skip to main content

Updating your browser to the most recent version gives you access to the newest features, but most importantly, it protects your computer from attacks. Most browsers update automatically by default, but if your browser is out of date for any reason, you can manually update it by doing the following:

  1. Open your browser menu.
  2. Find your browser’s About page and select it.
  3. Click the update button.
  4. Close your browser and relaunch it.

Most modern browsers follow similar steps, but there are some minor differences in the menus and buttons. To learn more about the how and why of updating your browser, read on as we go into specific details.

Is your browser slowing you down, or is it your internet provider? Use our speed test to see the speed of your connection and other helpful information.

Is your browser slowing you down, or is it your internet provider? Use our speed test to see the speed of your connection and other helpful information.

 

 

 

Why should I manually update?

Ideally, you probably don’t want to be doing updates manually. In general, it’s a good idea to set your browser to download and install updates automatically in order to keep it protected from any recently discovered vulnerabilities or exploits. There are, however, a few situations where you might want more control over when these updates are downloaded. For example, some satellite plans give you extra data during low-traffic hours that you can use for downloading software updates and other large files.

Users might also want to manually update their browser proactively. Some browsers make new updates available days or weeks before they roll them out as automatic updates. If you want to know about updates as soon as they become available, you should follow your preferred browser’s developer blog, such as the Chrome Dev Blog.

Which web browser is best?

See our guide to the best web browsers to make sure you’re getting a better, faster, more secure experience while using the web.

In any case, find the method that works best for you to keep your browser as current as possible to avoid security threats online.

How to update Chrome

To update your browser when using Google Chrome, follow these steps:

  1. Open Chrome.
Update Chrome Step 1
  1. Open the Menu (three dots in the top right corner).
Update Chrome Step 2
  1. Select Help > About Google Chrome from the menu.
Update Chrome Step 3
  1. Check to see if Chrome is up to date. If not, click Update Google Chrome.
  2. Close your browser and relaunch it to apply the update.

How to update Firefox

To update your browser when using Firefox, follow these steps:

  1. Open Firefox.
Update Firefox Step 1
  1. Open the Menu (three dots in the top right corner).
Update Firefox Step 2
  1. Select Help > About Firefox
Update Firefpx Step 3
  1. Click Restart to Update Firefox.

How to update Internet Explorer

Microsoft officially ended support for Internet Explorer 11 on June 15, 2022. That means that there will be no more official updates to the browser and thus you can’t update it, even if new security flaws are found. If you’re one of the last holdouts still using Internet explorer, it’s finally time to switch to another browser.

If any site you visit needs Internet Explorer, you can reload it with Internet Explorer mode in Microsoft Edge.

How to update Microsoft Edge

To update your browser when using Microsoft Edge, follow these steps:

  1. Open Microsoft Edge.
Update Microsoft Edge Step 1
  1. Open the Menu (three dots in the top right corner).
Update Microsoft Edge Step 2
  1. Select Help and Feedback > About Microsoft Edge.
  2. If an update is available, it will begin updating automatically.

How to update Safari

Apple has discontinued support for versions of Safari on non-Apple devices, so updating Safari is now integrated with upgrading your OS. To update your OS, follow these steps:

  1. Open the Apple menu in the top left corner of your screen.
Update Safari Step 1
  1. Select System Preferences.
Update Safari Step 2
  1. Click on Software Update.
Update Safari Step 3
  1. Click Upgrade now to update your OS, including Safari, or select Automatically keep my Mac up to date to turn on automatic updates to keep it updated in the future.

Stay one step ahead of threats

Keeping your browser up to date is one of the easiest things you can do to stay safe online. Automatic updates are the best way to keep on top of new versions, but it’s good to keep an eye on updates and manually update if you have to.

For more information, check out these additional resources:

  • Best overall
    nordvpn logo

    NordVPN

    • $3.39/mo.
  • Best for security
    express vpn logo

    ExpressVPN

    • $8.32/mo.
  • Best free option
    windscribe logo

    Windscribe

    • Uh, free!

VPNs come in endless varieties, but not all of them are worth your money. The best VPN services are fast, give you lots of servers and IPs to choose from, and keep your privacy secure by not logging your data. And of course, it helps if they come at an affordable monthly or annual rate. (Free VPNs are an option too—but only a select few are worthwhile since many can compromise your privacy.)

The VPNs in this guide deliver solid performance for many uses, covering all the bases for privacy, speed, streaming capabilities, and price. Read on for a look at the best VPNs to keep your browsing secret and secure.

Which VPN is best?

The best VPN service is NordVPN. It’s incredibly reliable, comes at a decent price, and has user-friendly desktop software that lets you select from over 5,500 servers in dozens of countries across the globe. The more servers there are, the more options you have, so NordVPN ensures you’ll find one that hasn’t been blocked and isn’t bogged down by too many other users.

NordVPN is faster and more secure than the majority of competing VPNs and even has features to let you access servers in countries notorious for blocking VPNs. It also has 24-hour customer support.

Pro tip:

Not sure why VPNs are important? Here are five reasons why you should use one.

Shopping around for new internet?

Enter your zip code below to see which providers are available in your area.

 

Best VPNs

Best forServicePrice# of serversMax devices per subscriptionGet it
Best overallNordVPN$81.36 per 2 yrs. ($3.39/mo.)5,000+6Sign Up
Best for securityExpressVPN$99.95 per yr. ($8.32/mo.)3,000+5Sign Up
Best for streamingCyberGhost$56.94 per 2 yrs. ($2.19/mo.)6,700+7Sign up
Best budget optionPrivate Internet Access$56.94 per 2 yrs. ($2.19/mo.)2,400+10Sign up
Best free optionWindscribeFreeUnknownUnlimitedSign up

NordVPN and ExpressVPN

These two are the most respected, reliable, high-end VPN services available. Both boast enormous networks and adopt respectable privacy practices. And they have options that let you connect to the US version of Netflix and other streaming services while overseas.

CyberGhost

Founded in Romania in 2011, CyberGhost goes the extra mile with a vast network of servers, a 45-day trial period, and support for a wide range of streaming platforms. So you can check out South African Spotify or Indian Amazon Prime or Europe’s Eurosport app if you so desire.

Windscribe

This is one of the only free VPN services worth using, with handsome speeds and a 10 GB monthly data cap. It offers good service and privacy protections, which is uncommon with many free VPNs.

Pro tip:

Most VPNs are subscription-based and feature various price tiers that incentivize you to pay a lump sum upfront for a year or more of service. However, many VPNs also come with free trial periods—so take your time and do a test drive before committing.

Should you get a free VPN?

You should get a free VPN if you’re on a budget and need a VPN for relatively limited purposes. But be careful when you pick one, because many free VPNs are full of ads, have slower speeds and fewer servers, and sometimes adopt questionable business practices (like logging your data and selling it to third parties).

VPNs that require a monthly subscription tend to be far more secure and give you a lot more options to work with. It costs more, yes, but you’re paying for better performance and peace of mind.

NordVPN

Best overall
nordvpn logo

$81.36 for 2 yrs. ($3.39/mo.)

Most popular price tier

  • 5,500+ servers in 59 countries
  • Works for 6 devices simultaneously
  • No data logging
  • 30-day money-back guarantee
  • Based in Panama

NordVPN enjoys a great reputation among VPN experts and internet security buffs, and some of its best features are designed to give you more flexibility and privacy even under extreme circumstances. But for lighter uses, NordVPN also has dedicated servers to let you access geo-specific versions of apps like Netflix and Hulu (like, say, British Netflix when you’re in America). And while VPNs do use up some bandwidth generally, NordVPN doesn’t put a noticeable drain on your internet speed.

The service comes with a “kill switch” feature (on both desktop and mobile applications) that will disable your internet if the VPN loses its connection. This saves you from accidentally exposing your IP address if the VPN server you’re signed onto stops working.

Just as helpful is NordVPN’s list of “Obfuscated Servers.” These come in handy if you’re in a country like China or Egypt, where governments block many VPNs. Obfuscated Servers bypass network firewalls and other forms of censorship, giving you a handy alternate route to access the VPN.

Pros:

  • Intuitive user interface
  • Excellent security features

Cons:

  • High subscription fee
  • Limited servers for torrenting

Travel warning:

If you’re using a VPN overseas, read up on local regulations in the country you’re in so you don’t inadvertently break any laws. Some countries ban VPNs outright and others impose restrictions on how you can use them.

ExpressVPN

Best for security
express vpn logo

$99.95 billed every yr. ($8.32 per month)

Most popular price tier

  • 3,000+ servers in 94 countries
  • Works for 5 devices simultaneously
  • No data logging
  • 30-day money-back guarantee
  • Based in the British Virgin Islands

ExpressVPN is pretty much neck-and-neck with NordVPN in terms of reliability, performance, and usefulness. Speed tests have shown that ExpressVPN delivers some of the fastest VPN speeds around. It also has a proven record in protecting users’ privacy. When one of its servers was seized by Turkish authorities in 2017, an investigation turned up no information from users—a sure sign the company doesn’t keep logs of user data.

Like NordVPN, ExpressVPN has a “kill switch” feature (available only for desktop in ExpressVPN’s case) and a fleet of Obfuscated Servers, letting you use the service even in the most censored nations. It also lets you pay in Bitcoin, an option that probably isn’t necessary for most users but may be appealing if you want to be top-secret about your internet presence.

Pros:

  • Fastest speeds compared to rivals
  • Proven track record for privacy

Cons:

  • Lacks a kill switch for mobile
  • Costs more than many VPNs

Pro tip:

You can use a VPN to see whether your internet service provider (ISP) is throttling your internet speeds.

Here’s how to do it: take our speed test to run a quick initial diagnostic, sign onto your VPN, and run the speed test again. Does it display the same speed or a faster one? If it’s faster on the VPN, your ISP may be blockading your bytes.

Read our guide to ISP internet throttling for more tips on seeing if you’re getting the speeds you’re paying for.

CyberGhost VPN

Best for streaming
cyberghost vpn logo

$56.94 for 2 yrs. ($2.19/mo.)

Most popular price tier

  • 6,700+ servers in 88+ countries
  • Works for 7 devices simultaneously
  • No data logging
  • 45-day money-back guarantee
  • Based in Romania and Germany

 

Sign up

Recognizable by its lovable “Ghostie” mascot, CyberGhost VPN appeals to the streaming crowd, boasting a host of servers specially optimized to bypass geographic restrictions and network firewalls. You can use CyberGhost to access a wide range of online streaming services—anything from Netflix US to Zurich-based TV platform Zattoo.

CyberGhost also holds up well for internet privacy and security. It has a “kill switch” feature (although not for its mobile apps), an ad blocker, and regular Transparency Reports so you can stay on top of its efforts to protect digital privacy.

Pros:

  • Dedicated servers for streaming
  • Affordable prices

Cons:

  • Slower speeds over long-distance servers
  • Complex desktop user interface

Private Internet Access

Best budget option
private internet access logo

$56.94 for 2 yrs. ($2.19/mo.)

