A Practical Network Security Guide for Home & Small Business

A plain-language guide to setting up and maintaining a secure network. Written for business owners, managers, and technically curious home users — not for network engineers.

Version 1.0 Reading time ~25 min Last reviewed: _________

About this guide

Purpose

Walk you through the decisions and settings that keep your network safe, explain why each one matters, and give you a sensible place to start even if you can’t do everything at once.

Who it’s for

Home users who take their privacy and data seriously, and small businesses without a dedicated IT person. Items marked Home or SMB are audience-specific.

How to read it

Start with the Top 10 Essentials. Use the priority tags on each item to decide what to tackle first. Read the Why lines to understand the reasoning, not just the rule.

Essential Do these first — leaving them undone is how most compromises happen. Recommended The next layer — real protection, modest effort. Advanced Worth doing, but usually requires more technical setup or specific gear.
Start here

Top 10 Essentials

If you do nothing else, do these. Each takes minutes to hours — not days — and each shuts down a common real-world attack.

  1. Use a password manager and turn on MFA everywhere you can. §1
  2. Change the default password on your router and every device. §2
  3. Enable automatic updates on your router, computers, and phones. §2
  4. Use WPA3 (or WPA2-AES) Wi-Fi with a 16+ character passphrase. §3
  5. Turn on a separate Guest network for visitors and smart-home devices. §3
  6. Don’t open any inbound ports — use Tailscale or similar for remote access. §2
  7. Switch your DNS to a filtering resolver (Quad9, NextDNS, or Cloudflare 1.1.1.2). §2
  8. Turn on full-disk encryption on every laptop, phone, and tablet. §4
  9. Replace devices that no longer get security updates (End of Life). §4
  10. Back up anything you’d cry about losing — to a drive and cloud — and test a restore. §5

Section 1

Accounts, Passwords & MFA

Your network can be perfectly configured and a single reused password can still give an attacker the keys. This is the foundation everything else rests on.

  • EssentialUse a password manager (Bitwarden, 1Password, Apple Passwords, or a vetted equivalent). Generate and store a unique password for every account and device.

    Reusing passwords means one leaked site compromises all your other accounts — this is the #1 cause of account takeover.

  • EssentialTurn on multi-factor authentication (MFA) on every account that supports it — email, banking, cloud storage, social, business tools, and every device admin portal.

    MFA blocks the vast majority of password-based attacks even if your password leaks.

  • EssentialPrefer app-based MFA (Authy, 1Password, Google Authenticator, Microsoft Authenticator) or a hardware key (YubiKey, Google Titan) over SMS codes.

    SMS can be hijacked via SIM-swap attacks; app and hardware factors can’t.

  • RecommendedProtect your email account with the strongest MFA you have (ideally a hardware key).

    Email is the master key — anyone who controls your email can reset passwords on everything else.

  • RecommendedSave backup / recovery codes for critical accounts somewhere safe (printed in a home safe, or as an encrypted password-manager note).

    Losing your phone shouldn’t mean losing access to your own accounts.

  • RecommendedSMBUse single sign-on (SSO) (Microsoft 365, Google Workspace, Okta, JumpCloud) for business apps so you have one identity to secure, audit, and revoke.

    When an employee leaves, one click should disable all their access.

  • AdvancedSMBEnforce a password policy through your identity provider: minimum 14-character length, no forced rotation, breached-password checking, MFA required.

    Modern guidance (NIST) favors long passphrases over frequent rotation, which tends to produce weaker, reused passwords.

Section 2

Router / Gateway / Firewall

Most home and small-business networks combine routing, firewall, DNS, DHCP, and VLAN features into a single box, so configure them together. When this guide says “router,” it means that combined device.

Choose the right device

  • RecommendedUse your own router rather than the one your ISP provides. If your ISP requires their device, ask them to put it in bridge mode (pass-through) and run your own router behind it.

    ISP-supplied equipment often limits your admin access, delays firmware updates, and enables hidden remote-management features that have been exploited in the wild. Owning the router means you own the security.

  • RecommendedCheck the vendor’s End-of-Life (EOL) policy before buying. Pick a router still within its support window with a track record of timely security updates.

