{"id":80179,"date":"2018-06-22T12:42:12","date_gmt":"2018-06-22T19:42:12","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=80179"},"modified":"2018-07-20T13:34:39","modified_gmt":"2018-07-20T20:34:39","slug":"how-to-secure-your-home-router","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/","title":{"rendered":"How to Secure Your Home Router"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/secure-wireless-network\/\" rel=\"attachment wp-att-80197\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-80197\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/secure-home-router.jpg\" alt=\"How to secure your home router\" width=\"600\" height=\"335\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/secure-home-router.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/secure-home-router-150x84.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/secure-home-router-300x168.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>A\u00a0home router is your gateway to the Internet. When configured correctly to be secure, your home router can act as a\u00a0first line of defense against network intruders. Configured incorrectly, however, and your\u00a0router\u00a0can be an open door allowing hackers and cyber-criminals to infiltrate your network and potentially access your computers and files.<\/p>\n<p>Configuring a home router isn&#8217;t complicated, but many people don&#8217;t make needed changes to the default settings when they set up the device\u2014and you might be one of them, but it&#8217;s okay,\u00a0we&#8217;re here to help! Have you changed the default settings in your home router? When was the last time you checked your router\u00a0settings to be sure it&#8217;s as secure as can be?\u00a0Follow along below, and we&#8217;ll show you the main settings you can change right now to ensure\u00a0your home router is secure\u00a0and\u00a0protects you from hackers.<\/p>\n<h3 id=\"accessingsettings\">How to Access Router Settings<\/h3>\n<p>For most routers, you access settings by way of\u00a0a Web browser. One notable execution is Apple&#8217;s Wi-Fi devices\u2014configured using the AirPort Utility app\u2014but in most cases, the IP address for the router is 192.168.1.1. Type this IP address in your Web browser and it will load a configuration page.<\/p>\n<p>If this isn&#8217;t the right address, you can find the correct address on a Mac by holding down the Option key and clicking the Wi-Fi menu in your menu bar. You&#8217;ll see a lot of information, including your router&#8217;s IP address.<\/p>\n<p><img class=\"aligncenter size-full wp-image-80188\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router.png\" alt=\"\" width=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router.png 683w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-99x150.png 99w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-197x300.png 197w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-672x1024.png 672w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-657x1000.png 657w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/p>\n<p>Another way to find this is to open <strong>System Preferences<\/strong>\u00a0&gt;\u00a0<strong>Network<\/strong>\u00a0&gt;\u00a0<strong>Advanced<\/strong>. Click the TCP\/IP tab, and you&#8217;ll see your router&#8217;s IP address in the data presented.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-80191\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/sysprefs.png\" alt=\"\" width=\"1560\" height=\"1350\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/sysprefs.png 1560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/sysprefs-150x130.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/sysprefs-300x260.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/sysprefs-768x665.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/sysprefs-1024x886.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/sysprefs-657x569.png 657w\" sizes=\"(max-width: 1560px) 100vw, 1560px\" \/><\/p>\n<h3 id=\"changetheadministratorspassword\">Change the Administrator&#8217;s Password<\/h3>\n<p>In order to be able to configure your new router, these devices are generally shipped with a default administrator&#8217;s password. Often the default username is <em>admin<\/em>\u00a0and the default password is <em>admin<\/em>. You&#8217;ll find your router&#8217;s default\u00a0username and password\u00a0in your router&#8217;s documentation, and\u00a0if you don&#8217;t change it, anyone who can access the router will be able to change its settings.<\/p>\n<p>Don&#8217;t think that hackers don&#8217;t know what these passwords are; there are plenty of websites (like <a href=\"http:\/\/192-168-1-1ip.mobi\/default-router-passwords-list\/\" target=\"_blank\">this one<\/a>) that provide a database of default passwords. This is great if you have a new router and can&#8217;t find the password, but it&#8217;s also great for hackers if they want to hack\u00a0into your home router.<\/p>\n<p>The first thing you should do when setting up your home router is change the default password. Don&#8217;t think that simply creating a new user with a secure password is sufficient enough to secure your home router; instead, you must change the default administrator&#8217;s password, because that account will always be able to access the router. And, of course, make sure it&#8217;s a secure password! <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\" target=\"_blank\"><strong>(RELATED: How to Create Secure Passwords.)