Most popular price tier

  • 2,400+ servers in 77 countries
  • Works for 10 devices simultaneously
  • No data logging
  • 30-day money-back guarantee
  • Based in the United States

 

Sign up

Private Internet Access covers all the basics and comes at a lower price than many top-rated rival VPNs. You can connect 10 devices simultaneously on one account—twice as many as what’s allowed on most VPNs. It doesn’t log your data and there’s a “kill switch” function for both desktop and mobile to keep you safe from exposure if the VPN’s connection drops.

The service recently expanded its money-back guarantee “trial” period from seven days to 30 days. And it has a lot of servers that allow torrenting, which is a plus if you’re into that sort of thing. All in all, it’s a great pick if you want a VPN that’s solid and affordable.

Pros:

  • Allows many device connections
  • Comes at a low price

Cons:

  • Provides basic features
  • Lacks customer support chat

Is your VPN working?

If you’ve signed up for a VPN and want to make sure it’s connecting, use an IP address check tool to get your real IP address and write it down. Now, log in to one of the VPN’s servers and use the same tool to check the IP. If it displays a new IP, then your VPN is activated.

Windscribe

Best free option
windscribe logo

$69 billed every yr. ($5.75/mo.)

Most popular price tier (for paid version)

  • Undisclosed number of servers in 60+ countries
  • Works on unlimited devices simultaneously
  • Minimal data logging
  • Free and paid plans available
  • Based in Canada

Windscribe is one of the few VPN services that offers a free option that actually works great and doesn’t do sketchy stuff with your data. It logs some of your data, but its logs are limited to basic details about when you last signed in and how much data you’ve used over the month, so you won’t need to worry about being overexposed if there’s a data breach. 

The free version gives you a 10 GB monthly data limit, which is quite generous for a free plan. (The paid option gives you unlimited data.) It delivers solid speeds, gives you access to Netflix, and features other privacy-preserving functions that are standard on top-listed paid VPNs.

The paid version of Windscribe gives you more options, and it comes at a good price too—the yearly plan costs $49 upfront, which calculates out to $4.08 per month. However, you’ll still get a cheaper overall price from Private Internet Access.

Pros:

  • Quick and easy setup
  • Strong privacy protections

Cons:

  • Slow long-distance speeds
  • Limited access to servers on free version

What is a VPN?

VPN stands for “virtual private network.” It’s a connection that encrypts your data as you use the internet, disguising your IP address and shielding your internet activity from potential monitoring.

VPN services maintain servers and IP addresses in multiple locations across the globe. You access the VPN by signing on to one of those servers, which then makes it appear as though you’re accessing the internet from one of those locations rather than where you actually are.

A VPN comes in handy for a bunch of reasons:

  • It keeps you hidden if you’re working on a public Wi-Fi network.
  • It prevents government authorities from tracking your internet activity.
  • It bypasses geographic-based restrictions and censors, letting you access blocked websites and platforms.

Streaming services like Netflix will often flag and blacklist IP addresses connected to some VPNs, but a good VPN will have multiple options for you to still log on. (Head back up the page to see our best VPN for streaming.)

What to look for in a VPN

A good VPN is fast, reliable, and affordable. It should have policies in place to maintain your privacy and security. And it’s a plus if it also includes features like dedicated IP addresses and servers optimized for accessing streaming platforms.

There are countless VPNs you can sign up for, but you should be careful about which one you choose. When you use a VPN, you’re trusting it to keep all your internet activity secure—so you want to make sure the VPN is actually trustworthy, right? Here are a few important things to watch out for.

No data logging

Choose a VPN that doesn’t log your data as you’re using the service. Many top-rated VPNs do this as a matter of policy to ensure your privacy in the event of a data breach. If you have additional concerns about privacy, read over the VPN’s privacy policy and do some research to see if it has a good reputation among data-security specialists.

Stay away from lesser-known free VPN services, which sometimes draw revenue by selling your data to a third party. (One exception would be Windscribe, which we describe farther up on this page as a quality free VPN service.)

Pro tip:

If you want to make sure your VPN is legit, the cybersecurity site That One Privacy Site maintains a helpful VPN comparison chart that gives a breakdown based on a VPN’s strengths and weaknesses.

Dedicated IPs

Rather than choosing from a list of many servers and IPs, a dedicated IP address gives you a single, stable IP that you can use to host a website or a server while still running the VPN. You usually pay extra for a dedicated IP, but it’s helpful for running a business or blog.

Optimized servers

Specific servers can be optimized for using streaming services. Junky VPNs may host a bunch of old IP addresses that have already been burned by streaming companies, but a good VPN will likely have a list of fresh options available.

Pro tip:

Take a look at the VPN’s About page or research its technical features to see if it can give you access to specific streaming apps and platforms—like the US version of Netflix, which is blocked on many VPN servers (but not all of them).

Our verdict

NordVPN is the best VPN out there because it’s easy, fast, and secure. It offers lots of servers and IPs to choose from and comes with extra functions to boost your privacy and give you the access you need.

ExpressVPN, CyberGhost VPN, and Private Internet Access are fantastic options as well if you want a paid service with deluxe features. ExpressVPN will give you even more security assurance and faster speeds. CyberGhost is great for streaming. And Private Internet Access is a bit more affordable.

If you’re looking for a free VPN, you can’t do much better than Windscribe, which has great security standards for a free service and gives you a generous 10 GB per month to use. Generally, though, we recommend avoiding free VPNs.

VPNs FAQ

What is the best VPN?

NordVPN is the best VPN on the market because it’s fast, secure, intuitive, and it comes at a decent price considering all the advanced features you get.

Are VPNs legal?

VPNs are legal in many countries, including the United States, Canada, and the United Kingdom. However, some countries ban them outright, including Belarus, North Korea, Iraq, and Turkmenistan, according to Top10VPN.com. Other countries impose heavy restrictions on their usage. Make sure you look up local laws and read security news updates before accessing a VPN while traveling overseas. Look up local laws and read security news updates before accessing a VPN while traveling overseas.

Also—this should be obvious—but going online to do illegal activity will still be illegal if you’re doing it over a VPN.

What is a VPN used for?

VPNs can be used for accessing blocked websites, getting around geo-specific restrictions on streaming services, and generally keeping your internet activity secure from prying eyes. They work by giving you proxy access to a separate server, disguising your original IP address and making it appear as though you’re accessing a website or media platform from a different location.

Are VPNs safe?

Many VPNs are safe to use, but make sure you’re using one with robust security safeguards and a policy against logging your data usage. If a VPN is logging your internet history, it can sell your private information to a third party. Your info can also get leaked if a government entity seizes a VPN’s server or if it experiences a data breach through hacking or malware.

Should I use a VPN?

You should use a VPN if you do sensitive activities on the internet (like online banking) over a network that you worry is insecure. You should also use a VPN if you want added security while you’re signed onto an unsecured public Wi-Fi network or using the internet while traveling internationally.

VPNs also let you access websites and apps that are censored, blocked, or have geographic restrictions in place (although you should always be aware of local laws).

How much do VPNs cost?

VPNs cost anywhere from $45 to $100 per year. You can pay for a VPN on a monthly basis, but the cost tends to be higher if you’re on a month-to-month plan since many VPN services give bigger discounts when you sign up for longer and pay upfront.

There are also free VPNs, but those come with hidden costs—including the risk that your data could be tracked by the VPN itself or your bandwidth could be hijacked by the service.

Internet issues are just a way of life, like getting a flat tire or burning a turkey in the oven. Something problematic will always pop up while you still live and breathe—network troubles on your provider’s side, storms blowing down lines, the speed woes of a tired old router. Something.

But what if you suspect foul play? What if all your devices load the same website no matter what you type into the address bar? Or, even worse, you sit at your computer, utterly speechless, as a “ghost” seizes your mouse and opens your bank account? Not fun.

Those two scenarios alone are good signs of a hacked wireless router. But don’t worry: we’ll clue you in on how to recognize a hacked router, how to fix it, and how to make sure it never happens again.

Are you troubleshooting speed issues?

You may not have a hacked router but a slow internet plan. Enter your zip code below to find a faster plan in your area.

Signs that someone hacked your router

There are many signs of a possible router hack that can throw up a red flag. Some are general and could apply to other router-related issues. Others are a sure sign that someone else now controls your network.

Sign #1—You can’t log in to your router

First, let’s be clear that your inability to sign in to your router or gateway doesn’t always mean you’ve been hacked. There have been plenty of times when we returned to a router we previously tested, and it (rather rudely) denied us access to the settings. This is not an uncommon problem. It usually means you’re entering the wrong password, you misspelled the password, or something on the router side is corrupt. Case closed.

With that said, there’s also the slim possibility that someone hacked your router. The attacker may have figured out the credentials, logged in, and changed the password to lock you out. After that, the attacker has free reign to change additional settings and make your life miserable.

But why did the attacker target you? Perhaps you clicked on a clever email or message link, and now the hacker has full control of your home network. Hackers also probe the internet for vulnerable routers they can use to create botnets, steal your bank login info, and so on.

Welcome to the modern-day World Wide Web.

So, whether you’re hacked or just having password issues, the only remedy is to reset your router to its factory defaults.

Immediate action: Follow our instructions on how to reset your router.

Sign #2—All internet browsers lead to the same site

Browser hijacking is a sure sign that you have a hacked router or gateway.

In this case, a hacker logged in to your router and changed its Domain Name System (DNS) settings—the system that matches numeric IP addresses with alphanumeric ones you can easily remember, like google.com.

By doing so, the hacker can redirect all internet traffic through your router to a malicious DNS server. This server will lock you to specific websites that can steal your information and install malicious software on every internet-connected device you own.

Immediate action: Log in to your router and change the DNS settings and password. If you can’t log in, reset your router. You should also scan every device with antivirus software to make sure there’s nothing on your devices that’s hijacking your browser.

Sign #3—There’s strange software on more than one device

If you see new, unfamiliar software on more than one device—especially if you didn’t download it intentionally—there’s a good chance someone hacked your router and remotely installed malware onto your devices.

Strange, uninvited software includes browser toolbars, fake antivirus clients, and other programs that will generate random popups on your screen or within a browser.

If you have multiple computers, this uninvited software may be on all of them. Malware can replicate on a single device and spread across wired and wireless connections, similar to how a virus spreads from person to person.

Immediate action: Log in to your router and change the password. If you can’t log in, reset your router. Afterward, make sure your router has the latest firmware. Be sure to uninstall the strange software from your device(s) and run an antivirus client.

Keep kids in check!

Oh boy, do we love our kids, but they sure can initiate a hair-pulling experience when they download questionable software without permission. This scenario is where parental tools are a great resource—check out our list of the best routers with parental controls for a few upgrade ideas. We also list the best parental control apps and tips on how to keep kids safe online.

Sign #4—You receive a ransomware message

Ransomware messages are a good sign that you have a hacked router. These attackers can seize control of the router and demand money in return for its release. The message may appear in the form of an email, instant message, text, or a popup generated by uninvited software installed on your device.

Immediate action: Don’t pay a dime, and follow our instructions on how to reset your router. Be sure to create a unique password that hackers can’t guess.