    An unsupported router is a permanent, unpatchable hole on your network’s front door.

Credentials & administrative access

  • EssentialChange the router admin password to a long, unique passphrase stored in your password manager. Change the admin username too, if allowed.

    Default router credentials are published online; attackers try them first with automated tools.

  • EssentialLimit administration to the internal network only. Turn off remote/WAN admin, cloud-management relays, and any “remote app access” feature. If you truly need remote admin, reach it through a VPN.

    Exposing an admin page to the internet is how many consumer routers get taken over within hours of going online.

  • EssentialTurn on MFA on any cloud-management portal (UniFi, Meraki, Omada, pfSense+, etc.).

    The cloud portal controls your entire network — it needs the strongest protection you can give it.

  • RecommendedUse unique credentials on every networking device (router, switch, access point, NAS, NVR). No shared passwords.

    A compromise of one device shouldn’t hand over all the others.

  • RecommendedTurn off unused management protocols — Telnet, plain HTTP admin, SNMPv1/v2c. Prefer SSH, HTTPS, and SNMPv3.

    Older protocols send credentials and data in the clear.

  • AdvancedSMBRestrict the management interface to a management VLAN or specific admin subnet.

    Even inside your LAN, random devices shouldn’t be able to load the router login page.

  • AdvancedSMBKeep a change log of firewall and access-control edits (date, who, why).

    When something breaks or something is found later, you’ll want to know what changed.

Automatic updates & lifecycle

  • EssentialEnable automatic firmware updates on the router. If not supported, set a monthly reminder to check and apply them manually.

    Most router compromises exploit patched vulnerabilities that owners never installed.

  • EssentialReplace the device at End of Life. Once updates stop, no amount of configuration will protect it.

    A router with a known unpatched vulnerability is an open door.

  • RecommendedSet the router’s time zone and enable time sync (NTP).

    Accurate timestamps matter when you’re trying to piece together what happened.

Firewall

  • EssentialConfirm the built-in firewall is enabled and set to block unsolicited inbound traffic by default (almost always the out-of-box setting — verify it’s still on).

    This is the single most important protection between your network and the internet.

  • EssentialDo not open any inbound ports. Do not enable DMZ host. The target is zero port-forwards and no DMZ.

    Every open port is an advertised service that someone will attack; a DMZ host disables the firewall entirely for one device.

  • EssentialIf you need remote access to things on your network, use an overlay/mesh VPN like Tailscale, ZeroTier, or Netbird (or a self-hosted WireGuard).

    These let you reach your network privately without opening anything to the public internet. Your firewall stays fully closed; authorized devices get in through the back door you control.

  • RecommendedAudit any existing port forwards / NAT rules. Remove anything you don’t actively use; document the purpose of anything you keep.

    Unused forwards accumulate like clutter and forgotten ones become forgotten risks.

  • RecommendedTurn off UPnP unless a specific application needs it. If enabled, check the active mappings now and then.

    UPnP lets any device on your network silently open a firewall hole for itself.

  • AdvancedApply default-deny outbound (egress) rules where practical. Allow user networks only what they need (typically DNS, HTTP, HTTPS, and specific business apps). Block outbound SSH, RDP, and arbitrary high ports from user and IoT segments.

    This is the single biggest disruptor of “reverse tunnel” attacks, where a compromised device phones home to give the attacker access. See §7.

  • AdvancedSMBIf you must publish a public service, put it on its own DMZ VLAN behind a reverse proxy or web application firewall (WAF) — never on the staff LAN.

    Public services get attacked constantly; contain the blast radius.

DNS

  • EssentialSwitch your DNS to an encrypted filtering resolverQuad9 (9.9.9.9), Cloudflare for Families (1.1.1.2 / 1.1.1.3), or NextDNS (custom filters).

    A filtering resolver blocks known malware, phishing, and tracker domains before any device on your network can reach them. It’s a 10-minute change with outsized benefit.

  • RecommendedTurn on DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT) at the router or resolver level.

    Encrypted DNS keeps your ISP (and anyone on the path) from snooping on or tampering with your DNS queries.

  • RecommendedSet the DNS choice at the router level so every device on your network inherits it.

    Handling it once centrally is far more reliable than configuring each device.

