{"id":443,"date":"2018-02-07T17:40:58","date_gmt":"2018-02-07T17:40:58","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/five-ways-to-check-if-your-router-is-configured-securely\/"},"modified":"2019-05-29T11:27:42","modified_gmt":"2019-05-29T11:27:42","slug":"five-ways-to-check-if-your-router-is-configured-securely","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/","title":{"rendered":"Five ways to check if your router is configured securely"},"content":{"rendered":"<p class=\"wls-paragraph\">Cybersecurity nowadays requires more (and better) protective measures than ever before. These measures range from adopting what are acknowledged as best practices, through helping end-users to stay well-informed about upcoming threats and how to avoid them, to implementing internet security technology and keeping it up to date.<\/p>\n<p class=\"wls-paragraph\">In a dynamic environment where threats continually evolve and new vulnerabilities are identified almost daily, it is necessary to use the most up-to-date security tools, since they deal with protection measures for new and ever-shifting attack vectors.<\/p>\n<p class=\"wls-paragraph\">Whether we are speaking about the work, school or home environment, security must consider and protect all elements that could become gateways for possible attacks. In this article we will review some security aspects users should look at in a home network \u2015particularly those related to the configuration of its internet-connected router.<\/p>\n<h3><strong>1. Conduct router connectivity and authentication tests<\/strong><\/h3>\n<p class=\"wls-paragraph\">Recently, we published information at <a href=\"https:\/\/www.welivesecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">WeLiveSecurity.com<\/a> about <a href=\"https:\/\/www.welivesecurity.com\/2017\/10\/26\/secure-your-router-prevent-iot-threats\/\" target=\"_blank\" rel=\"noopener noreferrer\">how to secure your home router to prevent IoT threats<\/a>. Now we will review other important points for the administration and configuration of routers \u2015in particular, steps pertaining to ports and services.<\/p>\n<p class=\"wls-paragraph\">Routers allow administration and configuration using some ports in the local network; this could be done via Ethernet cable or wireless connection. Usually you can configure your router via the web, but routers also allow connections for other services and ports, such as FTP (port 21), SSH (22), Telnet (23), HTTP (80), HTTPS (443), or SMB (139, 445).<\/p>\n<p class=\"wls-paragraph\">In addition to these, there are various other well-known and well-used services whose default ports are established as internet standards \u2015defined by the Internet Assigned Numbers Authority (<a href=\"https:\/\/www.iana.org\/assignments\/service-names-port-numbers\/service-names-port-numbers.xhtml\" target=\"_blank\" rel=\"noopener noreferrer\">IANA<\/a>). Although the blocked port configuration might be set in your router by default, you can review it to ascertain the status and configuration settings. In other words, you can enable only the services you need, disable all others, and block unused ports. Even for remote connections, except where they are necessary.<\/p>\n<p class=\"wls-paragraph\">The same logic applies to the use of passwords for management of services. If possible, you should change both (admin) password and username, so neither is the out-of-the-box default. If the router default password has not been changed, it could be known to, or easily guessed by, attackers; if that is the case, they can log into your router and reconfigure it, or compromise your network.<\/p>\n<p class=\"wls-paragraph\">Also, we advise the use of long and complex passwords, or a <a href=\"https:\/\/www.welivesecurity.com\/2016\/05\/05\/forget-about-passwords-you-need-a-passphrase\/\" target=\"_blank\" rel=\"noopener noreferrer\">passphrase<\/a> for these purposes; you can use a password manager to create and store passwords in a safe place. Therefore, it is important to review the configuration of services and ports, the user accounts and the strength of passwords.<\/p>\n<h3><strong>2. Perform vulnerability tests on the router<\/strong><\/h3>\n<p class=\"wls-paragraph\">There is another aspect to consider when looking for weak points in your router settings \u2013 tests for routers that can be carried out using tools that automate tasks such as looking for known vulnerabilities. This type of tool includes information, options and suggestions on how to solve these possible problems. Attackers use similar tools to identify vulnerabilities in your router, so it\u2019s a good idea to use them too, so that your router is no longer low-hanging fruit.<\/p>\n<p class=\"wls-paragraph\">Some router tests include scanning for port vulnerabilities, malicious DNS server reputation, default or easy-to-crack passwords, vulnerable firmware, or malware attacks. Some also include vulnerability analysis of the router\u2019s web server component, looking for issues such as cross-site scripting (XSS), code injection or remote code execution.