Did you know?

Phishing is another email-based way to hack into your router. The message could appear to originate from your internet provider stating that a hacker compromised your router and that you should click the supplied link to resolve the issue. The resulting webpage could then log in to the router using the default credentials if you never changed them. Never click links in emails from unknown sources.

Sign #5—You see unrecognized devices on your network

You can use the router’s web interface or a compatible mobile app to see a list of devices connected to your home or office network. For example, the Linksys Smart Wi-Fi interface provides a network map—just click on a device to see its assigned address.

When you look at the map, all local devices have a derivative of the router’s private IP address. If your router’s address is 192.168.1.1, for example, then all device addresses should start with the first three numbers (192.168.1).

However, a device remotely accessing your router won’t have an address that matches the first three numbers of your router’s private address.

Immediate action: Kick the unknown device(s) off your network and change the password. Disable remote access if you never use it.

Sign #6—You can’t control your device

If you sit in front of your computer and watch an uninvited, unseen guest move the mouse and access your banking information, you definitely have a hacked router.

In this scenario, the hacker has remote access to your device and can open any file or online account using the passwords you store in the operating system or browser.

Immediate action: Unplug your devices and disconnect your router from your modem. After that, follow our instructions on how to reset your router. Change your passwords, too.

Sign #7—Your internet speeds are slower than snails

Slow internet speeds aren’t uncommon. There may be issues with your provider, too many devices downloading at one time, and so on. But if you experience extremely slow speeds along with other symptoms on this list, chances are you have a hacked router.

Your speeds could be slow because the hacker seized your full bandwidth for the following:

  • Botnet activity
  • Distributing malware to other networks
  • Remote connections to your devices
  • Cryptojacking
  • General internet piggybacking

Immediate action: First, use our tips on how to speed up your internet to see if the problem is just a connection issue. If you think that someone hacked your router, try to change the password. If you can’t, follow your instructions on how to reset your router.

Are you experiencing slow internet speeds?

Download our speed test app, run it multiple times during the day, and compare the results with the speeds advertised with your internet plan.

Are you experiencing slow internet speeds?

Run our speed test multiple times during the day and compare the results with the speeds advertised with your internet plan.

How to fix a hacked router or gateway

You can easily and quickly fix a hacked router. There’s no need to throw it out the window and purchase a new one.

Step 1: Disconnect the router or gateway

If you have a standalone router, disconnect the Ethernet cord to avoid communicating with the modem. If you have a gateway, disconnect the internet connection instead.

In both cases, disconnect all other wired and wireless devices.

Step 2: Power cycle or reset your router or wireless gateway

In some router hacking cases, a simple power cycle (reboot) works as a quick fix. This method clears the memory of any malicious code and refreshes your public IP address. Just pull the plug, wait 30 seconds, and then plug the cord back into the outlet.

In other cases, you may need to reset your router to its factory settings if an infection persists or you can’t log in. A power cycle cannot remove severe infections like VPNFilter.

To factory reset your router, find its reset button—it’s either surface-mounted or recessed on the back. Press and hold the button—you’ll need a paperclip for a recessed button—for 10 seconds until your router’s LEDs indicate a reboot.

Step 3: Change the password

Once the router reboots, log in and change the password. You can use one of the best password managers to create one and retrieve it from your account when needed.

If you reset the router, be sure to use a strong password when prompted to set one during the setup. Do the same with your Wi-Fi network, too.

Actually, we suggest you create a passphrase instead of a password. It’s a long string of unrelated words filled with symbols and numbers. Make it something you can remember but isn’t easily guessed.

Immediate action: Read our guide on how to change your Wi-Fi network name and password.

Step 4: Update the firmware

Set your router to update its firmware automatically if it’s not already. And if your router doesn’t give you the option to update automatically, set yourself a reminder to check every month or so.

But carry out either method with caution, as faulty firmware can render your router useless. Check the manufacturer’s notes to make sure the latest firmware is stable. You shouldn’t have any issues with new firmware, but it doesn’t hurt to be cautious and proactive. Routers aren’t cheap.

Immediate action: Read our guide on how to update the firmware on routers from several popular brands.

Did you know?

The three-stage VPNFilter malware is a perfect example of how malicious software can infect a router (and network-attached storage). In fact, it persists after a reboot, making it highly dangerous to your sensitive information and devices. It exploits security vulnerabilities in the router’s firmware to gather sensitive data and send it back to hackers using the Tor network. Moreover, it can add malicious content to traffic that passes through an infected router.

How to prevent a router hack

Use the following suggestion to safeguard your devices and sensitive data against hackers.

Stay on top of firmware updates

Your router is a miniature computer with a processor, system memory, and storage that houses the operating system (firmware). Unfortunately, firmware is never bulletproof, as there can be bugs in the code and security holes. Attackers will utilize these unpatched flaws and access your router with ease.

Manufacturers distribute firmware updates regularly to squash these bugs and patch vulnerabilities. Generally, we suggest you enable automatic firmware updates if the feature isn’t toggled on already and you never manually install new firmware. Log in to your router and toggle on automatic updates if they are not already.

However, be aware that things can happen. Bad firmware uploaded to a manufacturer’s distribution server can brick your router. Malware-infected firmware distributed to a router can lock you out. Auto-updates are convenient, but there’s a rare chance the update can go awry and leave you with a $300 paperweight. For this reason, some manufacturers don’t support auto-updates.

Read our guide on how to update the firmware on routers from several popular brands.

Use a secure password

Most routers now ship with a unique passcode you enter when connecting to Wi-Fi for the first time. The setup process requires you to create the administration and Wi-Fi passwords before you can even use the router. Some require a cloud account prior to starting the setup process, like mesh networking systems.

Overall, never use an easily guessed password with your router or Wi-Fi network—even if it’s full of upper- and lower-case letters, numbers, and symbols. These include names of pets, children, other family members, and anything that links to your interests. Believe it or not, the two most used passwords are still password and 123456. Like, really?

A hacker can use free online tools to carry out a brute-force attack—a trial-and-error method that continuously enters every possible password until one works. Hackers can also use a library attack, which uses words pulled from a dictionary. These attacks can quickly crack an easy eight-character alphanumeric password.

As we suggested earlier, use a passphrase instead of a password. It’s a string of unrelated words with symbols and numbers that’s harder to crack than any password you create.

Schedule routine reboots

A monthly reboot is good for the router, as it can clear the system memory and refresh all connections.

Additionally, your internet provider assigns a public IP address to your router. It usually refreshes every 14 days anyway (unless you pay for a permanent “static” address), but a reboot gives you an extra refresh if hackers obtained one of your previous addresses.

Disable remote access

Remote access is a feature for changing the router’s settings when you’re off the network, like from a hotel room. Most routers now have two methods, but the one you should be concerned about lies within the web interface. It’s an easy entry point for attackers, especially if you use a weak password.

Based on the routers we’ve tested, this feature is disabled by default in favor of cloud-based access through mobile apps. Still, you should check to see if it’s disabled, and if not, turn it off immediately. Only use this version of remote access if the app doesn’t have the settings you need to change off-network—and only do so sparingly.

Be sure to use strong passwords or passphrases when you set up a cloud account (if you choose not to use the complex ones supplied by Android and Apple devices). Also, enable biometrics so you’re not manually entering login credentials out in public.

Disable WPS

Wi-Fi Protected Setup (WPS) has good intentions. It allows users to connect their devices to a wireless network without a password. Simply press the WPS button on the router, or enter an eight-digit PIN provided by the router.

But the convenience has a major drawback. Hackers can use a brute-force attack to figure out the PIN in 4 to 10 hours—they don’t need access to the physical button. You can easily disable WPS through the router’s backend and instead use our guide on how to share your Wi-Fi network’s password to any device.

If you have a Linksys router, for example, you can disable WPS by doing the following:

Step 1: Select Wi-Fi Settings displayed under Router Settings.

Step 2: Click on the Wi-Fi Protected Setup tab.

Step 3: Click the toggle so that it reads OFF.

Step 4: Click on the Apply button. You must click this button so that WPS and its related PIN are completely disabled—clicking on the toggle without applying the change isn’t enough.

Change the network name

The Service Set Identifier (SSID) is your wireless network’s name. All routers broadcast the manufacturer’s name by default, like Linksys_330324GHz or NETGEAR_Wi-Fi. Anyone within range can see this name, know who built your router, and search the internet for the default login credentials if they’re available.

However, the router prompts you to rename the wireless network during the setup process for that very reason. If you ignored the router’s request, now is a good time to return to the settings and change the network name. Use whatever you want, just don’t advertise anything that can help attackers infiltrate your home network.

If you have band steering turned on, you’ll only need to change one SSID. If band steering is turned off, you’ll have two or three connections to rename. We normally add a “2” or “5” suffix to distinguish between the different bands, like “clearlink2” and “clearlink5” as seen in our router reviews.

Finally, network names can be up to 32 characters long.

Want to keep hackers off your network?

We suggest one of the best routers for security.

How to protect your devices from hacks

There’s more to protecting your network against hackers than securing your router. You need safeguards in place to protect your devices and personal data, too, should an attacker take control of your router.

Computers and mobile devices

Lock your device with biometrics or a passcode

Use facial recognition and fingerprint scanning to lock your devices and accounts versus using passwords. Passcodes and patterns are better than passwords, too, but you run the risk of someone guessing them correctly by viewing the smudges on your screen.

Keep all software current

Device manufacturers like Apple and Lenovo release system updates to squash bugs in the code, optimize performance, and fill security holes. Software developers do the same, so be sure every platform, desktop software, and app you use is current.

Never install questionable software

If the desktop software or app—or even the website that hosts it—looks shady, then don’t install it. Always get your apps and software from verified sources versus back-alley repositories lurking in the dark corners of the internet.

Never connect to an unsecured public network

An unsecured public network means the Wi-Fi connection doesn’t use any security. The data you send and receive from an unsecure Wi-Fi access point isn’t protected from eavesdropping hackers eager to steal your info.

Use a VPN service

Many modern routers now support OpenVPN, a free VPN service you can use to hide your online activity. All you need is to enable the server on your router and install the client software on your devices. We also provide a list of the best VPN services if your router doesn’t include a VPN server.

Turn off Bluetooth

Bluetooth is another form of wireless communication. Device manufacturers like Apple say to keep it turned on “for the best experience” but the Federal Communications Commission suggests you turn it off when not in use, as hackers can access your device by spoofing other Bluetooth devices you use. If you must enable Bluetooth, use it in “hidden” mode.

Use Two-Factor Authentication

Always, always enable two-factor authentication on every account you use. It’s a pain, we know, but that added layer of security keeps hackers at bay should they somehow get your login credentials. For example, Microsoft Authenticator requires you to verify a login request in the mobile app before you can log in to your Microsoft Account on any device, including the Xbox consoles.

