Method 10: Scheduling

2 Shields

A schedule to start and stop access to the WiFi router can help mitigate some of the risks of hacking.

It won’t stop hackers entirely, but it will narrow the window of opportunity to be hacked by making the WiFi router available to them for only a limited amount of time.

Not only can scheduling WiFi access mitigate some of the hacking risk, it can be helpful in restricting or limiting internet access to appropriate times for some of the users. In a home setting, for example, parents can limit access after bedtime in order to promote kids getting a good night’s sleep.

A lot of the hacker’s tools for compromising a WiFi router today require time. By limiting the availability of the WiFi router, it can make hacking the WiFi router that much harder. It doesn’t stop it altogether, but it does throw up one more roadblock.

Unless you have a lot of background network services or really need to have internet access throughout the night, there is probably no reason to have the WiFi router on all of the time.

A lot of people don’t even think about it, but you can schedule your router to turn off access when you are sleeping, for example. In an office environment, perhaps you want to schedule the WiFi router to be on only during business hours.

By limiting access, you can potentially mitigate the hacking risk by forcing the hackers to work to your schedule. Their preference would be to hack when you aren’t looking—when you are asleep or away from the office. By forcing them to work when you do, it increases the potential that you may notice the hacking and be able to stop it—the network gets slow, the WiFi starts acting funny, or you notice unknown devices connected.

One great use is to turn off internet access for the kids when it’s bedtime, especially on school nights. Create a school night schedule, and then add rules that turn off the internet for their devices at those times, but leave parent's devices on.