Frankly, I think the security advice offered on this site is as good as you're going to find anywhere. If nothing else, the configuration suggestions offered on this site are far more comprehensive than any one article. Still, for other perspectives, some articles on Router Security are listed below. Many stink. Even more are pretty basic, roughly equivalent to the short list on the home page. A few are good (look for bold text).
- Secure your Wi-Fi against hackers in ten
steps by Davey Winder for IT PRO in the UK. Feb. 5, 2018. Research commissioned by Broadband Genie of British broadband users showed that 19% had accessed the Wi-Fi router configuration controls, 17% had changed the admin password from the default and 14% had updated their router firmware. Article confuses router password with with Wi-Fi password. States that the majority of routers can self-update. Maybe in England that's true. Good warning about firmware updates, that they may default the router back to original settings. Suggests changing DNS servers and sniffing out rogue devices on your network with Fing. Good discussion of MAC address filtering.
- How to Protect Your Home Router from Attacks
by Lucian Constantin in Motherboard January 3, 2018. An excellent article. Constantin knows his stuff and he consulted with other experts too. He also wrote a good article on router security for PC World in July 2016 (see below). That said, the article is a bit ambitious in that very few people can follow all the suggestions. But, it does steer readers in the right direction.
The same day this article was published, Cory Doctorow wrote a rebuttal to it in Boing Boing (You absolutely must secure your home router and you probably can't
) that started with: "Lucian Constantin's Motherboard guide to protecting your home router is full of excellent, nearly impossible-to-follow advice that you should follow, but probably won't. Constantin sensibly points out that your ability to trust your router ultimately and absolutely depends on its security track record ... but then goes on to obliquely point out that these are largely unanswerable questions."
When it comes to Peplink, the questions are indeed answerable and the answers are good.
- Five ways to check if your router is configured securely by Miguel Angel Mendoza for We Live Security by ESET. Jan. 23, 2018. Pretty bad. Has multiple plugs for ESET software.
- Recommended settings for Wi-Fi routers and access points by Apple. Goal of the recommendations is "best performance, security, and reliability." Mostly standard stuff. Good SSID advice. Strangely ignores the latest ac flavor of WiFi for 5GHz. I disagree with the 5 GHz channel width recommendation, but that's a performance thing, not a security thing. Last updated Jan. 14, 2018
- WiFi how and why: Setting up a new router securely by Rob Pegoraro in USA TODAY Dec. 27, 2017. Starts off assuming the router has a web interface. Some do not. Says to use a memorable SSID, but does not suggest avoiding personal info. For example, an SSID of "The Smith Family" is bad. Does not mention that self-updating routers exist. Suggests disabling WPS, but only mentions the WPS push button method.
- Basic Wi-Fi security: How to easily improve your home internet safety by Phil Nickinson at Android Central Dec. 27, 2017. The author uses a Netgear router. Nuff said. Article has way too much snark. Bad advice on Wi-Fi passwords: "It just needs to be a basic front-door lock is all." Says WEP is bad but says nothing about WPA. Considers passwords for Guest networks to be optional.
- How to secure your home wireless network router by Computer Hope last updated Dec. 20, 2017.
Miserable article. A disgrace. Probably written 10 years ago. Recommends WPA, disabling SSID broadcast and MAC address filtering.
- How to Keep Your Home Wi-Fi Safe From Hackers by David Nield in Gizmodo December 11, 2017. Router Security as seen by an art history major. Very introductory. Big omissions: WPA2 password strength, self updating routers, mobile apps for administration. Mostly wrong about KRACK flaw.
- How to secure your router to prevent IoT threats by Cecilia Pastorino for We Live Security by ESET. October 26, 2017. Too vague and general to be of much practical use. Still, it does suggest network isolation, disabling services not used and doing more with firewalls.
- Router configuration - easy security and improvements at DecentSecurity.com. Eh. Author is anonymous. Copied my idea to tape the router password to the router. Assumes the router has a web interface, not all do. Not as comprehensive as the home page of this site. Endorses The WireCutter even though they don't consider security at all. Last revised Oct 2017.