Never click or tap on strange links

Malware you unintentionally download to your computer or mobile device could lead the way to a hacked router. Here are several ways you can get unwanted malware:

  • Click on a link in a phishing email or chat message
  • Connect an infected flash drive
  • Access a malicious website
  • View infected ads

Computers only

Keep your antivirus current

Apple macOS doesn’t include built-in antivirus because hackers rarely ever target the platform. Microsoft Windows is a different story, however, and includes antivirus protection for free. Be sure to keep it and any third-party antivirus software you have installed on Mac or Windows up-to-date, so you stay protected against the latest threats.

Never disable your firewall

All computing devices have a firewall that monitors your network traffic flow but you can disable it on Mac and Windows. This is a bad idea, as you remove all restrictions and open the door for hackers to slip in and infiltrate your device. We provide instructions on how to re-enable your firewall on Windows and Mac if, for some reason, it’s disabled.

Sign up for our newsletter. Get more from your internet.

Have a better, faster, more secure experience with your internet.

By signing up, you agree to our Privacy Policy & Terms and Conditions.

Our pick: Which password manager is best?

LastPass is our go-to solution for the best password manager. It checks all the right boxes: desktop and mobile support, password sharing, file storage, family management, dark web monitoring, a password generator, and more. It feels more complete overall, thanks to a good balance of free and premium features.

Get the best internet to complement your password manager

Many internet providers now include a free security suite when you sign up for new internet service. If it doesn’t, enter your zip code below to see what else is available in your area.

The 7 best password managers

Compare password manager features and prices

Best forServicePrice*Best featuresGet it
Best overallLastPass Free–$48.00/yr.
  • Unlimited passwords
  • Password sharing
  • View on LastPass
    Best for Apple devices1Password $36.00–$60.00/yr.
  • 1GB cloud storage
  • Travel Mode
  • View on 1Password
    Best for usabilityDashlaneFree–$60.00/yr.
  • Built-in VPN
  • Dark web monitoring
  • View on Dashlane
    Best for businessKeeper$35.00–$75.00/yr.
  • Biometrics
  • Record sharing
  • View on Keeper
    Best for budgetsRoboForm$16.70–$83.50/yr.
  • Bookmark management
  • Password audit
  • View on RoboForm
    Best free optionBitwardenFree–$40.00/yr.
  • Text sharing
  • Self-host option
  • View on Bitwarden
    Best no-cloud password syncSticky PasswordFree–$20.00/yr.;
    $100.00/life
  • Biometrics
  • USB portable version
  • View on Sticky Password

    What should you look for in a password manager?

    The best password manager should generate long, unique passwords that are nearly impossible to crack. It’s essential for day-to-day use across all accounts because passwords are often reused, too short, and easily guessed.

    A password manager should also support multiple operating systems, like Windows and Android. Be sure to pick a password manager that is in active development and offers end-to-end encryption, if possible.

    Finally, a password manager should list “zero knowledge” somewhere on its product page. That means the developer doesn’t have access to your data. If a password manager advertises device synchronization (most do), that data should reside on the developer’s cloud servers as an inaccessible encrypted blob.

    For a more in-depth look at the essential features to consider in a password manager, jump ahead to our expanded section below.

    Best overall: LastPass

    Best overall
    LastPass Logo

    Pricing

    • Free
    • Premium: $36.00/yr. (1 user)
    • Families: $48.00/yr. (6 users)
    • Teams: $48.00/yr. (per user)
    • Business: $84.00/yr. (per user)

    Features

    • Password generator
    • Password autofill
    • Secure vault
    • Password sharing
    • Encrypted notes
    • Two-factor authentication

    Availability

    • Desktop: Windows, Mac, Linux
    • Browser extensions: Chrome, Edge, Firefox, Opera, Safari
    • Mobile: Android, iPhone, iPad

     

    View on LastPass

    LastPass is an excellent password manager for storing everything you need, from login credentials to addresses to credit cards.

    The free version offers up the basics, such as unlimited passwords, password sharing with a friend or family member, two-factor authentication, a password generator, and password autofill. 

    The drawback, however, is that the free service locks users into one device type—a computer or a mobile device, but not both. Users can switch between the two device categories, but only three times.

    The Premium and Family plans, naturally, remove the device type limitations. The Premium plan targets a single user and adds 1GB of cloud storage, dark web monitoring, fingerprint and YubiKey support, a security dashboard, and the ability to share passwords with more than one friend or family member. 

    The Family plan targets six users and builds upon the Premium plan with unlimited shared folders and family management.

    Pros:

    • Unlimited password storing
    • Password sharing

    Cons:

    • No monthly payment option
    • Only one device type supported on the free version

    Best for Apple devices

    Best for iOS and macOS

    Pricing

    • Individual: $36.00/yr. (1 user)
    • Families: $60.00/yr. (5 users)
    • Teams Starter Pack: $19.95/mo. (10 users)
    • Business: $84.00/yr. (per user)

    Features

    • Unlimited devices
    • Unlimited passwords
    • Password generator
    • Custom vaults
    • 365-day password retrieval
    • Password sharing

    Availability

    • Desktop: Windows, Mac, Linux
    • Browser extensions: Chrome, Firefox, Edge, Brave, Safari
    • Mobile: Android, iPhone, iPad
    • Command-line options

     

    View on 1Password

    1Password launched in June 2006 and is similar to LastPass in terms of features.

    Like its competitor, 1Password allows you to store login credentials and other sensitive data like credit cards. However, because there is no free edition, you have premium features right from the start. These include 1GB of storage, support for an unlimited number of devices, technical support, and a Travel Mode that temporarily removes data from your devices when you travel to other countries.

    The Family plan builds on the Individual plan by adding support for up to five individuals. Users can set permissions and create vaults for each individual without the need for separate subscriptions. Item history backup allows users to recover deleted or changed passwords up to one year before the current date.

    You can add additional people to the Family plan for $1 per person per month.

    Pros:

    • Supports Face ID
    • Allows you to create and share custom vaults

    Cons:

    • No free version
    • No live chat or phone support

    Best for usability: Dashlane

    Best for usability

    Pricing

    • Free
    • Premium: $60.00/yr. (1 user)
    • Friends & Family: $90.00/yr. (10 users)
    • Starter: $240.00/yr. (10 users)
    • Business: $36.00/yr. (per user)

    Features

    • Password sharing
    • Two-factor authentication
    • Dark web monitoring
    • Built-in VPN
    • Autofill
    • Unlimited passwords and devices on Premium plans 

    Availability

    • Desktop: app.dashlane.com
    • Browser extensions: Chrome, Chromium browsers, Firefox, Safari
    • Mobile: Android, iPhone, iPad

    Dashlane has been around since 2012. It’s not much different than the other password managers on our list, offering password storage, form and payment autofill, two-factor authentication, password generation, a digital wallet, and so on.

    The Friends & Family plan allows users to add up to five other individuals. You can create a private account for each member and manage them all—along with the billing—through the dashboard. This plan costs $90 per year, although you can make monthly payments of $9 per month (unlike the other password managers on our list). The same goes with the Premium plan: $60 annually or $6.50 monthly.

    All new accounts start users with a 30-day Premium subscription trial, expanding the services to unlimited passwords and devices. The Premium model also adds dark web monitoring and unlocks the built-in VPN feature to protect your data from eavesdroppers as it travels down the internet highways.

    Dashlane still has a free version, from what we can tell, but you wouldn’t know it by looking at the website. You can find the features list buried in the support articles, which includes unlimited passwords, a password generator, two-factor authentication, and more.

    Pros:

    • Monthly plans
    • Built-in VPN (Premium)

    Cons:

    • Storage for only 50 passwords on the free plan
    • High price for families

    Best for business: Keeper

    Best for business
    Keeper Security logo

    Pricing

    • Personal: $34.99/yr. (1 user)
    • Family: $74.99/yr. (5 users)
    • Business Starter: $24.00/yr. (per user)
    • Business: $45.00/yr. (per user)
    • Enterprise: Get a quote

    Features

    • Private vaults
    • Team management
    • Shared team folders
    • SSO integration
    • Two-factor authentication

    Availability

    • Desktop: Windows, Mac, Linux
    • Browser extensions: Chrome, Firefox, Safari, Edge, Opera
    • Mobile: Android, iPhone, iPad

    While Keeper Security does provide password manager plans for individuals and families, Keeper Business and Keeper Enterprise are great solutions for offices and corporations. They not only increase productivity by eliminating manual password entries but also help prevent password-related security breaches.

    With Keeper Business, each user has a private encrypted password vault. All confidential informationwhether it’s a file or a passwordis stored as a record, each with a built-in password generator to create unique, stronger passwords as needed. Other features include shared team folders, team management, and activity reports.

    Meanwhile, Keeper Security doesn’t provide pricing online for its Keeper Enterprise solution. This plan includes everything offered in Keeper Business along with automated team management, email auto-provisioning, SSO authentication (G Suite, Azure, Okta), developer APIs, and more.

    Pros:

    • SSO integration
    • Two-factor authentication

    Cons:

    • Add-ons can be costly
    • Dark web monitoring is extra

    Best for budgets: RoboForm

    Best for budgets
    RoboForm logo

    Pricing

    • Free
    • Premium: $16.70/yr. (1 user)
    • Family: $33.40/yr. (5 users)
    • Business: $39.95/yr. (per user)

    Features

    • Unlimited passwords
    • Password generator
    • Password audit tool
    • Emergency access
    • One-click logins
    • Cloud backup (Premium)

    Accessibility

    • Desktop: Windows, Mac
    • Browser extensions: Chrome, Edge, Firefox
    • Mobile: Android, iPhone, iPad

    Siber Systems’ RoboForm has been around since 2000, although the Premium plan didn’t emerge until 2010.

    The big selling point of this password manager is its fast account logins that use a single click or tap. It’s also inexpensive, making it one of the cheapest password managers on our list.

    The free version is robust, supporting unlimited passwords, cloud backup, bookmark management, login shares, and more. RoboForm Premium builds upon the free version with priority live customer support and synchronization across an unlimited number of devices. A shared folder is tossed into the premium plan, while the emergency access component allows users to grant access to their accounts. The free model only enables users to receive emergency access.

    The Family plan simply expands RoboForm Premium to five users.

    Pros:

    • Offers a free version
    • Has one-click logins

    Cons:

    • No dark web monitoring
    • No Linux desktop app

    Best free option: Bitwarden

    Best free option

    Pricing

    • Free
    • Premium: $10.00/yr. (1 user)
    • Family: $40.00/yr. (6 users)
    • Teams: $3.00/mo. (per user)
    • Enterprise: $5.00/mo. (per user)

    Features

    • Unlimited passwords
    • Password generator
    • Self-host capability
    • Two-step login
    • Device synchronization
    • Emergency access (Premium)

    Accessibility

    • Desktop: Windows, Mac, Linux
    • Browser extensions: Chrome, Safari, Firefox, Opera, Edge, Vivaldi, Brave, Tor Browser, DuckDuckGo for Mac
    • Mobile: Android, iPhone, iPad
    • Command-line options
    • Web app

    If you’re looking for a great, free password manager, Bitwarden is the one to get. It’s open-source software, meaning you’ll see many more features in the free version than others on our list while keeping the Premium and Family plans highly affordable.