  • AdvancedIn your DNS filter, block tunneling providers that attackers commonly use: ngrok.io, *.trycloudflare.com, serveo.net, localhost.run, pagekite.net, and unauthorized Tailscale/ZeroTier coordinators.

    These legitimate services are often abused to create hidden paths back into networks. Block them unless your business genuinely uses them.

  • AdvancedBlock outbound DNS (ports 53 and 853) to external resolvers other than the one you chose.

    Otherwise malware and curious devices can bypass your filter by talking to a different DNS server.

Network segmentation (VLANs)

Most modern routers support splitting your network into separate “zones” called VLANs. Think of them as isolated floors in a building — each has its own access rules.

  • EssentialAt minimum, run a separate Guest network.

    Visitors (and smart devices) shouldn’t have the same access as your work computers.

  • RecommendedHomeUse three zones: Main (trusted), Guest, and IoT (smart devices, cameras, TVs).

    A single compromised smart bulb or TV shouldn’t be able to reach your laptop or NAS.

  • RecommendedSMBUse zones appropriate to your business: Staff, Guest, IoT, VoIP, POS/Payment, Management, Servers.

    Segmentation limits how far an attacker can spread and simplifies compliance (e.g., PCI-DSS for payment systems).

  • RecommendedSet inter-zone rules to default-deny, allowing only what’s specifically needed.

    Explicit allow-lists are safer than trying to enumerate everything to deny.

  • RecommendedEnable client isolation on Guest and IoT zones so devices on the same zone can’t talk to each other.

    Contains a compromised device to its own port — it can’t scan or attack its neighbors.

  • AdvancedSMBPut payment/POS systems on their own isolated VLAN.

    Reduces the compliance scope and blast radius if a workstation is compromised.

DHCP configuration

DHCP is what hands out IP addresses to devices when they join your network.

  • RecommendedUse DHCP reservations for printers, servers, cameras, access points, and anything else that should keep a stable address.

    Reserved addresses behave like static addresses but stay managed in one place.

  • RecommendedSet lease times around 24 hours for most networks; use 1–4 hours on guest networks.

    Shorter guest leases recycle addresses quickly and reveal stale devices faster.

  • RecommendedTurn on logging or alerts for new DHCP leases so you can see when a new device joins.

    The first sign of an unknown device on your network is often a new DHCP lease.

  • AdvancedSMBIf you have managed switches, enable DHCP snooping, Dynamic ARP Inspection, and IP Source Guard.

    These block rogue DHCP servers and common impersonation attacks on the LAN.

Configuration backups

  • EssentialBack up the router and firewall configuration after every meaningful change. Store the backup encrypted and off-device (password-manager note, encrypted cloud storage, or password-protected archive).

    When hardware fails or a change goes wrong, a good config backup is the difference between 30 minutes and 3 days of downtime.

  • RecommendedKeep the last 3–5 configurations so you can roll back.

    Sometimes you don’t find out a change was bad for a week.

  • RecommendedDocument how to factory-reset and restore each device. Walk through the procedure once so it isn’t new to you in a crisis.

    Untested recovery steps routinely fail when they matter most.

  • RecommendedSMBInclude switches, access points, and other managed network gear in the backup routine.

    The router isn’t the only device whose config you’ll lose when something fails.

Section 3

Wi-Fi

Wi-Fi is the easiest point of attack for anyone within physical range. Good encryption, strong passphrases, and proper segmentation shut that door.

Encryption & authentication

  • EssentialUse WPA3 if every device you own supports it; otherwise WPA2-AES (CCMP). Never use WEP, WPA (original), or TKIP.

    Older Wi-Fi encryption can be broken in minutes; the current standards cannot.

  • EssentialTurn off WPS (Wi-Fi Protected Setup).

    The WPS PIN system has a well-known flaw that lets attackers crack it by brute force.

  • RecommendedTurn on Management Frame Protection (802.11w / PMF) on all networks where supported.

    Protects against common Wi-Fi deauthentication attacks that kick you off and then impersonate the network.

  • AdvancedSMBUse WPA2/WPA3-Enterprise (802.1X) instead of a shared password for staff Wi-Fi.