<\/p>\n<p class=\"wls-paragraph\">If you don\u2019t know about these attacks and breaches, be sure to find a router test (or a group of tests) that does as much as possible of the hard work for you. While it\u2019s not a complete test, a good way to start could be with the <a href=\"http:\/\/help.eset.com\/essp\/11\/en-US\/idh_page_homenetwork_protection.html?idh_page_homenetwork_protection.html\" target=\"_blank\" rel=\"noopener noreferrer\">Connected Home Monitor<\/a> tool.<\/p>\n<h3><strong>3. Verify connected devices in the network<\/strong><\/h3>\n<p class=\"wls-paragraph\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2018\/01\/router_devices.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-106885\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2018\/01\/router_devices-300x200.jpg\" alt=\"Router configuration\" width=\"650\" height=\"434\"><\/a><\/p>\n<p class=\"wls-paragraph\">A third aspect of maintaining the proper functioning and performance of the router and the network is the identification of connected devices. Sometimes, due to bad practices and the use of vulnerable protocols, it\u2019s possible for trusted devices to connect without proper authorization, and also for untrusted devices to connect.<\/p>\n<p class=\"wls-paragraph\">It is therefore a good idea to be aware of and able to identify all the devices that connect to your router: firstly, to avoid the consumption of resources by third parties that do so illegitimately and degrade the network\u2019s performance, and secondly, as a security measure, to prevent your information from being compromised.<\/p>\n<p class=\"wls-paragraph\">Whether this verification is done through an automated tool or by manually using the router\u2019s administration options, the appropriate next step consists of permitting allowed devices only, by using filters to restrict access to specific IP addresses or MAC addresses only.<\/p>\n<p class=\"wls-paragraph\">To start this activity, the Connected Home Monitor tool provides an easy-to-access list of connected devices, categorized by device type (e.g. printer, router, mobile device, and so on), to show what is connected to your home network. Then, you must make the changes yourself using your router interface.<\/p>\n<h3><strong>4. Update all devices on the home network<\/strong><\/h3>\n<p class=\"wls-paragraph\">The recent news of the vulnerability known as KRACK (Key Reinstallation AttaCK), which allows the interception of traffic between devices that connect to an access point in a Wi-Fi network, emphasizes again the importance of updates.<\/p>\n<p class=\"wls-paragraph\">For an attack to take advantage of this vulnerability, its perpetrator would normally have to be near the intended victim\u2019s Wi-Fi network. Success would allow the attacker to spy on communications or install malware. We always recommend updating all devices connected to your network (like computers, smartphones or tablets), once the manufacturers publish the security patches that address the vulnerability; also install the updates to the firmware of the routers, as soon as patches are available.<\/p>\n<p class=\"wls-paragraph\">Other practices, such as configuring computers for \u201cPublic Network\u201d mode, increase the security level of the device compared to the \u201cPrivate\/Home\u201d network mode, because it lessens the risk of attack across trusted devices. We would like to stress that the most essential thing to do is to keep computers and devices updated.<\/p>\n<h3><strong>5. Enable security options<\/strong><\/h3>\n<p class=\"wls-paragraph\">A fifth desirable practice is to enable the security options that are available in the configuration of the router, which vary depending on the model and type of device. Regardless of the router model used in your home network, we advise that you enable security options that are designed to offer more protection of your devices and the network.<\/p>\n<p class=\"wls-paragraph\">For example, some recent routers include configuration options that allow increased protection against known <a href=\"http:\/\/help.eset.com\/essp\/11\/en-US\/idh_page_homenetwork_protection.html?dos_attacks.html\" target=\"_blank\" rel=\"noopener noreferrer\">Denial of Service<\/a> (DoS) attacks, such as SYN Flooding, ICMP Echo, ICMP Redirection, Local Area Network Denial (LAND), Smurf and WinNuke. If enabling these options prevents your router and network performing properly, selectively disable them to improve performance.