    Unlike other password managers on our list, this solution syncs across all devices without needing a paid subscription. Moreover, it has a self-host component, meaning you can ditch Bitwarden’s cloud service and create your own local server to store and synchronize your encrypted data blob across devices.

    The Premium plan adds 1GB of cloud storage and file sharing, emergency access, vault health reports, the Bitwarden Authenticator, encrypted file attachments, and support for additional two-step solutions like YubiKey. The paid Family plan increases the user limit to six.

    Pros:

    • Text sharing
    • Self-host component

    Cons:

    • No monthly plans for personal accounts
    • No biometric 2FA option

    Best no-cloud password sync: Sticky Password

    Best no-cloud password sync

    Pricing

    • Free
    • Premium: $20.00/yr. (1  user)
    • Premium: $50.00 for life (1 user)
    • Teams Premium: $29.99/yr. (per user)

    Features

    • Unlimited passwords
    • Password generator
    • Biometrics support
    • USB portable version for Windows
    • Secure notes
    • Wi-Fi sync (Premium only)

    Accessibility

    • Desktop: Windows, Mac
    • Browser extensions: Chrome, Chromium browsers, Firefox, Brave, Opera, more
    • Mobile: Android, iPhone, iPad

    The big selling point with Sticky Password is the ability to synchronize your encrypted data blob with other devices without the need for the cloud. Everything is synchronized locally using your local network, keeping your data off cloud servers for better peace of mind.

    The free model includes unlimited passwords, an autofill tool, a password generator, two-factor authentication, secure notes, biometrics support, and a tool for creating a portable USB password manager for Windows devices. This latter feature allows users to install the password manager on a USB stick or memory card and access their encrypted login credentials on any Windows PC—no cloud access is required. That means no more saving passwords in a text file on your external storage device.

    The Premium model adds the Wi-Fi sync component, although you can still use the cloud for backup and synchronization. Password sharing is another Premium ingredient, along with priority customer support. Finally, Lamantine Software will donate a portion of each Premium subscription to the Save the Manatee Club. Unfortunately, there is no Family plan made available at the time of this writing.

    Pros:

    • Wi-Fi sync option
    • Biometric support

    Cons:

    • No Family plan
    • No Wi-Fi sync in free model

    Do you have the fastest, most secure internet connection?

    If your internet provider doesn’t have the security options you need, enter your zip code below to see what’s available to you.

    Password manager features

    Password managers, in general, have identical core features. We go more in-depth with some of these basics so you have a better understanding of why they’re important.

    Password generator

    While having a password vault is great, chances are many of those passwords are repeated across services, are too easily guessed, or were unearthed in a data breach. A password generator is essential because it can create a strong, random password based on absolutely nothing. It’s just a long string of letters, numbers, and symbols that don’t link back to your favorite pet or TV show. 

    Of course, the iPhone, iPad, and Android will generate a password for you. However, using a universal password generator found in a password manager allows you to quickly apply new passwords across all devices.

    Item sharing

    Item sharing is an essential tool if you plan to share account credentials. A good example here is a streaming service like Netflix or Disney+, where someone inside or outside the household wants access to the service. Item sharing doesn’t just apply to passwords either: you could share notes, credit cards, and so on—any data you don’t want to transmit openly and unsecurely.

    Dark web monitoring

    The dark web is a part of the internet that is accessible only by specific web browsers. Search engines do not index these sites, so you won’t find them using traditional browsers like Chrome and Safari. It’s a place where users conduct activities behind the public-facing side (the open web). 

    That doesn’t mean these activities are instantly nefarious, but stolen user credentials are typically broadcasted, sold, and purchased on the dark web. The monitoring process scans these websites for anything related to end-users, like email addresses, passwords, credit card numbers, and so on.

    Cloud storage

    There are two aspects to this feature to consider. First, data is synchronized across devices using cloud storage. Developers don’t have access to this data—it’s just an encrypted data blob that’s uploaded and downloaded as needed. 

    As shown above, Sticky Password has a Wi-Fi option, while Bitwarden has a tool to create a local service. Regardless, uploading and downloading data is required for multidevice synchronization, whether it’s local or in the cloud.

    Second, premium services typically provide general online storage to back up sensitive documents and send them as encrypted attachments. Examples would be tax forms, scanned personal ID cards (like your driver’s license), a Social Security card, a passport, and so on.

    Emergency access

    Being able to grant someone access to your password manager account is actually a good thing.

    For example, you have accounts with Netflix, Hulu, Disney+, MAX, and so on. You’re presently tethered to a hospital bed, one of your kids wants to binge-watch the latest Marvel TV show at home, and Disney+ has signed you out. You can’t remember the password, and you now fear the Hulk-sized wrath you’re about to hear over the phone.

    By granting access to your password manager, your adult significant other can sign in and obtain the service login(s) they need. LastPass allows you to give one individual access to your password manager. 1Password is different: It has a tool to create a PDF with the master password stashed inside.

    Zero knowledge

    When choosing a password manager, documentation should list this feature. “Zero knowledge” means that your data is inaccessible by the password manager developer, even if said data resides on their cloud servers. Because the encryption key resides on the end user’s device, there is no unpacking the data on the server-side. Cloud-based data is used only to synchronize multiple devices and is nothing more than a pile of digital junk for hackers.

    As for master passwords, they’re stored locally on your device. When entered, passwords convert into a key that unlocks a data key that decrypts and encrypts the password vault. All of this happens on the device side, so developers have “zero knowledge” of unlocking and retrieving your data on both ends.

    That doesn’t mean these activities are instantly nefarious, but stolen user credentials are typically broadcasted, sold, and purchased on the dark web. The monitoring process scans these websites for anything related to end-users, like email addresses, passwords, credit card numbers, and so on.

    Our verdict

    LastPass has been our favorite password manager for some time, and that likely won’t ever change even though developer LogMeIn discontinued multidevice synchronization in the free version.

    Overall, LastPass is a solid pick as a free password manager, but it’s even better through its paid tiers, thanks to cloud storage, multidevice support, dark web monitoring, and emergency access.

    Still, you really can’t go wrong with any of our recommended password managers. Just weigh your exact needs against what you’re willing to pay. If you want a free client, stick with Bitwarden. If you don’t mind an annual fee, LastPass is your best option, although 1Password comes in at a close second.

    Sign up for our newsletter. Get more from your internet.

    Have a better, faster, more secure experience with your internet.

    By signing up, you agree to our Privacy Policy & Terms and Conditions.

    FAQ about password managers

    Why should you use a password manager?

    You should use a password manager to keep your online accounts more secure. It’s a safer option than using the same password across sites or writing your passwords down.

    How does a password manager work?

    Once users sign in to a password manager, they manually add login credentials for services like Google, Netflix, Amazon, and so on. All login information goes into a digital “vault” stored as an encrypted ”blob” in the cloud unless the service specifically uses on-device storage.

    When you log in to the password manager using another device, it generates a new encryption key and stores it locally. The service then downloads the encrypted blob, granting you access to your stored credentials.

    To provide better security, password managers include a password generator for creating unique passwords across the board.

    Are password managers safe to use?

    Yes, password managers are safe to use because they encrypt login credentials on a device level. Even if hackers manage to break into a password manager server, they cannot access your information without obtaining the encryption key stored on your device(s).

    Go free or premium: Which is best?

    There’s always a tradeoff between using a free password manager and paying for a premium account. For instance, LastPass allows only one device type when using the free plan: computer or mobile. The Premium plan eliminates this restriction. Ultimately, you need to decide what you need from a password manager and if its free features best address those needs.

    Seriously, what is a data blob?

    Short for Binary Large Object, a blob is a collection of raw, binary data stored as one large file. The blob is encrypted, keeping your data safe from potential hackers—unless they obtain the master password. Developers can’t even access the contents without that password.

    Image of a laptop on a hook

    If your wireless home network is slower than it should be, it might not be the fault of your equipment or your internet service provider (ISP). Someone might be stealing your Wi-Fi. Fortunately, there are ways to detect and remove uninvited guests on your home network and make sure they don’t come back.

    Is your connection slower than it should be? Take our speed test to find out.

    How can someone steal my Wi-Fi?

    Wireless networks make it easy to connect all your devices to the internet, but it also makes it easier for other people to use your connection. This has been true since the earliest days of wireless transmission. The first wireless hack occurred in 1903 when Nevil Maskelyne hacked Marconi’s wireless telegraph in order to send a rude poem during a public demonstration.1

    Perhaps unsurprisingly, wireless hacking became common in the early days of Wi-Fi, when security protocols were lax and most people were new to the technology. At this time, hackers would go “wardriving,” driving through neighborhoods looking for unsecured wireless networks that they could use to connect to the internet for free.2 While this might conjure images of shadowy agents in high-tech surveillance vans, all it really took was a college kid with a laptop, some hacking software, and a “cantenna”—a signal amplifier antenna made out of a tin can.3

    Although most wireless routers have security features enabled by default, many network attacks still begin with a hacker wardriving through a neighborhood, looking for network vulnerabilities (often still using a cantenna). Having hackers on your network is bad for several reasons. They can do any of the following:

    • Use your connection for illegal activities
    • Use packet sniffers to steal passwords and other information
    • Redirect your browser to fake sites to steal your information
    • Install malware on your devices

    Of course, while lax security might be an open invitation to hackers, Wi-Fi thieves are more likely to be neighbors trying to get free internet access. This is especially common if you live in a large apartment building, since your router signal is probably strong enough to be picked up from almost anywhere in your building and probably several of the surrounding buildings as well.

    Your neighbors probably aren’t trying to steal your credit card numbers, but freeloaders will slow down your connection speed. So unless you gave them permission to use your Wi-Fi, kick them off.

    How to check for Wi-Fi thieves

    If you think someone is stealing your Wi-Fi, the first step is to check. Some methods are simple, while others require a bit more technical savvy.

    Check the lights on your router

    Most routers have a series of indicator lights that let you know when the router is powered on or connected to the internet. It should also have a light that shows wireless activity. A quick way to see if you have freeloaders is to turn off all your wireless devices and see if the light is still blinking. If it is, someone else is on your network.

    This method isn’t very practical if you have a lot of devices in your home—everything from your phone to your fridge could be trying to connect. But if your computer is the only device that should be connected to the internet, this is a quick way to catch Wi-Fi thieves in the act.

    Use an app

    There are apps for both mobile and desktop computers that can be used to detect unwanted devices on your network. There are also web-based apps like this router checker from F-Secure that will look for indications that someone has hacked into your network.

    Check wireless client list

    Although it’s a bit more complicated, the surest way to see if an unauthorized user has broken into your network is to check the list of current devices in your router’s settings. Here’s how to do this:

    1. Log in to your router.
    2. Find the list of current wireless clients.
    3. Look for unknown devices.

    Every phone, computer, and smart device you own will show up in this list as a unique MAC address. If you know for a fact that you have only five wireless devices and there are six active devices in the list, you definitely have a freeloader. You can also look up the MAC address (a type of network identification number) for each of your devices and see if there are any on the list that don’t match. MAC addresses are often listed in a device’s settings alongside its IP address.