- 5 Ways to Secure Wi-Fi Networks by Eric Geier for Network World Sept 18, 2017. Advice for businesses rather than home users. Good points about choosing an SSID. Covers physical security, WPA2 Enterprise and more.
- The Complete Guide to Improve Your Home WiFi Security by
Nick Congleton in Make Tech Easier July 22, 2017. Overplays importance of changing SSIDs. Does stress long Wi-Fi passwords. Only person in the world to suggest rotating your Wifi password. Says to disable the guest network but actually means to password protect it. Says that not every router has a built-in firewall, which is false. Says that a VPN you can help stop attacks from outside your immediate area. WTF? Whole VPN topic is wacky/wrong. Author un-aware of self-updating routers.
- Protecting Home Networks: Start by Securing the Router by Trend Micro May 18, 2017. Pretty good. Some of the usual stuff and some advice that may have been copied from here such as "Avoid routers that are included with internet plans" For Wi-Fi passwords, they suggest over 20 characters. New stuff: don't buy a used router, it may be infected with malware and a very good point, that website-based DNS server tests may not be reliable once a home router has been compromised.
- Securing Your Routers Against Mirai and Other Home Network Attacks by Trend Micro January 31, 2017. Very general, mostly a plug for their software that they put in some ASUS routers. A companion 30 page PDF: Securing Your Home Routers by Joey Costoya, Ryan Flores, Lion Gu, and Fernando Merces of Trend Micro.
- How to Setup a Secure Wireless Network Router on SafeGadget.com, no author given. Created Jan. 2013, last Updated Dec. 15, 2017. Notes that Ethernet is much more secure than wireless. Says that router vendors stop upgrading firmware after a year or two and then you then should buy a NEW router (one of many reasons to buy Peplink routers, they maintain firmware for a very long time). Recommends pfsense and the Ubiquiti EdgeRouter X. Endorses Steve Gibsons 3 dumb routers scheme. To turn off a router at night, suggests using an electrical power timer (Peplink offers scheduling). Suggests Wi-Fi passwords be at least 40 characters long. I think thats overkill. Says that the DHCP range should equal the number of devices you have. I disagree. Offers suggestions for configuring Guest Wi-Fi networks. Discusses third party router firmware.
- Asuswrt-Merlin vs DD-WRT by Dave Farquhar December 12, 2016. Seems to be a non-biased opinion from a qualified author. I have not used either, so I can't comment on the details.
- How to set up and optimize an Asus RT-AC66U by Dave Farquhar December 5, 2016. Worthwhile read. The article discusses Asus WRT-Merlin firmware by Eric Sauvageau. It is not as full featured as DD-WRT, retains the Asus user interface and fixes security vulnerabilities faster. Nice feature: the WPS button can be converted to a Wi-Fi on/off button. Also, router can be configured to re-boot daily in the middle of the night. The article also offers good advice on initial router setup. The author is the only one, other than myself, to recommend taping a piece of paper to the router. The router can create up to three guest networks on each frequency band. Great way to isolate IoT devices.
- Six Things You Need to Do Immediately After Plugging In Your New Router by Jason Fitzpatrick Dec. 1, 2016. Pretty good article, but fails to suggest plugging a new router into an existing one while doing initial setups.
- Secure your router: How to help prevent the next internet takedown by Lysa Myers of ESET November 8, 2016. Meh. Best part of this article is that disabling UPnP was second in the list.
- 12 Ways to Secure Your Wi-Fi Network by Eric Griffith for PC Magazine October 14, 2016. This article says to turn off Guest Wi-Fi networks which is as wrong as wrong gets. Plus, the author seems to be under the impression that all Guest networks have no password. How does this happen? How does stuff like this get published? The article assumes that every router has a default userid/password. This is no longer true. This is the only article I have seen that suggests periodically changing the SSID in case someone has the password. A Guest network would avoid the need for this. To update firmware, it is suggested to use the router. The author is unaware that this often does not work and the only way to be sure you have the latest firmware is to manually check the manufacturers website.
