Skip to the main content.

Our client portal provides all the tools you need to create, view or update your support requests. 

For urgent IT support during business hours, or if you suspect anything suspicious call  01314528444 for the fastest response.

If one of our team has asked you to start a remote control session on your computer, use the remote control menu option above.

2 min read

Best practice for securing your home network

Many of us work from home these days but is your home actually safe to work from? Securing your home network has become more critical than ever. A secure home network is essential for protecting your personal data from hackers.

From phishing to smishing, the challenge of avoiding breaches is increasing. At home, where safeguards are often fewer than at work, both personal and company data face heightened risks.

Approximately 46% of businesses experienced at least one cybersecurity incident within two months of transitioning to remote work.

The positive news is that there is a wealth of resources available on home network security. Many of the measures are straightforward and can significantly reduce the risk of a data breach at home.

The American National Security Agency (NSA) has outlined best practices for securing home networks. Despite being from a U.S. agency, these guidelines are equally applicable to users in the UK. Below, we'll highlight some of the most valuable tips.

1. Change Default Passwords and Usernames:

The initial step to secure your home network involves altering the default login credentials for your router and connected devices. Default usernames and passwords are commonly known to hackers, making this change crucial for enhanced security. Below is a list of common Home Broadband router IP addresses in the UK. This is where you will go to sign in and change your credentials:

  • BT
  • EE
  • NOW
  • Plusnet
  • Sky
  • TalkTalk
  • Virgin media
  • Vodafone

2. Enable Encryption:

Encryption is essential for safeguarding data by encoding information so that only authorised parties can access it. Confirm that your home network uses WPA2 or WPA3 encryption, as it prevents hackers from intercepting and reading your data.

3. Update Firmware:

Regularly updating the firmware on your router and connected devices is vital to address security vulnerabilities. Check for firmware updates through the router’s web interface or the manufacturer’s website at least once a month.

4. Enable the Firewall:

A firewall monitors and controls network traffic, both incoming and outgoing. Activate the built-in firewall on your router through the web interface to defend against malicious traffic and unauthorized access.

5. Disable Unused Services:

Manufacturers often enable default services on routers, including file sharing and remote management. Disable any unnecessary services to reduce the risk of exploitation by hackers.

6. Secure Wi-Fi Network:

Ensure the security of your Wi-Fi network by changing the default SSID, disabling SSID broadcast, enabling MAC address filtering, and turning off Wi-Fi Protected Setup (WPS). These measures prevent unauthorized access to your network.

7. Use Strong Passwords:

Implement strong passwords with a minimum length of 12 characters for your router and connected devices. The Three Random Words approach is recommended for creating robust passwords.

8. Create a Guest Network:

Establish a separate guest network for visitors, preventing them from accessing your primary network. This protects your primary network from potential security threats.

9. Limit Physical Access:

Secure your router in a locked cabinet or a room with restricted access to minimize physical security risks. Disable physical access to the router’s web interface, especially when guests or children may attempt to tamper with settings.


If you feel your organisation could benefit from expert advice to secure your remote workers then get in touch today.

5 tips to protect your VoIP from cyberattacks

5 tips to protect your VoIP from cyberattacks

Hardly any phone call system in a business beats VoIP when it comes to efficiency and flexibility. However, it’s not immune to cyberattacks....

Read More
How to use threat modelling to reduce your cyber security risk

How to use threat modelling to reduce your cyber security risk

As cyber threats continue to increase, businesses must take proactive steps and the first step towards that is threat modelling.

Read More
Some employees won’t stop using apps that could be a security risk

1 min read

Some employees won’t stop using apps that could be a security risk

Some employees won’t stop using apps that could be a security risk. It’s likely a lot of the applications and software tools you’re using now are...

Read More