    Check router logs

    If you didn’t find anything when checking the active client list but still believe someone’s been getting on your network, you can check your router’s logs. You can access past activity logs from the same menu in your router settings where your current wireless clients can be found.

    The downside is that it’s a bit of a needle in a haystack. It’s not easy to look at a huge list of numbers and determine which one doesn’t belong.

    The advantage of going to the logs is that your moocher doesn’t have to be logged on to your network for you to catch them. Also, if you have an idea of when the problems started, you can see if any new MAC addresses started popping up around those times.

    How to secure your wireless network

    Once you know that someone is stealing your Wi-Fi, you need to kick them off your network. The first step is to change your network name and password. If the internet thieves are just freeloading neighbors, this is usually enough to get rid of them. But it’s also a good idea to make sure that you’re using the most secure settings on your router.

    There are several protocols used to secure wireless networks and most routers give you several options. The oldest and least secure of these is WEP (Wired Equivalent Privacy), which was created in the late ‘90s. Don’t use WEP.

    WPA stands for Wi-Fi Protected Access and was created to fix the major security flaws in WEP.2 The newest version of this standard is WPA2, which also incorporates the Advanced Encryption Standard, also known as the AES encryption protocol. This is why, on some devices, this feature is called AES instead of WPA2. You should always enable WPA2/AES security on your router if it’s available.

    If your router doesn’t offer WPA2 security, you might want to buy a more secure router.

    Using a secure password on your wireless network is the most important thing you can do to keep your Wi-Fi secure, but there are lots of other steps you can take. For more information, check out our guide to keeping your router secure.

    If it’s not thieves, why is my Wi-Fi so slow?

    If you’ve gone through your router logs with a fine-tooth comb and haven’t found any unauthorized devices, people probably aren’t stealing your Wi-Fi. So, why is your Wi-Fi still slow? There are a couple possible reasons.

    Is it just the Wi-Fi?

    Before you spend an entire afternoon on the phone with customer service, try plugging your computer directly into your router. Did that fix your speed problems? If it did, then the problem is with your router. You can always buy a new one, but there are a few tricks you can try first. To find out how, check out our step-by-step guide to improving your Wi-Fi speed.

    If plugging in to your router didn’t resolve your speed issues, the problem isn’t just your Wi-Fi. It’s your entire internet connection.

    When does it slow down?

    If your network slows down at peak hours (usually in the evening when everyone is getting home from work), then this might be normal slowdown due to internet traffic. Cable connections share bandwidth between houses in the same neighborhood, so you can get lower-than-advertised speeds if you and your neighbors are all trying to use the internet at once. The only way to avoid this is to avoid peak hours or switch to a more reliable connection like fiber.

    If your internet slows down for a few days or weeks every month, your internet service provider (ISP) might be throttling your speed once you pass your monthly data cap. This can often be fixed by upgrading to a more expensive monthly plan or by purchasing additional data from your ISP.

    Is it always slow?

    If your connection is constantly slower than your ISP’s advertised speed, it could be a problem on their end. Contact your provider’s customer service department to ask why your speed is so slow and when it will be back up to speed. Every network experiences occasional slowing and outages due to maintenance. But if customer service can’t tell you when your speeds will be back up to normal, it might be time to find a new provider.

    Looking for a faster connection?

    See what providers are available in your area.

    Protect your internet connection

    It’s easy to take Wi-Fi safety for granted. Every coffee shop and fast food restaurant has its own public Wi-Fi, and we can see the names of our neighbors’ home networks just by pulling out our phone.

    These days, a vulnerable home network may not exactly be a jackpot for hackers, but it is low-hanging fruit for freeloaders. Using proper network security is a good habit to get into and a good way to get the most out of your internet plan.

    More resources

    Having your bandwidth stolen by freeloaders is frustrating, but there are lots of other security threats that can affect your home network. If you want to find out more about how to keep your network and devices secure, check out some of our other articles on internet security.

    1. Paul Marks, New Scientist, “Dot-Dash-Diss: The Gentleman Hacker’s 1903 Lulz,” December 20, 2011. Accessed March 28, 2020.
    2. Karina Astudillo, Wireless Hacking 101, 2017.
    3. WikiHow, “How to Make a Cantenna,” April 16, 2020. Accessed March 28, 2020.

    Even on secure networks, cybercriminals still find ways to get in, and once they do, they potentially have access to anything and everything you do online. They use these vulnerabilities to steal your money, peer into your personal life, and perhaps even access live video feeds of your home. It sounds like a horror story, but it’s a reality of having so much of our lives integrated into technology.

    The upside is Wi-Fi security is constantly improving, giving you some big guns to defend your home network. Once you combine your network’s built-in security tools with good network safety practices, you have a fairly robust defense against cybercriminals.

    In this guide, we’ll go over some of the ways hackers break into your network and show you what to look for in case of a security breach. Then, we’ll go over some essential preventive measures you can take to build up your own personal Fort Knox of Wi-Fi security.

    New internet providers have arrived!
    Recent developments in internet tech have given millions of people access to new providers. Enter your zip code to see the best ISPs in your area.

    How hackers break into your network

    Phishing

    Phishing is a scam tactic used by hackers that tricks you into clicking on a malicious link or attachment that either installs malware on your device or persuades you to provide sensitive information, like login credentials.

    Phishing often comes in the form of an email or text message disguised as a communication from a reputable source that you’re familiar with, like Amazon or Microsoft, with urgent language designed to get you to act fast.

    It might say there’s an issue with your account, payments, or even a malicious login attempt, and the only way to fix the problem is to follow a link or download an attachment. The links usually lead to bogus forms asking you to fill out sensitive information. Phishing attachments often contain malware that immediately infects your device and searches for your private information or simply wreaks havoc on your system.

    Since phishing usually relies on you taking the bait, all you have to do is avoid clicking that fateful link or attachment. You need to maintain a general skepticism of any link or file attachment in an email, instant message, or text message. Develop the habit of checking the sender’s email address for anything suspicious, such as typos or use of a public domain, like Gmail. Red flags should go up whenever you encounter pushy language emphasizing urgency and immediate action. Taking a little extra time processing your inbox can go a long way in keeping your network secure.

    Malware

    Malware, short for Malicious Software, is any software designed to extract private information or harm your devices. These programs come in a variety of nefarious forms. Some record everything you type into your keyboard, searching for passwords. Others may intercept your web traffic, while some take pictures of your screen and send those back to the criminal. Some malware acts as a passageway for more malware. And sometimes, Malware is designed to simply mess up your computer.

    You get malware by downloading files or clicking on links. Don’t download files from untrusted sources, and keep an eye out for disguised websites and emails. If you’re unfamiliar with a source, think long and hard before you let it through your network defenses.

    Brute Force Attacks

    Brute force attacks involve using a program to guess your password until it finds the right combination of characters. For a person, this is usually impossible without some type of hint, but computers can cycle through thousands of attempts without breaking a sweat.

    Give your Wi-Fi a health check

    Use our speed test to check your speeds, ping, and jitter to ensure your network is running as it should be.

    How to protect your home network from hackers

    There are many tools and practices at your disposal to protect yourself from malicious network attacks. Most are really easy to implement in your home network.

    Create strong passwords

    Your first line of defense is robust passwords that are not easily cracked by hackers. Many of us are guilty of creating simple passwords based on personal information like birthdays or names; it makes sense, as these are easy to remember, and being locked out of your accounts seems to happen at the worst times. But these passwords are also easy for criminals to decipher.

    Sometimes, it doesn’t even take the use of malicious programs to break these passwords. Identifying information, like birthdays, pet names, and other personal details is often easy enough to find through a person’s public social media posts or profile information.

    Best practice: The most secure passwords mix character types (numbers, letters, and symbols), contain at least 10 characters, and are not based on personal details (such as birthdays or pet names).

    Change your router’s default login credentials

    Router login credentials are not the same thing as your Wi-Fi name and password. Your router login credentials allow you to change your home network’s settings. These settings include your Wi-Fi password and your security settings.

    Many routers come with default login credentials that are laughably insecure. In fact, the login credentials are usually something like “Admin” for the username, and the password is literally set as the word “password.” Even worse, the login page is almost always a universal URL web address or IP address. This lack of security makes it extremely easy for anyone on your Wi-Fi network to access your router settings if you haven’t changed the default credentials.

    Best practice: To change your router login credentials, you’ll need to access your router’s settings; we detail the process in full in our guide on logging into your router.

    In short, all you have to do is connect to your router via Wi-Fi or using an Ethernet cable and navigate to the settings page in a web browser using the router’s login URL; this is usually printed on a sticker along with the default username and password. Once logged in, you’ll be able to change the password. Alternatively, some routers use a mobile app instead of a web interface.

    Some routers prompt you to change the login credentials when you first set up the router. If you can’t remember if you changed them already, it’s best to double-check.

    Keep your router security enabled

    Aside from limiting access to your network with a Wi-Fi password, your router also has built-in security measures. These should be on by default, so all you need to do is keep them running. Also, if you have a stand-alone modem and router, don’t connect to the modem directly via Ethernet, as this bypasses your router’s built-in security features. Instead, connect your devices to your router via Ethernet or Wi-Fi.

    Upgrade to a WPA3 Router

    WPA3 is the latest security protocol used in all Wi-Fi certified routers and devices since 2020. WP3 introduced many improvements in Wi-Fi security, notably better encryption and defense against brute force password-cracking attacks.

    Best practice: If you don’t have a router that can use WPA3, it might be time to shop for a new one—which could even help your Wi-Fi speeds if your router is older. If your router was released after 2020, you should already have a WPA3 router. If your router was released earlier, it may use WPA2, which is not as robust as WPA3. WPA3 was announced in 2018, so if your router was made before then, it’s definitely not taking advantage of WPA3’s enhanced security.

    Keep your computer and devices updated

    Like most tech fields, cybersecurity advances at an extremely fast pace. So, while security tools are always improving, so are the methods of cybercriminals. Keeping your OS updated ensures you have the latest protections installed.

    Best practice: Regularly update your devices and apps and consider turning on automatic updates to help you avoid forgetting.

    Set up a Wi-Fi guest network

    A guest Wi-Fi network allows others to use your Wi-Fi network while still protecting the most vulnerable parts of your network. For example, someone on the guest network may be able to browse the internet, but they can’t log in to your router and start changing network settings. This is a nice way to share your Wi-Fi without as much risk.

    Best practice: Set up a guest network for when someone you don’t know well visits or accesses your Wi-Fi for any reason. You can follow our guest network guide to get your setup started.

    Use antivirus software

    No matter how diligent you are, sometimes malware still finds its way into your home network. Luckily, you can prepare for such occasions with antivirus software. Antivirus software not only works to keep malware and viruses off your computer and devices, but it scans and erases malicious programs that make their way through your other defenses.

    Best practice: Find an antivirus software that fits your budget and needs. You can set your software to regularly scan your devices and make sure your personal data stays secure.