    Each user logs in with their own credentials, so there’s no shared password to leak or rotate when someone leaves.

SSID & passphrase

  • EssentialSet a Wi-Fi passphrase of at least 16 characters. A random four-word phrase is stronger than a short complex one. Store it in your password manager.

    Long passphrases resist brute-force guessing; short ones don’t.

  • RecommendedPick a non-identifying network name (SSID) — avoid your full name, apartment number, or business name.

    Reduces targeted attacks and social-engineering signal.

  • RecommendedDon’t rely on hidden SSID or MAC filtering as security measures.

    Both are trivially bypassed by anyone serious; they mostly add support headaches.

  • RecommendedSMBRotate the staff Wi-Fi password at least annually, and immediately after anyone with access leaves the company.

    Departed staff often still have the password saved on a personal device.

Multiple networks & zone mapping

  • EssentialRun separate Wi-Fi networks for different trust levels, each mapped to its zone (see §2 VLANs):

    • Main / Staff → trusted LAN.
    • Guest → Guest zone with client isolation and no access to your LAN.
    • IoT → IoT zone with restricted outbound access.
    • SMB: optional Employee-BYOD → its own zone to keep personal phones off the staff network.

    This is what turns segmentation from a concept into something that actually happens — devices join whichever SSID matches their trust level.

  • RecommendedAfter any firmware upgrade, confirm each SSID is still on the correct zone.

    VLAN assignments occasionally reset on updates, silently merging networks.

Radio, bands & channels

  • RecommendedPrefer 5 GHz (and 6 GHz if you have Wi-Fi 6E) for modern devices; use 2.4 GHz for legacy and IoT gear.

    Modern bands are faster, less congested, and don’t reach as far outside your walls.

  • RecommendedUse non-overlapping channels (1, 6, or 11 on 2.4 GHz). Let the router auto-pick 5/6 GHz.

    Overlapping channels cripple each other’s performance.

  • RecommendedReduce transmit power if your signal covers far more than your space.

    Less signal leakage means less surface area for neighbors (and passersby) to attack.

Section 4

Devices, IoT & Endpoints

Every device on your network is a potential foothold. Keep them inventoried, updated, encrypted, and aware.

Inventory

  • RecommendedMaintain a short device inventory: name, purpose, owner, location, approximate EOL date.

    You can’t protect or retire what you don’t know you have.

  • RecommendedRun a network scan quarterly (Fing, runZero Community, Angry IP Scanner) and compare it to the inventory.

    Unknown devices are either forgotten by you or installed by someone else.

Device hygiene

  • EssentialChange default credentials on every device (cameras, printers, NAS, smart devices).

    Default credentials for nearly every consumer device are indexed in public databases.

  • EssentialEnable automatic updates on operating systems, browsers, firmware, and apps wherever possible.

    Almost every serious breach exploits a vulnerability that was already patched — the victim just hadn’t installed the update.

  • EssentialReplace devices at End of Life. Once a vendor stops releasing security updates, the device is a permanent risk.

    Unsupported devices accumulate known vulnerabilities that will never be fixed.

  • EssentialTurn on full-disk encryption on everything portable:

    • Laptops: BitLocker (Windows Pro/Enterprise), FileVault (macOS), LUKS (Linux).
    • Phones & tablets: iOS/iPadOS encrypt by default with a passcode; on Android, confirm Encryption is on in Settings → Security.
    • External drives and USB keys: BitLocker-to-Go, FileVault, or VeraCrypt.

    If the device is lost or stolen, encryption turns “data breach” into “just a hardware loss.”

  • RecommendedTurn off features you don’t use: UPnP on smart TVs, cloud relay on cameras, Bluetooth on servers.

    Every enabled feature is a potential way in; disable what you don’t use.

  • RecommendedSet a short auto-lock time on phones, tablets, and laptops (1–5 minutes), with a strong passcode.

    Stolen devices are the most common “physical” breach; auto-lock limits the exposure window.

  • RecommendedSMBDeploy endpoint protection (Microsoft Defender for Business, CrowdStrike, SentinelOne, Bitdefender) on all workstations and servers.

    Modern endpoint protection catches behaviors antivirus misses and provides alerting when something does get through.

