples of devices on your network environment include modems, routers, and computers.
In this post, we’ll focus on explaining your network environment, and then provide some tips on how to secure it.
 

Understanding Your Network Environment

Let’s start by finding out more about the devices you use to connect to the Internet. Here’s a quick list of questions that should give us all the information we need:
What is the make, model, and version of the modem or router provided by your Internet Service Provider (ISP)?
Knowing the make, model, and version of your modem or router will not only help you understand the device’s features and limitations, but will also help you properly secure it! Check the body of the device or read the manual to find this information.
What are the IP address and login credentials for your modem or router?
Most modems and routers will have the default login information and IP address printed on the body. The modem or modem-router combination that your ISP provides is what we call the gateway or edge device. A gateway or edge device is networking device which handles communication from your network to the outside world. Settings on this device will dictate how the rest of your network behaves.
How is your network connected to the Internet?
You should map out your network environment with topology software. Just kidding! It’s not necessary for you to go that far, but a basic understanding of which devices connect to what can be very helpful. A simple map structure of your network can come in handy when locating and troubleshooting a network problem.
To get you started, here’s a basic home network map:
Screen Shot 2014-10-09 at 1.27.56 PM
Finally, remember to note the various types of devices on your network.
A modem is not exactly the same as a combination modem-router, and each will handle your network traffic in a unique way.
There are many online resources that can help you understand your network devices. To get you started, here’s a video explaining the difference between a hub, a switch, and a router.
 

Tips to Secure Your Network Environment

Now that you have a better understanding of your home network, here are a few simple steps you can take to minimize unauthorized access. (Of course, by using OpenDNS, you’ve already added an extra layer of security!)
Change the login credentials on your gateway device and router.
As mentioned previously, most modems and routers have default login credentials that make initial configuration easy. After the initial setup, change the username (if possible) and password to prevent unauthorized access to your modem or router. There are many online resources that provide a list of default login credentials for modems and routers, which can be used to easily compromise your network.
Keep your operating system and router updated.
Most vulnerabilities are exploited due to outdated software and/or firmware. Running the latest operating system and router firmware helps protect your network against intrusion.
Have a network use policy for your home.
It is easy to overlook this point, but it is critical to have a set of protocols (pun intended) that everyone should follow. For example, one of our rules at home is “don’t click on suspicious links.” What are suspicious links? See how well you can spot a phishing site with our quiz.
Create separate guest networks for visitors.
Typically, if you have a Wi-Fi network and users connect to the same access point, those users are a part of and have access to your network. Isolating guest users helps prevent access to your local network resources. Many home routers have this feature, but it has to be enabled. Please consult your router’s manual on how to configure separate guest network.
Disable your router’s remote login feature.
Many routers allow you to remotely log in to your home machine and network, but this makes your network vulnerable to attacks. Disabling the remote login feature will prevent others who are not directly connected to your router from accessing it.
Stay up-to-date on technology news about your network devices.
Keeping up with the latest news about online threats that target devices on your network, sometimes region specific, can help you take necessary actions to either prevent your system from being compromised or find solutions for an already affected system. There are many websites, blogs, and forums dedicated to each of the devices you use to get online. If you prefer short updates, you can sign up for news updates or follow like-minded individuals or groups on their social media sites. Lastly, be aware of changes in your network environment. If you notice that your connection speed has slowed down significantly, or if your machine is running slower than usual, these are signs that something is amiss and needs to be checked.
 
By no means is this a definitive guide on home networking. However, having a grasp of how your network is set up and applying basic security measures will not only help you troubleshoot your home network problems, but they will also minimize malicious users from gaining access to your network. Remember, there’s no place like 127.0.0.1, so keep it safe!
Need more help? You can always reach the OpenDNS Support Team by submitting a ticket here. 

Previous Post:

Previous Article

Next Post:

Next Article

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2023 Cisco Umbrella