<\/strong><\/a><\/p>\n<h3 id=\"changethewi-fipassword\">Change the Wi-Fi Password<\/h3>\n<p>There&#8217;s one password to access a\u00a0router&#8217;s settings, and there&#8217;s another password to access its Wi-Fi network. Some routers will have a simple default password\u2014similar to the administrator&#8217;s password mentioned\u00a0above\u2014and others may not set a password at all. As above, create a secure password, but one that is easy to remember; you may need to give it to friends, family, or other visitors, so they can share your network.<\/p>\n<p>If your router offers a guest network feature, turn that on, and set a password. When visitors want to use your Wi-Fi, have them use that network, rather than the one you use. It prevents them from accessing any of your devices that use the main network.<\/p>\n<h3 id=\"changethessid\">Change the SSID<\/h3>\n<p>The SSID is the name of your router&#8217;s Wi-Fi network that is broadcast. You&#8217;ll see this when you go to connect to a new network, such as in the iPhone&#8217;s Wi-Fi settings.<\/p>\n<p><img class=\"aligncenter size-full wp-image-80185\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/wifi-iphone.png\" alt=\"\" width=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/wifi-iphone.png 1244w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/wifi-iphone-132x150.png 132w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/wifi-iphone-263x300.png 263w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/wifi-iphone-768x875.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/wifi-iphone-898x1024.png 898w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/wifi-iphone-657x749.png 657w\" sizes=\"(max-width: 1244px) 100vw, 1244px\" \/><\/p>\n<p>There are a number of reasons why it&#8217;s a good idea to change this, which\u00a0we discuss in great\u00a0detail on a <a href=\"http:\/\/podcast.intego.com\/36\" target=\"_blank\">recent episode of the Intego Mac Podcast<\/a>.<\/p>\n<p>Don&#8217;t choose a name that identifies you, and don&#8217;t include any personally identifiable information.\u00a0If you use such information and live in an apartment, for example, people will know whose network it is, and this may tempt them to\u00a0try and\u00a0access it.<\/p>\n<h3 id=\"updatefirmware\">Update Firmware<\/h3>\n<p>Every computing device has <em>firmware<\/em>, or software that is stored on a chip that is used to run the device. And given the security needs of a router, it&#8217;s likely that this is updated from time to time. Check your router&#8217;s settings and see if there are any firmware updates. If you&#8217;re not sure, check the manufacturer&#8217;s website. Some routers allow you to turn on automatic updates; if possible, do this, so you don&#8217;t have to worry about checking for new firmware. Unlike on a computer or mobile device, you won&#8217;t get any notifications that new firmware is available, unless you go to the router&#8217;s settings.<\/p>\n<h3 id=\"turnoffupnp\">Turn Off UPnP<\/h3>\n<p>UPnP, or universal plug and play, is a feature most routers have that allow apps or devices to send and receive traffic through routers. It may make it easier for you to use certain devices, such as video game consoles and media servers, which may\u00a0need to receive communications from outside your network, but this\u00a0can be a security risk. If you need this feature, you probably know why; if not, it&#8217;s a good idea to turn this off.<\/p>\n<h3 id=\"turnoffwi-fiifyourenotusingit\">Turn Off Wi-Fi if You&#8217;re Not Using It<\/h3>\n<p>Some people may use a router to connect to the Internet, but then use another device to provide Wi-Fi in their homes. In my case, for instance, because of the location of my router and the size of my home, the router&#8217;s Wi-Fi couldn&#8217;t reach far enough. So I bought a <a href=\"https:\/\/www.kirkville.com\/hardware-review-netgear-orbi-wifi-system-covers-lots-of-space-at-a-cost\/\" target=\"_blank\">NetGear Orbi<\/a> mesh Wi-Fi system, which allows me to have coverage in every room of my house. Since I don&#8217;t need the Wi-Fi on my router, I&#8217;ve turned it off.\u00a0Leaving it on would mean that there is a potential for someone to discover my\u00a0network and access it. And turning it off reduces potential interference for the Orbi.<\/p>\n<p>Also, some routers provide two Wi-Fi networks: one using the older, slower 2.4 GHz spectrum, and another using 5 GHz. Depending on your devices, you may not need both of these turned on. Check to see whether you can turn off one of these networks; doing so is\u00a0more secure, and it could speed up your network throughput a bit.<\/p>\n<h3 id=\"goingfurther\">Going Further&#8230;<\/h3>\n<p>There are more settings on your router, such as MAC address whitelisting, which lets you tell your router to only allow certain devices to connect to it;\u00a0for instance, USB file sharing, which lets you connect a hard drive to the router, but which could allow hackers to access files, and more. Have a look through the settings, then check your manual, to find any features that are enabled that you don&#8217;t need to use, and turn them off.