  • AdvancedSMBEnforce encryption, passcode, and auto-lock via MDM policy (Intune, Jamf, Kandji) so compliance is verifiable.

    “Everyone should do X” is a hope; “MDM enforces X and reports who isn’t compliant” is a control.

Privacy — always-listening devices

Smart devices with microphones, cameras, or cloud back-ends can record, stream, or log activity — sometimes even when you think they’re idle.

  • RecommendedBe mindful of sensitive conversations near baby monitors, smart speakers (Alexa, Google Home, HomePod), smart TVs, video doorbells, security cameras, and voice-enabled remotes. Treat any room with these devices as potentially recorded.

    These devices have been subpoenaed, breached, and accidentally recorded conversations multiple times in the public record.

  • RecommendedMute or physically power off smart speakers during confidential calls, financial discussions, or medical conversations.

    The mute button isn’t always a hardware cutoff; a power cutoff always is.

  • RecommendedCover or unplug cameras (webcams, baby monitors, indoor security cams) when not in use.

    Cheap to do; removes the possibility entirely.

  • RecommendedPeriodically delete stored voice/video history in the device’s app (Amazon, Google, Apple, Ring, Nest all provide this).

    Less data retained is less data that can leak.

  • RecommendedTurn off “drop-in,” “audio detection,” and cross-device features unless you actively rely on them.

    These are the features most likely to record or share unintentionally.

  • RecommendedSMBDo not place consumer smart speakers or voice assistants in conference rooms, exam rooms, HR offices, or any space with confidential, privileged, or regulated conversations (HIPAA, attorney-client, finance).

    Convenience is not worth the privacy, legal, and compliance exposure.

Section 5

Backup, Monitoring & Physical

The parts of security that aren’t about configuration: how you recover, how you know something’s wrong, and how you keep physical gear safe.

Data backups

  • EssentialFollow the 3-2-1 rule: 3 copies of your data, on 2 different media, with 1 off-site.

    Single-point-of-failure backups routinely fail along with the original data.

  • EssentialHomeBack up personal data (photos, documents) to an external drive and a cloud provider (Backblaze, iDrive, iCloud, Google One).

    Ransomware and drive failures happen to everyone eventually; cloud + local recovers from both.

  • EssentialSMBBack up servers, file shares, and SaaS data (Microsoft 365, Google Workspace) to an independent backup service.

    Microsoft and Google are not your backup. If an employee deletes a mailbox or ransomware encrypts OneDrive, you need a separate copy.

  • EssentialTest a restore at least quarterly.

    An untested backup is just a hope. Real restores fail for surprising reasons — you want to learn that in a drill, not a crisis.

  • RecommendedUse immutable backups (S3 Object Lock, Wasabi immutability) or keep an offline copy.

    Modern ransomware specifically targets backup systems; immutability is what saves you.

For router/firewall configuration backups, see §2 Configuration backups.

Monitoring & logging

  • RecommendedEnable logging on the router/firewall (connection logs, blocked traffic, admin access).

    Without logs, you can’t investigate anything after the fact.

  • RecommendedTurn on email/push alerts for new admin logins, firmware updates, WAN failover, and unknown devices joining.

    You’ll catch problems early when you notice them, not when they’re already bad.

  • RecommendedMonitor bandwidth/throughput (router dashboard, LibreSpeed, Smokeping) to spot anomalies.

    Sudden large outbound traffic is often the first visible sign of a problem.

  • AdvancedSMBForward logs to a central log store (Graylog, Wazuh, Datadog) and retain at least 90 days.

    When something bad happens, you’ll want to see more than the last hour of history.

  • AdvancedSMBRun a monthly vulnerability scan against any internet-facing services (Shodan, Nessus Essentials, OpenVAS).

    You want to find your exposed problems before a stranger does.

Physical & environmental

  • RecommendedPlace router/APs in a central, elevated location, away from metal, microwaves, and cordless phones.

    Good placement fixes more “slow Wi-Fi” complaints than any other change.

  • RecommendedKeep networking gear in a ventilated area.

    Routers throttle and fail when overheated; it’s a surprisingly common cause of “random” outages.