<\/p>\n<h3><strong>The protection of information \u2013 a never-ending<\/strong><strong> task<\/strong><\/h3>\n<p class=\"wls-paragraph\">We have just touched lightly on five practices that help to improve security levels. It\u2019s important to review the settings of your router and to change them, as needed, to contribute to the overall protection of the network, router, devices and, of course, your data; doing so will help block many of the entry points used by currently prevalent cybersecurity threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity nowadays requires more (and better) protective measures than ever before. These measures range from adopting what are acknowledged as best practices, through helping end-users to stay well-informed about upcoming threats and how to avoid them, to implementing internet security technology and keeping it up to date. In a dynamic environment where threats continually evolve<\/p>\n","protected":false},"author":5,"featured_media":1846,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[154,155],"tags":[],"class_list":["post-443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-home-user","category-how-to"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Five ways to check if your router is configured securely - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five ways to check if your router is configured securely\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity nowadays requires more (and better) protective measures than ever before. These measures range from adopting what are acknowledged as best practices, through helping end-users to stay well-informed about upcoming threats and how to avoid them, to implementing internet security technology and keeping it up to date. In a dynamic environment where threats continually evolve\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-07T17:40:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T11:27:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/router_configured-623x432.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Five ways to check if your router is configured securely\",\"datePublished\":\"2018-02-07T17:40:58+00:00\",\"dateModified\":\"2019-05-29T11:27:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/\"},\"wordCount\":1184,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/router_configured-623x432.jpg\",\"articleSection\":[\"home user\",\"how to\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2018\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/\",\"name\":\"Five ways to check if your router is configured securely - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/router_configured-623x432.jpg\",\"datePublished\":\"2018-02-07T17:40:58+00:00\",\"dateModified\":\"2019-05-29T11:27:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/router_configured-623x432.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/router_configured-623x432.jpg\",\"width\":623,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five ways to check if your router is configured securely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/02\\\/07\\\/five-ways-to-check-if-your-router-is-configured-securely\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Five ways to check if your router is configured securely - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/","og_locale":"en_US","og_type":"article","og_title":"Five ways to check if your router is configured securely","og_description":"Cybersecurity nowadays requires more (and better) protective measures than ever before. These measures range from adopting what are acknowledged as best practices, through helping end-users to stay well-informed about upcoming threats and how to avoid them, to implementing internet security technology and keeping it up to date. In a dynamic environment where threats continually evolve","og_url":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2018-02-07T17:40:58+00:00","article_modified_time":"2019-05-29T11:27:42+00:00","og_image":[{"width":623,"height":432,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/router_configured-623x432.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Five ways to check if your router is configured securely","datePublished":"2018-02-07T17:40:58+00:00","dateModified":"2019-05-29T11:27:42+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/"},"wordCount":1184,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/router_configured-623x432.jpg","articleSection":["home user","how to"],"inLanguage":"en-US","copyrightYear":"2018","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/","url":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/","name":"Five ways to check if your router is configured securely - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/router_configured-623x432.jpg","datePublished":"2018-02-07T17:40:58+00:00","dateModified":"2019-05-29T11:27:42+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/router_configured-623x432.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/router_configured-623x432.jpg","width":623,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Five ways to check if your router is configured securely"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/02\/07\/five-ways-to-check-if-your-router-is-configured-securely\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=443"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/443\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1846"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}