Protect your network in three free, easy steps

Whether the Conficker worm booms or fizzles, take it as a reminder to keep your networks safe.

Use OpenDNS Use OpenDNS. Internet traffic gets routed through IP addresses; the text you type as a URL only sits on top of those numbers. Normally, when you type “,” it gets referenced in a domain name server directory, which then routes you to the actual IP address. But what happens if that structure is compromised and an attacker can send your request to a different IP address?

Last year, a new, devious attack materialized with that technique. You’d type a trusted name as a URL, but instead of being routed to the correct server, you’d be sent elsewhere. You might even see the name of a bank in the URL bar, but you’d have no idea you’re entering personal data directly into a hacker’s site.

Domain name servers and operating systems were eventually patched to protect against this attack. But the OpenDNS server already anticipated the problem and is quick to react to threats. Use it instead of relying on your ISP’s DNS servers.

On the client side, you can open the Network Connections Control Panel. Right-click the active connection, and pick Properties. Select Internet Protocol (TCP/IP), and click Properties. Click the radio button to Use the following DNS server addresses and enter and

Or you can enable it on your router, sending DHCP clients these details without additional intervention. The specific process varies, but you’ll essentially log in and enter those IP addresses in the NAT area. Visit for some hardware-specific details.

Update Your Router FirmwarePsyb0t is a worm that was written to attack router hardware directly, embedding itself inside. It simply guesses the login and password for a range of routers, starting with the defaults. At the very least, you should be using a strong password, especially since many low-end routers don’t let you change the login ID. (Try a password of about 12 characters with a mix of numbers, letters, and symbols.)

Just like your operating system, hardware companies typically patch routers over time, especially when security flaws are discovered. Look up your specific model and see if there’s a firmware update. If so, download, and apply the revision; it’ll likely protect you from many attacks.

Disable Remote Administration In addition to updating your router firmware and giving it a strong password, you can close another door by disabling remote administration. This option is often off by default, but check your router’s settings to tell for sure.

With remote administration on, someone can log in from offsite. They’ll typically need a valid password, although this access presents another weak point in your defenses.

If you need to administrate the network remotely, set up a secure connection to a VPN gateway at your network, instead of connecting in that open method. (Or use your router’s built-in secure connection if available.)

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now