  • RecommendedPut critical gear on a UPS sized for 15–30 minutes of runtime.

    Clean shutdowns prevent filesystem corruption, and short outages shouldn’t knock you offline.

  • RecommendedReplace UPS batteries every 3–5 years and test runtime annually.

    An aged UPS can provide seconds instead of minutes — exactly when you needed minutes.

  • RecommendedSMBLock the network closet/rack.

    Physical access to a network is the most powerful access there is.

  • RecommendedLabel cables and ports at both ends.

    Troubleshooting under pressure at 2 a.m. is much easier when you can read the labels.

  • AdvancedSMBMaintain a simple network diagram (draw.io, Lucidchart, Visio) and update it when things change.

    Anyone covering for you — including future you — needs a map.

ISP, connectivity & continuity

  • EssentialRecord your ISP account number, support line, and technician portal login somewhere accessible that doesn’t require your network to work.

    When the internet is down, you won’t be able to look it up online.

  • RecommendedKnow how to factory-reset each device and have the config backups ready.

    In a crisis, “reset and restore” is often the fastest path back.

  • AdvancedSMBConsider redundant WAN (secondary ISP, 4G/5G failover) for revenue-critical connectivity.

    A single-ISP outage can cost more in one afternoon than a year of the backup connection.

Section 6

Using Untrusted Networks (Client VPN)

“Untrusted” networks include coffee shops, hotels, airports, conferences, and any Wi-Fi where you don’t control the router. Different from the inbound VPN in §2 (which is about getting into your network); this is about protecting yourself when you’re out.

  • RecommendedUse a client VPN when on public or untrusted Wi-Fi — a reputable commercial provider (Mullvad, IVPN, Proton VPN) or your own WireGuard/Tailscale exit node.

    Public Wi-Fi still sometimes intercepts, redirects, or records traffic. A VPN tunnels your traffic off that network entirely.

  • RecommendedKeep automatic Wi-Fi join turned off for networks you don’t trust. Delete saved networks you no longer use.

    Your phone will happily re-join any SSID it’s seen before — including a fake one with the same name.

  • RecommendedPrefer mobile hotspot (tethering) from your phone over random Wi-Fi when handling anything sensitive.

    Your cellular connection is generally safer than a stranger’s Wi-Fi.

  • RecommendedConfirm your laptop and phone use HTTPS-only mode (Firefox, Chrome, Edge, and Safari all support it) so insecure sites require explicit confirmation.

    Defeats most on-network tampering attempts — every modern browser has this and it rarely breaks anything.

  • RecommendedBe careful with “trust this network” / “share files” prompts on unknown Wi-Fi. Choose Public.

    Private/Home profiles open up file-sharing and discovery services you don’t want exposed to strangers.

  • AdvancedTurn on Lockdown Mode (iOS/iPadOS/macOS) when traveling to higher-risk locations.

    Reduces the attack surface significantly — worth the feature trade-off on trips.

Section 7

Rogue-Device & Reverse-Tunnel Prevention

A “rogue dropbox” — a Raspberry Pi, Hak5 device, or compromised laptop plugged into an open port — typically initiates an outbound connection to attacker infrastructure. Because the connection is outbound, most firewalls let it through. These five controls give the most protection for the effort.

  • EssentialSecure the physical layer. Lock network closets and racks; disconnect unused wall jacks at the patch panel; turn off unused switch ports in the switch admin interface. Walk the space quarterly and check behind desks, printers, and in spare ports for unfamiliar hardware — keep a photo of the rack to compare against.

    The simplest rogue-device attack is literally plugging in. If there’s nothing to plug into, there’s nothing to exploit.

  • RecommendedDefault-deny outbound firewall on user/IoT segments (see §2 Firewall).

    Cuts off the “phone home” that reverse tunnels depend on.

  • RecommendedDNS filtering that blocks tunneling providers (see §2 DNS).

    Even if a rogue device is plugged in, it can’t reach its command server if DNS won’t resolve it.

  • RecommendedSegmentation with client isolation (see §2 VLANs).

    A rogue on the guest or IoT zone can’t pivot to the things that matter.

