{"id":457,"date":"2019-01-17T15:43:58","date_gmt":"2019-01-17T15:43:58","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/new-years-resolutions-routing-done-right\/"},"modified":"2019-05-29T11:36:20","modified_gmt":"2019-05-29T11:36:20","slug":"new-years-resolutions-routing-done-right","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/","title":{"rendered":"New Year\u2019s resolutions: Routing done right"},"content":{"rendered":"\n<p>As another thing to improve this year, you may want to route your focus on a device that is the nerve center of your network and, if poorly secured, the epicenter of much potential trouble.<\/p>\n\n\n\n<p>How do you secure your network? For the most part, this honor goes to the one device that talks to all of your home\u2019s internet-connected devices: your router. This humble gadget may not store any of your personal data, but with all that traffic flying through it, taking good care of this network workhorse should be a key component of your security culture. And yet, we usually ignore security concerns that have to do with our routers.<\/p>\n\n\n\n<p>In our technology-dependent era, one such little black box is central to any home network (okay, many routers are neither black nor boxes, but we won\u2019t let that distract us, will we?). In fact, chances are your router doubles as a&nbsp;modem, or even the other way round, especially if it was supplied to you by your internet service provider (ISP). Of course, a consumer-grade router typically comes with an in-built wireless access point (WAP), so that we don\u2019t trip over cables. Regardless of your setup, the router is integral to the security of your network.<\/p>\n\n\n\n<p>For all the magic it can do, a&nbsp;typical router is normally forgotten as soon as it begins to fulfil its only obvious purpose \u2013 connecting our home to the internet. Devoid of even a speck of glamor and hidden in a corner or on the uppermost shelf, this device quietly does its thing, never attracting your attention unless something goes wrong with your internet connection. Which may prompt the question:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why care about routers, anyway?<\/strong><\/h2>\n\n\n\n<p>Simply put, a poorly secured router can put&nbsp;<em>all<\/em>&nbsp;devices on your network at the mercy of attackers. That is no hyperbole. The threats run the gamut, and a hacked router can:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>redirect you to a web page that phishes for your credentials,<\/li><li>dupe you into installing&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2017\/09\/21\/new-finfisher-surveillance-campaigns\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware-laced versions of legit software<\/a>,<\/li><li>be hijacked to conduct man-in-the-middle attacks (MitM) on what you would believe are secure and encrypted connections,<\/li><li>be corralled into a botnet in order to launch DDoS attacks against websites or even against&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/10\/24\/10-things-know-october-21-iot-ddos-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">aspects of the internet\u2019s infrastructure<\/a>,<\/li><li>be co-opted as an on-ramp to attacks at other devices within your network,<\/li><li>be used to spy on you via Internet-of-Things (IoT) devices,<\/li><li>be compromised with&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/06\/04\/router-reboot-how-why-what\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware such as VPNFilter<\/a>, or, as another threat du jour, be misused for&nbsp;<a href=\"https:\/\/www.theregister.co.uk\/2018\/08\/03\/mikrotik_routers_cryptocurrency\/\" target=\"_blank\" rel=\"noreferrer noopener\">covert cryptocurrency mining<\/a>.<\/li><\/ul>\n\n\n\n<p>And that is by no means an exhaustive list.<\/p>\n\n\n\n<p>To harden your router and stay safe from hacker shenanigans, you need to access and properly configure the device\u2019s settings. This may seem to be a&nbsp;daunting task, but that may only be due to fear of the unknown. For most, basic remedies are not, by any means, an ordeal, and they\u2019re enough to greatly improve the security of your router.<\/p>\n\n\n\n<p>Your router\u2019s admin settings can usually be accessed wirelessly by typing the router\u2019s IP address into any web browser\u2019s URL bar (the IP address is often 192.168.1.1 or 192.168.0.1, but check the label on your device or look up the address on Google). Arguably, a better way is to connect that long-forgotten thing, probably cloaked in a thick layer of dust, to your laptop via an Ethernet cable and only then type the IP address. In many cases, you can even reach the settings via a dedicated smartphone app.<\/p>\n\n\n\n<p>There are a few&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Sine_qua_non\" target=\"_blank\" rel=\"noreferrer noopener\"><em>sine quibus non<\/em><\/a>&nbsp;\u2013 beyond having a firewall turned on, of course \u2013 for a hardened router.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ditch the defaults&nbsp;<\/strong><\/h2>\n\n\n\n<p>Here, we can safely pick up from where&nbsp;<a href=\"https:\/\/blog.eset.ee\/2019\/01\/08\/new-years-resolutions-get-your-passwords-shipshape\/?lang=en\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">we left off last week<\/a>: Passwords invariably come into play when it comes to keeping your network safe and secure, doubly so when Wi-Fi connections are thrown into the mix. Out of all settings that come pre-configured for you from the manufacturer, the password to access the router\u2019s admin interface is the first thing you should replace with a strong and unique password or passphrase. Also, if possible, pick a non-generic username instead of the default one, which commonly in this case is one of these five options: \u2018admin\u2019, \u2018administrator\u2019, \u2018root\u2019, \u2018user\u2019, and no username at all.