- How Outdated Router Firmware Puts You
at Risk by Tercius Bufete of Consumer Reports August 2, 2016. Fire hot. Ice cold. Merely stating the obvious.
- How to secure your router and home network by Lucian Constantin of IDG News Service July 8, 2016. Pretty long list, almost all of it good advice. A rare instance of someone who agrees with me to "Avoid using routers supplied by ISPs".
- 7 Steps to a Secure Router by Leo Notenboom May 2016 (an update to an article first written in 2009). Standard stuff, except for the point about physical security. Debunks MAC address filtering and SSID broadcasts, always a good sign in an article.
- Use guest networks to secure IoT "smart" devices by Dave Farquhar February 8, 2016. Worthwhile read. I agree completely on the concepts and the goals, but not on all the specific suggestions. Interesting note: DD-WRT can throttle the bandwidth of a guest network.
- Why hiding your SSID makes your security worse by Dave Farquhar January 6, 2016. Quoting: "When you hide your SSID, your devices have to beacon out looking for it. So they do, and they don't just beacon when you're at home. They beacon out at work, at the coffee shop, at the airport and hotel, and wherever else you take your phone, tablet, and/or laptop. An attacker can detect that beaconing, then stand up an access point with that SSID, wait for your device to join, and then they can capture and analyze your traffic. At that point they can even get into your SSL/TLS sessions."
- Security Tip (ST15-002) Securing Your Home Network from US Cert. December 2015. No one was willing to put their name to this. While the advice is technically correct, it will also prove useless to the very people that need it. And, its poorly written. For example, the first suggestionis to "Change the default username and password" as if there were only one default. Its not clear if they are talking about the router password or the WiFi passwords. It also assumes routers create a single Wi-Fi network and it advises to "make the SSID unique" without saying either how or why. And it says nothing about Guest networks.
- Home networking explained, part 6: Keep your network secure by Dong Ngo for CNET December 22, 2015. Not good. Suggests Wi-Fi passwords should be easy to remember and type, even on a smartphone. I disagree. Says Wi-Fi passwords should be at least eight characters long. I disagree, they should be longer. Suggests changing routers IP address. Good. But, then says that it can be changed to almost anything you want. At this point, it seems Ngo is not qualified to write on the subject. Suggested router IP addresses include 126.96.36.199 and 188.8.131.52. Not good. On the upside he does suggest disabling UPnP and enabling security for powerline adapters.
- Securing Your Wireless Network from the FTC. September 2015. Awful, bordering on malpractice.
- June 13, 2015: On his Tech Guy radio show, Leo Laporte was asked to recommend a secure router by someone willing to spend up to $500.
He had no answer. When he referred to "Bad USB", he meant to say NetUSB. He was also wrong in that NetUSB is a flaw on the LAN side
of the router, not the WAN side. Andy, he thinks that open source router firmware is more secure, something that a real expert, Craig Young of Tripwire
said is not true. If that's the state of what a Tech Guy knows about routers, this site is really needed.
- Home router security 2015 - 9 settings that will keep the bad guys out by John E Dunn of Techworld April 23, 2015. An interview with Tripwire researcher Craig Young, an expert on the subject. Excellent discussion of the topics raised. Young's opinion on third party firmware such as DD-WRT is a must read.
- Secure your wireless router by Kevin Dearing at Ghacks.net. March 24, 2015. This article is more comprehensive than most on the subject although it falls down on WPA2.
- Build the best, most secure wifi in your neighborhood by Dave Farquhar March 24, 2015. Good article, with some attitude to boot. With the recent advent of mesh routers the advice about extending the reach of a Wi-Fi network is a bit dated, but the security advice has aged well.
This used to be on the Resources page, but that page was getting too big.