  • AdvancedInventory continuously and alert on new devices. Use runZero Community, Lansweeper, Fing, or scheduled nmap scans; send DHCP logs somewhere that can alert on unknown MACs joining. SMB Step up to 802.1X / network access control (NAC) (Microsoft NPS, PacketFence, UniFi Identity Enterprise, Cisco ISE, Aruba ClearPass) so devices must authenticate before they get an IP.

    NAC is the definitive control — unauthorized devices never get on the network in the first place.

Section 8

If Something Looks Wrong

The goal is to have a plan before you need one. Print this section or save it somewhere you can reach without your main computer.

First 15 minutes — stop the spread

  • EssentialDisconnect the affected device from the network (unplug the cable, turn off Wi-Fi, or remove it from the router). Do not power it off unless it’s actively destroying data — powered-off devices lose forensic evidence.

    Isolating stops the spread; keeping it running preserves what happened.

  • EssentialChange the passwords on critical accounts from a known-clean device: email first, then banking, then business-critical accounts. Re-enable MFA.

    Attackers often steal session tokens along with credentials; rotating them invalidates both.

  • EssentialDo not pay ransomware demands before consulting an incident response firm and/or law enforcement. Paying rarely works as advertised and funds future attacks.

    Many ransomware gangs don’t actually provide working decryption keys, and there may be legal constraints you’re unaware of.

Next 24 hours — understand and report

  • EssentialWrite down what you noticed, when, and what you did. Keep the list updated as you learn more.

    Memory is unreliable in a crisis; written notes are what an insurer, lawyer, or responder will need.

  • EssentialSMBNotify your cyber insurance provider and legal counsel before making public statements or paying anything. Most policies have specific requirements about notification timing and approved responders.

    Getting this wrong can void coverage.

  • RecommendedSMBContact an incident response firm (CrowdStrike, Arctic Wolf, Mandiant, Kroll, Secureworks, or a local MSSP) if the scope is unclear.

    Professional IR teams are far faster than DIY investigation and know what evidence to preserve.

  • RecommendedReport significant incidents to local law enforcement and, in the US, to the FBI’s Internet Crime Complaint Center at ic3.gov and CISA at cisa.gov/report.

    Reporting helps investigators and may be a regulatory requirement depending on your industry.

  • RecommendedSMBBe aware of breach-notification laws that may apply (state laws, HIPAA, PCI-DSS, GDPR). Your legal counsel should drive timing and content.

    Missing a required notification deadline creates liability beyond the breach itself.

Safe device disposal

When you retire a router, laptop, phone, or drive, do this before it leaves your hands:

  • EssentialSign out of all accounts; use “Find My” / “Erase iPhone / iPad / Mac” or the Android equivalent; factory-reset the device.

    Residual account sessions and saved passwords are a surprisingly common source of post-disposal compromise.

  • EssentialFor laptops and external drives, use the OS’s secure erase or encrypt then reset (BitLocker, FileVault). If the drive was never encrypted, physically destroy it.

    Consumer “delete” doesn’t actually remove data; encryption makes the remains unreadable.

  • EssentialFor routers, APs, and switches: factory reset, then perform a second reset after confirming the first stuck.

    Some devices keep hidden copies of configurations that a single reset misses.

  • EssentialRemove the device from any cloud management account (UniFi, Meraki, manufacturer cloud).

    A new owner shouldn’t be able to manage your old gear from their account, and you shouldn’t be paying for a license you no longer use.

  • RecommendedFor phones: remove SIM/eSIM, sign out of iCloud/Google, remove the device from Find My / Find My Device in your account.

    Activation locks can leave the next owner with a brick, and leftover account links can expose your data.

Section 9

Review Cadence

Set calendar reminders. Security hygiene that isn’t scheduled doesn’t happen.

  • Monthly — firmware updates, log skim, backup verification, quick MFA check on critical accounts.

  • Quarterly — device inventory reconciliation, test a full restore, review firewall rules, rotate any admin passwords in shared use.

  • Annually — full re-run of this guide, Wi-Fi passphrase rotation SMB, EOL hardware review, network diagram refresh.

Reference

Glossary

Plain-language definitions for the technical terms used throughout this guide.