<\/p>\n\n\n\n<p>Besides reducing cost for the manufacturers, these and some other default configurations are intended to ease set-up and remote troubleshooting. However, the convenience factor is apt to cause trouble in that, for example, the login details are often glaringly obvious and shared across router models, and even entire brands. Indeed, the logins are there for the taking for anybody who can spare a minute searching on Google<em>,&nbsp;<\/em>or even less than that: suffice it to try one such absurdly easy-to-guess username\/password combination (in the vein of \u2018admin\/password\u2019) and it may very well work on a poorly configured router. In fact,&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/10\/19\/least-15-home-routers-unsecure\/\" target=\"_blank\" rel=\"noreferrer noopener\">ESET\u2019s test on 12,000 home routers<\/a>&nbsp;in 2016 found that one in seven such routers used \u201ccommon default usernames and passwords, as well as some frequently used combinations\u201d.<\/p>\n\n\n\n<p>With routers that permit wireless connectivity (which is the case with pretty much all consumer routers these days), the brand and model may be given away by the default name of your wireless network. Change that name, aka Service Set Identifier (SSID), to something that doesn\u2019t identify you or your location. You can also stop the SSID from being broadcast, but be aware that a snoop with even a modicum of technical chops will be able to sniff it out easily anyway.<\/p>\n\n\n\n<p>Also often enabled by default is a feature called Wi-Fi Protected Setup (WPS), which was originally intended to help bring new devices onto a network. However, due to a flaw in its implementation that relies on registrar PIN numbers and that makes the number easily crackable,&nbsp;<a href=\"https:\/\/arstechnica.com\/information-technology\/2011\/12\/researchers-publish-open-source-tool-for-hacking-wifi-protected-setup\/\" target=\"_blank\" rel=\"noreferrer noopener\">WPS can be easily subverted<\/a>. Ultimately, this sets the stage for attacks at your wireless password, aka pre-shared key (PSK).<\/p>\n\n\n\n<p>Another feature that is often enabled by default on routers and that poses a significant security risk is Universal Plug and Play (UPnP). Unless you\u2019re sure you need UPnP, which is intended to enable frictionless communication between networked devices but lacks any authentication mechanism, you should turn it off. Indeed, shut down any protocols and block any ports that aren\u2019t needed, as that will reduce the attack surface on your network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keep snoopers at bay<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/01\/NewYear_Snoopers.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/01\/NewYear_Snoopers.jpg\" alt=\"\" class=\"wp-image-121125\"\/><\/a><\/figure><\/div>\n\n\n\n<p>When it comes to Wi-Fi passwords (and, thus, controlling who can actually access your wireless network), this is your chance to be creative. You can go up to 63 characters, but, in fairness, that shouldn\u2019t really be necessary.&nbsp; That said, make sure your&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/videos\/make-strong-password\/\" target=\"_blank\" rel=\"noreferrer noopener\">password or passphrase is long and complex<\/a>, so that it can withstand brute-force attacks where ne\u2019ver-do-wells take countless stabs at a password in a bid to arrive at the right one. Of course, it must also be different from all your other login credentials, including the one you use to access the router\u2019s admin console.<\/p>\n\n\n\n<p>You also need to specify a security protocol for your wireless connection. There\u2019s not much of a choice here, and the only option worth recommending is WPA2, short for \u2018Wi-Fi Protected Access 2\u2019. For homes, WPA2\u2019s best flavor is its personal mode (WPA2-Personal aka WPA2-PSK) and underpinned by AES encryption, which is, for all intents and purposes, uncrackable with today\u2019s computing resources. Robust over-the-air encryption scrambles all data as it travels between a Wi-Fi-connected device and a router, ensuring that a snoop cannot simply read it even if they somehow get their hands on the data.<\/p>\n\n\n\n<p>There are two older Wi-Fi security modes that may still be available on your router \u2013 WPA\u2019s first iteration, simply called WPA, and the truly ancient Wired Equivalent Privacy (WEP). However, there\u2019s no reason to use either of them, especially the easily hackable WEP, as WPA2 has been mandatory on all Wi-Fi Alliance certified hardware since as far back as back 2006.<\/p>\n\n\n\n<p>Of course, some of us are eagerly awaiting the arrival of&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/06\/26\/wi-fi-wpa3-launched\/\" target=\"_blank\" rel=\"noreferrer noopener\">WPA3-enabled<\/a>&nbsp;networking hardware on the market. Since this new security standard is set to usher in several major&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/02\/09\/will-wpa3-improve-wifi-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">improvements for wireless security<\/a>, including better defense against password-guessing attacks, it really can\u2019t come soon enough.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Update, update!<\/strong><\/h2>\n\n\n\n<p>At heart, routers are computers, so their operating systems, embedded as firmware, need to be updated for security vulnerabilities. Indeed, routers are notorious for being riddled with security loopholes mainly due to their running outdated firmware, which is commonly because we, the router owners, never install such updates. This makes things so much easier for attackers, as many incursions are facilitated by simple scans for routers with known security holes.<\/p>\n\n\n\n<p>To check if your router\u2019s firmware is up-to-date, navigate to the device\u2019s admin panel. Unless you own a modern router that updates itself automatically or alerts you to new firmware versions, you will need to visit the vendor\u2019s website and check whether an update is available. If it is, well, you\u2019ll know what to do. This is not a one-time task, however, so be sure to check for new updates regularly, at least several times a year.<\/p>\n\n\n\n<p>It\u2019s entirely possible that, because the router\u2019s maker has stopped issuing updates for your device, there may actually be no updates to be installed. This can happen especially with older routers, in which case you\u2019re best off simply buying a newer one.