<\/p>\n<p><strong>Further Reading:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/this-home-vpn-router-setup-protects-your-traffic-wherever-you-are\/\" target=\"_blank\">This Home VPN Router Setup Protects Your Traffic Wherever You Are<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-cloudflares-1-1-1-1-public-dns-and-why-you-should\/\" target=\"_blank\">How to Use Cloudflare&#8217;s 1.1.1.1 Public DNS (And Why You Should)<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-remove-wi-fi-networks-from-your-mac-and-ios-device\/\" target=\"_blank\">How to Remove Wi-Fi Networks from Your Mac and iOS Device<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A\u00a0home router is your gateway to the Internet. When configured correctly to be secure, your home router can act as a\u00a0first line of defense against network intruders. Configured incorrectly, however, and your\u00a0router\u00a0can be an open door allowing hackers and cyber-criminals to infiltrate your network and potentially access your computers and files. Configuring a home router [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":80230,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,151,13],"tags":[2878],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A\u00a0home router is your gateway to the Internet. When configured correctly to be secure, your home router can act as a\u00a0first line of defense against network\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Secure Your Home Router - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A\u00a0home router is your gateway to the Internet. When configured correctly to be secure, your home router can act as a\u00a0first line of defense against network\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-22T19:42:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-20T20:34:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-security-how-to.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-security-how-to.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-security-how-to.jpg\",\"width\":400,\"height\":260,\"caption\":\"Router Security How To\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/\",\"name\":\"How to Secure Your Home Router - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#primaryimage\"},\"datePublished\":\"2018-06-22T19:42:12+00:00\",\"dateModified\":\"2018-07-20T20:34:39+00:00\",\"description\":\"A\\u00a0home router is your gateway to the Internet. When configured correctly to be secure, your home router can act as a\\u00a0first line of defense against network\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Secure Your Home Router\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"How to Secure Your Home Router\",\"datePublished\":\"2018-06-22T19:42:12+00:00\",\"dateModified\":\"2018-07-20T20:34:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#webpage\"},\"wordCount\":1184,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-security-how-to.jpg\",\"keywords\":[\"Router\"],\"articleSection\":[\"How To\",\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A\u00a0home router is your gateway to the Internet. When configured correctly to be secure, your home router can act as a\u00a0first line of defense against network","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/","og_locale":"en_US","og_type":"article","og_title":"How to Secure Your Home Router - The Mac Security Blog","og_description":"A\u00a0home router is your gateway to the Internet. When configured correctly to be secure, your home router can act as a\u00a0first line of defense against network","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-06-22T19:42:12+00:00","article_modified_time":"2018-07-20T20:34:39+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-security-how-to.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-security-how-to.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-security-how-to.jpg","width":400,"height":260,"caption":"Router Security How To"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/","name":"How to Secure Your Home Router - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#primaryimage"},"datePublished":"2018-06-22T19:42:12+00:00","dateModified":"2018-07-20T20:34:39+00:00","description":"A\u00a0home router is your gateway to the Internet. When configured correctly to be secure, your home router can act as a\u00a0first line of defense against network","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How to Secure Your Home Router"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"How to Secure Your Home Router","datePublished":"2018-06-22T19:42:12+00:00","dateModified":"2018-07-20T20:34:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#webpage"},"wordCount":1184,"commentCount":4,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-security-how-to.jpg","keywords":["Router"],"articleSection":["How To","Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-secure-your-home-router\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/06\/router-security-how-to.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-kRd","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/80179"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=80179"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/80179\/revisions"}],"predecessor-version":[{"id":80263,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/80179\/revisions\/80263"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80230"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=80179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=80179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=80179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}