Bridge mode
A configuration where your ISP’s router/modem stops acting as a router and just passes the internet connection through to your own router.
Client isolation
A Wi-Fi/VLAN setting that prevents devices on the same network from talking to each other. Useful for Guest and IoT networks.
Default-deny
A rule style that blocks everything by default and only allows specifically listed traffic. The opposite (allow everything except X) is weaker because it’s easy to miss something.
DHCPDynamic Host Configuration Protocol
How devices automatically get an IP address when they join your network.
DHCP reservation
A DHCP rule that always hands the same IP to a specific device, based on its MAC address.
DHCP snooping / DAI / IP Source Guard
Switch-level features that block rogue DHCP servers and common impersonation attacks. Require managed switches.
DMZ host
A setting that exposes one device completely to the internet, bypassing the firewall. Almost never a good idea.
DNSDomain Name System
The system that translates names like example.com into IP addresses.
DoH / DoT
DNS-over-HTTPS / DNS-over-TLS. Encrypted DNS, which keeps your DNS queries private and tamper-resistant.
Egress / outbound
Traffic leaving your network toward the internet.
End of Life (EOL)
The point at which a vendor stops releasing security updates for a product.
Firewall
A device or feature that controls which network traffic is allowed in and out. Your router almost always includes one.
Full-disk encryption (FDE)
Encrypts the entire storage drive of a device so it’s unreadable without the password.
IoTInternet of Things
Smart devices: cameras, doorbells, speakers, TVs, thermostats, appliances.
MAC address
A unique hardware identifier every network device has (looks like aa:bb:cc:11:22:33).
MAC filtering
A weak Wi-Fi “security” feature that restricts access based on MAC address. Trivial to bypass because MACs can be spoofed.
MDMMobile Device Management
A system that lets businesses enforce settings (encryption, passcode, updates) across fleets of computers and phones.
MFA / 2FA
Multi-Factor Authentication. Requiring a second factor (app, hardware key, SMS code) in addition to a password.
NACNetwork Access Control
A system (often using 802.1X) that requires devices to authenticate before joining the network.
NATNetwork Address Translation
How your router lets many internal devices share one public IP.
Overlay / mesh VPN
A modern style of VPN (Tailscale, ZeroTier, Netbird) that creates direct encrypted links between your devices without exposing anything to the internet.
PMF / 802.11w
Protected Management Frames. A Wi-Fi feature that protects against common deauthentication attacks.
Port
A numbered “door” on a network device. Each service listens on a specific port (e.g., HTTPS is 443).
Port forwarding
A firewall rule that sends incoming traffic on a port to a specific internal device. Every forward is a deliberate hole in your firewall.
PSKPre-Shared Key
A shared Wi-Fi password everyone on a network uses. Contrast with Enterprise (802.1X), where each user has their own credentials.
Reverse tunnel
An outbound connection from a compromised device to the attacker, used to let the attacker reach back in. Defeats traditional firewalls because the firewall only blocks inbound traffic.
SPIStateful Packet Inspection
A firewall that tracks connections and only allows inbound traffic that’s part of a legitimate outbound conversation. Standard on modern routers.
SSID
The name of a Wi-Fi network.
UPnPUniversal Plug and Play
A router feature that lets local devices automatically open firewall ports for themselves. Convenient, but routinely abused — usually safest to disable.
VLANVirtual LAN
A way to split a physical network into multiple logical networks with separate rules. How you make “Guest,” “IoT,” and “Staff” behave like separate networks on one router.
VPNVirtual Private Network
An encrypted tunnel. Two common uses: a client VPN protects your traffic on untrusted Wi-Fi; a remote-access VPN lets you reach your own network from outside without opening firewall ports.
WAFWeb Application Firewall
A specialized firewall that inspects web application traffic. Useful for public-facing sites.
WPA2 / WPA3
Wi-Fi encryption standards. WPA3 is newer and stronger; WPA2-AES is still acceptable. Anything older (WEP, original WPA, TKIP) is broken.
WPSWi-Fi Protected Setup
An older “easy Wi-Fi” feature with a known vulnerability. Disable it.
802.1X
A standard for network authentication where devices or users prove identity before getting network access. The foundation of most NAC systems and Enterprise Wi-Fi.