    • Best overall
      Firefox logo
      Firefox
      • Free
      • Blocks cryptominers
      • Prevents fingerprinting
      • Stores passwords locally
    • Best for anonymity
      Tor logo
      Tor Browser
      • Free
      • Conceals your identity
      • Encrypts browser data
      • Prevents fingerprinting
    • Best for customization
      Vivaldi browser logo
      Vivaldi
      • Free
      • Provides high customization
      • Protects against phishing
      • Syncs data between devices

    Our pick: Which internet browser is the most secure?

    Firefox is our top pick as the most secure browser because it’s completely open source and contains no hidden or proprietary code. As a result, it can be examined by any security expert to confirm that it doesn’t secretly track you across the internet and sell your browsing habits.

    In contrast, Google Chrome, Apple Safari, and Microsoft Edge are only partially open source, as they include proprietary components security experts can’t thoroughly inspect.

    Need a great internet plan to complement your secure internet browser?

    If you’re looking to switch, enter your zip code below to see if a better plan is available in your area.

    The 6 most secure browsers

    Compare secure browser features and availability

    Best forBrowserAvailabilityBest featuresGet it
    Best overallFirefoxDesktop, mobile
  • Prevents tracking
  • Blocks cryptominers
  • Get Firefox
    Best for anonymityTor BrowserDesktop, Android
  • Conceals your identity
  • Encrypts browser data
  • Get Tor Browser
    Best for customizationVivaldiDesktop, Android
  • Provides high customization
  • Protects against phishing
  • Get Vivaldi
    Best for blocking adsBraveDesktop, mobile
  • Blocks social media
  • Accesses the Tor network
  • Get Brave
    Best for extreme privacyEpic Privacy BrowserDesktop, mobile
  • Deletes everything
  • Blocks address bar tracking
  • Get Epic Security Browser
    Best for VPN useOperaDesktop, mobile
  • Includes a built-in VPN
  • Provides built-in social apps
  • Get Opera

    What should you look for in a secure browser?

    You want a web browser that blocks everything that can identify you. While some cookies are necessary for websites to function, others are intrusive and intentionally collect your information to track you across the internet.

    A web browser should also verify that every destination you visit is safe so you’re not unintentionally loading a site full of malware or one that secretly runs scripts in the background to mine digital currency at your expense.

    Lastly, a browser should offer secure connections. For example, the Tor Browser offers triple encryption, while Opera has a built-in virtual private network (VPN) component. Most web browsers support HTTPS connections.

    Want to beef up your home network’s security?

    We provide a list of the best routers for security to get you started. If you don’t need an upgrade, we also provide a guide on how to keep your router secure.

    Best overall—Firefox

    Firefox logo

    Features

    • Blocks cryptominers
    • Prevents fingerprinting
    • Stores passwords locally

    Availability

    • Windows / Mac / Linux
    • Android / iPhone / iPad

    Base code

    • Quantum

    Data this browser collects from you

    • Contact info
    • User ID
    • Device ID

    Firefox is now faster and prettier than ever. But, as Mozilla admits, you spend more time looking through Firefox than at it. Mozilla has always placed security at the forefront, like blocking cross-site cookie tracking by default, isolating websites into separate processes, blocking third-party fingerprinting, and more.

    The big takeaway is that Firefox is open-source software. For you, that means anyone can examine the code, whether by a security researcher, someone from the Firefox community, or just a curious coder. There’s no place for Mozilla to hide secret code that tracks you across the internet and sells your browsing habits for profit.

    Firefox is just one of two browsers on our list that is not based on Chromium.

    Pros:

    • Protects against spyware
    • Blocks almost all pop-ups

    Cons:

    • Consumes high memory
    • Falls behind Chrome in speed

    Best for anonymity—Tor Browser

    Tor logo

    Features

    • Conceals your identity
    • Encrypts browser data
    • Prevents fingerprinting

    Availability

    • Windows / Mac / Linux
    • Android

    Base code

    • Tor

    Data this browser collects from you

    • No data collection

    If you’re feeling adventurous and want to explore the dark web, this is the browser to use. It’s the second of two browsers on our list that is not based on Chromium.

    What makes Tor Browser stand out is how it works. It passes your internet traffic through three random servers residing on the Tor network. When your data exits the network, it doesn’t include your information—not even your public IP address.

    This triple-layer method isn’t exactly perfect. The Tor Project admits if the first and third servers are compromised—whether by hackers or on purpose by the owner—they could see where your encrypted traffic is coming from or where it’s going.

    Still, it’s an excellent browser for blocking pesky trackers, avoiding surveillance, and eliminating fingerprinting.

    Pros:

    • Provides triple encryption
    • Prevents fingerprinting

    Cons:

    • Loads slow due to connecting through the Tor network
    • Falls behind Chrome in speed

    Best for customization—Vivaldi

    Vivaldi browser logo

    Features

    • Provides high customization
    • Protects against phishing
    • Syncs data between devices

    Availability

    • Windows / Mac / Linux
    • Android

    Base code

    • Chromium

    Data this browser collects from you

    • User ID
    • Device ID

    Vivaldi is the most customizable browser on our list. You can create a custom theme and use any image as your background. Even more, you can shift the panel’s location, customize your start page, change the Vivaldi Button menu, and so on. It’s fun and breathes new life in the tired, repetitive browser design.

    On a security level, Vivaldi uses Google Safe Browsing to protect you against phishing and malware. It blocks ads and trackers by default, but you can add exceptions and manage blocking levels per site. It also blocks ads on “abusive” sites by default, although you need to manually enable its “not to track me” feature.

    Pros:

    • Offers plenty of customization
    • Syncs data across devices

    Cons:

    • Lacks iPhone, iPad versions
    • Consumes high memory

    Best for blocking ads—Brave

    Brave browser logo

    Features

    • Blocks social media
    • Uses the Tor network
    • Supports the BAT platform

    Availability

    • Windows / Mac / Linux
    • Android / iPhone / iPad

    Base code

    • Chromium

    Data this browser collects from you

    • No data collected

    The default settings block most ads on websites except those that fall under the Brave Rewards umbrella. These Brave Ads use a system that pays you in virtual Basic Attention Tokens you earn in exchange for your attention—70% of the ad’s revenue. Around 1.5 million content creators accept these tokens as payment.

    With Brave, you can block trackers, scripts, and fingerprinting. You can disable Google login buttons, Facebook logins and embedded posts, embedded tweets from X (formerly Twitter), and embedded LinkedIn posts. There’s also an option to open a private window and surf the internet using the Tor network.

    Pros:

    • Provides a cryptocurrency wallet
    • Blocks social media logins and embeds

    Cons:

    • Consumes high memory
    • Loads some sites incorrectly

    Best for extreme privacy—Epic Privacy Browser

    Epic Security Browser logo

    Features

    • Blocks everything by default
    • Blocks address bar tracking
    • Deletes everything when closed

    Availability

    • Windows / Mac
    • Android / iPhone / iPad

    Base code

    • Chromium

    Data this browser collects from you

    • No data collected

    Epic’s pitch is that private browsing should always be enabled, not a “mode” you must toggle on. Unfortunately, Epic spun off two of its major privacy features as extensions to make the browser more customizable, so you will need to install the one-click encrypted proxy and AdBlock components to get the complete “extreme privacy” benefits.

    While Epic Privacy Browser is based on Chromium, there are no ties to Google. It prevents address bar tracking, local address bar autocompletes, fingerprinting, third-party cookies, and DNS prefetching. It deletes all local databases when closed, along with your history, cache, all data related to tabs, and more.

    Pros:

    • Deletes everything when closed
    • Includes a built-in video downloader

    Cons:

    • Requires extensions to use proxy and ad blocking
    • Limits plugins library to just 10

    Best for VPN use—Opera

    Opera browser logo

    Features

    • Includes a built-in VPN
    • Blocks cryptominers
    • Verifies all websites

    Availability

    • Windows / Mac / Linux
    • Android / iPhone / iPad

    Base code

    • Chromium

    Data this browser collects from you

    • Device ID
    • Location
    • Diagnostics

    Opera provides a built-in VPN component you can enable in the settings. It routes your traffic through one of Opera’s servers to encrypt your transmission and mask your public IP address. The VPN applies to only the browser itself, so you’ll need to use a third-party VPN service like ExpressVPN and Hotspot Shield to protect everything else.

    Opera’s ad-blocking component provides cryptocurrency mining protection when enabled. The “security badge” aspect checks all websites against a database to protect you against suspicious pages. There are also tools to stop tracking, phishing, and malware.

    Pros:

    • Protects against spyware
    • Blocks almost all pop-ups

    Cons:

    • Consumes high memory
    • Falls behind Chrome in speed

    Secure browser features

    All web browsers generally do one thing: download data from a remote server and piece it all together into a web page. They all offer a similar list of basic security features, although each one aims to provide additional components to make them stand out against the competition.

    Ad blocking

    Advertisements on web pages are understandable: they generate money to pay the bills. The problem is these ads extend the page’s loading time. Moreover, many websites cover most of their white space with ads, resulting in an overly clunky and slow-loading design. 

    While ad blocking can increase load times, it also stops malicious ads. For instance, malvertising is an attack that injects malware into an online advertising network. Because you download these ads when accessing web pages, they may contain malware that will redirect your browser to malicious websites.

    Malvertisements are not to be confused with adware, however. The latter is obtained through other software and will redirect search requests when installed. Adware also displays popups and collects your data for tailored advertisements.

    Tracker blocking

    Your information is a valuable resource, and cookies provide a treasure trove. They’re tiny files stored locally on your device, created by the browser to cache information for each site. The information consists of the links you clicked, specific pages you accessed, and so on.

    And while cookies are harmless on a security level, they can be used to track you across the internet. “Cross-site tracking” is a popular term to label how companies collect your browsing data from multiple websites.

    Accounts can be tracked too. Facebook is a perfect example, which released a free tool in 2019 that lets you see what data it collects from businesses and organizations that use its tools.

    The bottom line is that you need a browser with a Do Not Track component because your surfing habits are your business.

    Who shares your data with Facebook?

    You can find out by logging in to your Facebook account and following this path: Menu > Settings (under Settings & privacy) > Off-Facebook activity (under Your information). You may be horrified by the results.

    HTTPS support

    A good, secure web browser should always support Hypertext Transfer Protocol Secure (HTTPS). This connection uses the Transport Layer Security (TLS) protocol, which is based on asymmetric encryption.

    Compatible browsers will display a lock symbol in the address bar when you load a website that offers HTTPS connections. If the website doesn’t support HTTPS, the browser will display a “not secure” message or something similar.

    You may find browsers that include an HTTPS-Only Mode. Firefox, for example, can force all connections to use HTTPS when you enable this setting. Conversely, if the website does not use HTTPS, Firefox will block access with a warning page containing “Continue to HTTP Site” and “Go Back” buttons.

    Encrypted emails use TLS too

    We explain more about this encryption type in our guide on how to encrypt email on Gmail, Outlook, iOS, and more.

    Malware prevention

    A secure web browser should check with a trusted database to verify that a website is safe to use.

    For example, malware may secretly infect a legitimate website, or a website may appear official but is instead a “spoof” to fool you into downloading unwanted software. Both situations are typically reported and listed in a database that the browser downloads and updates frequently.