<\/p>\n\n\n\n<p>At any rate, there\u2019s another reward for upgrading your firmware: Beyond updates to fix vulnerabilities, the new firmware version may also include performance improvements and new features, including those that have to do with its security mechanisms.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Bonus tips<\/strong><\/h2>\n\n\n\n<p>What else can you do, and with a minimal hassle factor, of course? Here are a few more quick tips:<\/p>\n\n\n\n<p>Any router should enable you to create several networks, which is particularly handy with easily hackable Internet-of-Things (IoT) devices. If your home is \u2018smart\u2019, consider quarantining all that IoT tech in a segregated network, so that its vulnerabilities cannot be exploited to access the data on your computer, smartphone, or storage devices. You can also set up a separate network for your children and their gizmos.<\/p>\n\n\n\n<p>Similarly, consider setting up a separate network for guests. That way, you only share your internet connection, not your network, and prevent the risk of malware from their devices jumping over to your digital assets in what is just one possible scenario how a guest can, however unknowingly, compromise your network.<\/p>\n\n\n\n<p>It\u2019s also good to disable remote management for your router to reduce the odds of attackers tampering with it from anywhere in the world, for example by exploiting a vulnerability. That way,&nbsp;<em>physical<\/em>&nbsp;access to your router will be required to make any changes to its settings.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>There is far more to router security than what we touched on in this article. However, even tweaking a few settings in the \u2018glue\u2019 that holds all of your internet-enabled devices together will go a long way toward bolstering your overall security. The \u2018benign neglect\u2019 with which we usually treat our routers can turn out to be very damaging.<\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2019\/01\/17\/new-years-resolutions-routing-done-right\/\">Welivesecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As another thing to improve this year, you may want to route your focus on a device that is the nerve center of your network and, if poorly secured, the epicenter of much potential trouble. How do you secure your network? For the most part, this honor goes to the one device that talks to<\/p>\n","protected":false},"author":5,"featured_media":1860,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[148],"tags":[],"class_list":["post-457","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>New Year\u2019s resolutions: Routing done right - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Year\u2019s resolutions: Routing done right\" \/>\n<meta property=\"og:description\" content=\"As another thing to improve this year, you may want to route your focus on a device that is the nerve center of your network and, if poorly secured, the epicenter of much potential trouble. How do you secure your network? For the most part, this honor goes to the one device that talks to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-17T15:43:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T11:36:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/NewYear_Router.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"New Year\u2019s resolutions: Routing done right\",\"datePublished\":\"2019-01-17T15:43:58+00:00\",\"dateModified\":\"2019-05-29T11:36:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/\"},\"wordCount\":1889,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/NewYear_Router.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/\",\"name\":\"New Year\u2019s resolutions: Routing done right - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/NewYear_Router.jpg\",\"datePublished\":\"2019-01-17T15:43:58+00:00\",\"dateModified\":\"2019-05-29T11:36:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/NewYear_Router.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/NewYear_Router.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Year\u2019s resolutions: Routing done right\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/17\\\/new-years-resolutions-routing-done-right\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New Year\u2019s resolutions: Routing done right - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/","og_locale":"en_US","og_type":"article","og_title":"New Year\u2019s resolutions: Routing done right","og_description":"As another thing to improve this year, you may want to route your focus on a device that is the nerve center of your network and, if poorly secured, the epicenter of much potential trouble. How do you secure your network? For the most part, this honor goes to the one device that talks to","og_url":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2019-01-17T15:43:58+00:00","article_modified_time":"2019-05-29T11:36:20+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/NewYear_Router.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"New Year\u2019s resolutions: Routing done right","datePublished":"2019-01-17T15:43:58+00:00","dateModified":"2019-05-29T11:36:20+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/"},"wordCount":1889,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/NewYear_Router.jpg","articleSection":["cybersecurity"],"inLanguage":"en-US","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/","url":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/","name":"New Year\u2019s resolutions: Routing done right - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/NewYear_Router.jpg","datePublished":"2019-01-17T15:43:58+00:00","dateModified":"2019-05-29T11:36:20+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/NewYear_Router.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/NewYear_Router.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"New Year\u2019s resolutions: Routing done right"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/17\/new-years-resolutions-routing-done-right\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=457"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/457\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1860"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}