    A browser should also verify that the file you are downloading is legitimate. For instance, Firefox will verify the site’s integrity against a database provided by Google Safe Browsing. If Google blacklists the site for malware, Firefox will block the download. This verification also helps prevent unwanted files too, like automatic downloads, when you visit a website.

    So, where are Chrome, Safari, and Edge on this list?

    On a security level, we don’t recommend using browsers provided by Apple, Google, and Microsoft.

    Google Chrome

    Google makes a big chunk of revenue from advertising and data collection. Those two factors alone should be enough reason to shy away from Google Chrome. The browser is undoubtedly convenient given its native ties to Google’s services, and it’s one of the fastest based on our tests, but Chrome collects an alarming amount of data—more than any other browser on our list.

    Apple Safari

    Apple is a “device first” company. Its most significant source of revenue is sales from Macs, iPhones, iPads, and so on. Safari is undoubtedly the better native option over Google Chrome on these devices, and its security and privacy aspects have improved over the last few years. 

    But Safari isn’t completely transparent in terms of code, nor is it available on any other platform outside the Apple ecosystem. It’s also had its share of eye-opening security and privacy issues in the past.

    Microsoft Edge

    Finally, the new Microsoft Edge ditches the previous in-house EdgeHTML engine for Chromium. It collects data about the websites you visit, and there’s no option to turn this data collection off. Moreover, Microsoft Edge shares details regarding web pages visited, whether you use the search autocomplete function or not.

    The bottom line

    You can’t expect total security and privacy from companies that have other agendas. All three browsers listed above provide operating systems that already know what you do and where you go every day.

    What you need is a browser provided by a developer with one single, razor-sharp mission: to give you the best, most secure window to the internet.

    Our verdict: Firefox is the best for security

    Firefox is our top pick for two reasons. First, it’s not based on Chromium, so there are no traces of Google in the code. Google’s primary business is data collection and advertising, so you know Firefox doesn’t include secret Google bits that harvest and sell your data.

    Second, the browser is truly open-source, meaning any security expert can inspect the code. There are no proprietary components buried deep within the foundation that could prevent full transparency.

    Firefox has been around for 18 years, rising from the ashes of Netscape in the early 2000s. Mozilla wanted to build a standalone browser for a safer internet, and its efforts clearly show. Firefox makes privacy and security management easy to use and easy to understand. Sure, Chrome has improved over the years, but it collects more data than any browser on this list.

    If you are looking for features like a built-in VPN or high levels of customization, you can’t go wrong with Opera or Vivaldi. However, Firefox is the best, well-rounded browser you should use on all your devices.

    FAQ about secure browsers

    What is Incognito Mode?

    Also known as Private Mode or something similar, Incognito Mode keeps your browser history private. In Firefox, for instance, the browser deletes all cookies when closed. It also blocks tracking cookies by default. For more information, read our explanation about what Incognito Mode actually does to protect you online.

    What is fingerprinting?

    Fingerprinting is a form of data collection that pieces information together to identify you. Data is collected through the web browser or through apps or programs installed on your device.

    Websites use third-party trackers to continue collecting data (shopping habits, frequented websites) and create a larger snapshot of your internet presence. This “fingerprint” includes your device, operating system, preferred browser, and so on.

    What is the Tor network?

    The Tor network consists of over 7,000 volunteer-operated relay servers located around the globe that perform as “onion” routers. Here’s what happens when you access a website using a Tor client:

    Step 1: The Tor client determines the best path to the destination and generates three encryption keys. 

    Step 2: The client sends the three-layer encrypted data to the first Tor server, the Entry Node.

    Step 3: The Entry Node decrypts the first layer, discovers the second server’s location, and relays the two-layer encrypted data.

    Step 4: The second server, or Middle Node, decrypts the second layer, discovers the third server’s location, and relays the single-layer encrypted data.

    Step 5: The third server, or Exit Node, decrypts the final layer and relays the plaintext data to the destination.

    In a nutshell, the Tor client creates a “circuit” between you and the destination that remains open for around ten minutes. Once that window expires, Tor creates a new circuit to prevent eavesdroppers from tracking your activities. A new circuit is also created when you visit another website.

    “Tor” is an acronym for The Onion Router.

    Want to see how browsing through a Tor network compares?

    Run our internet speed test on and off the Tor network and compare the results.

    Want to see how browsing through a Tor network compares?

    Run our internet speed test on and off the Tor network and compare the results.

     

     

     

    What is a virtual private network (VPN)?

    A virtual private network is a secure, private connection that works over the internet.

    VPN software you install on your device encrypts your data and then establishes a direct, encrypted connection (or “tunnel”) between you and the VPN server. Once the server receives your encrypted data, it decrypts the data and then sends it in plaintext to the destination.

    This way, the destination cannot collect your information, such as your IP address, web browser, and operating system.

    How does cryptocurrency mining work in a browser?

    Cryptocurrency mining within a browser works by using JavaScript code. Every web page you view on the internet is downloaded to your device as cache, including JavaScript code that quietly runs in the background to run basic web components.

    In this case, the JavaScript code runs complex mathematical calculations to create digital currency. Mining requires heavy processing and will slow your device to a near crawl as the CPU computes the heavy math. You could see your browser use 90% or more of your CPU’s total processing capacity.

    Some websites, however, use cryptocurrency mining in the browser as a form of “payment” for consuming their content. This payment is typically voluntary on your part.

    What is phishing?

    Phishing is a method of obtaining your personal information through a link embedded in an email, text message, instant message, and so on. The attackers pose as a person, company, or service you trust and attach a link. The resulting website looks legitimate, but it’s a “spoofed” site created to steal your information.

    What is address bar tracking?

    Address bar tracking is a method of obtaining your browsing habits through the autocomplete function. When you type a search query or URL in the address bar, the browser analyzes that data to provide suggestions. The browser may also send that information to remote servers. As a result, companies like Google and Microsoft know where you’re going and where you’ve been.

    What is a Device ID?

    A Device Identifier (ID) is a unique string of numbers that identifies your device, whether it’s a computer or smartphone. It’s stored on the device and is derived from other hardware-identifying numbers, like the IMEI number or MAC address.

    What is a User ID?

    Web browsers typically create a user identifier profile upon installation that includes information like your processor, storage, screen resolution, and operating system. This profile is assigned a unique identifier that the browser stores locally in a cookie.

    What is Chromium?

    Chromium is a free and open-source browser “foundation” developed and maintained by Google. Developers can compile the code “as is” and distribute it as a basic Chromium browser or compile it to include proprietary components and unique designs. The latter group includes Brave, Epic Privacy Browser, Google Chrome, Microsoft Edge, Opera, and Vivaldi.

    What is Google Safe Browsing?

    Google Safe Browsing is a service provided by Google. It contains a database of known websites containing malware and phishing content. This database is available to internet service providers and used by Chrome, Firefox, Safari, and Vivaldi. According to Google, this service protects over 4 billion devices each day.

    All wireless devices encrypt their connections by default. Well, usually. Some public Wi-Fi networks may not use encryption even if your device does, which is why you should use the best VPN tools in that case or tether from a mobile internet connection instead.

    But at home or in the office? We connect our devices to Wi-Fi and think nothing more of it. It’s super secure, right? Right??

    Maybe. Maybe not.

    Your connections are encrypted, sure, but is your gateway or router fully secure? Are all the security holes patched to keep hackers out? Did you create an uncrackable password? If you can’t say “yes” to any of these questions, then your network is in dire need of a security check. Like, pronto. We walk you through a list of security flaws and tell you how to fix them.

    Do you have the most secure internet you can get?

    All internet providers generally stay on top of security, but if you think your current provider fails to keep you safe, enter your zip code to see what else is available to you.

    Flaw #1: Outdated firmware leaves you vulnerable

    Firmware is another name for the router’s operating system. It’s software that manages the hardware, and like any other operating system, it’s never fully bulletproof—there are always gaps in the code that can give unwanted hackers access to your network.

    The good news is software engineers continuously fill these holes with new updates. The bad news is your router may not automatically update the firmware to the latest, most secure version, leaving your network wide open for a possible remote attack.

    Solution

    Nearly all standalone routers, gateways, and mesh systems enable automatic firmware updates by default. You’re normally required to enable this feature during the setup, or it’s already enabled, and the router checks for new updates before you can use it.

    But there are exceptions. We’ve tested a few ASUS routers that don’t have auto updates enabled out of the box. Yes, the possibility of a failed update is real and could leave your router as an expensive paperweight, but the chances of that happening are extremely rare.

    That said, we provide a separate guide on how to update your router’s firmware to the latest and greatest version.

    Flaw #2: Easy Wi-Fi passwords invite strangers and hackers

    Creating an easily guessed Wi-Fi password based on something familiar—like a child’s name, a pet, or your address—is convenient for sure, but it also leaves your Wi-Fi network vulnerable to hackers lurking nearby.

    Solution

    Unlike the admin password, most modern routers, gateways, and mesh systems don’t force you to create a unique Wi-Fi password. The supplied one is already unique to that device—which wasn’t the case in years past—but you should change it to be safe. The complexity of it depends on you, but remember, you can always share the Wi-Fi login credentials using a QR code or another method supported by the router’s mobile app. We provide a separate guide on how to share your Wi-Fi password from your phone.

    Still, we suggest using a passphrase with letters (upper and lower), numbers, and symbols. For example, “Ch!ck3nP33k@b00” uses unrelated words and is much harder to guess and crack than “h0m3n3tw0rk.” You can also use a password manager to create your password or allow your mobile devices to make one for you, which is usually just a string of numbers and letters you’ll never remember but is easy to retrieve from your device’s settings.

    Check out our guide on how to change your Wi-Fi password for more information.

    Flaw #3: Using the router’s default login can leave you open to hackers

    Your router has a public side (the internet) and a private side (your home network). That means anyone can access your router—whether it’s remotely or locally—if you have the worst router login credentials ever created. An easily cracked password allows hackers to infiltrate your router, gateway, or mesh system and control your entire network—including your wired and devices.

    Solution

    This issue really only applies to older routers that accept commonly used login information like admin/password. Modern routers, gateways, and mesh systems now force you to create a unique administration password during the setup using letters (upper and lower), numbers, and symbols—there’s no getting around it.

    But if you have an older router or gateway and you never changed the login username and password, do so now. Consult our guide on how to log in to your router using a web browser (or an app if your router supports it)—the setting you want is usually found under Advanced > Administration. Most mesh systems don’t have a web interface you can use, so you can change the info only in the app.

    Flaw #4: WPS opens your network to hackers

    Wi-Fi Protected Setup (WPS) helps devices connect to your wireless network upon first use without the need for a password. You either press a button on the router or use an eight-digit PIN. 

    But there’s a consequence for that ease of use: WPS is vulnerable to brute-force attacks, which is a trial-and-error method to determine login info.1 A hacker could discover the PIN’s first four digits—there are only 11,00 possible combinations—and then uncover the next four. Free tools you can easily download from the internet can crack the PIN in 4 to 10 hours.

    Solution

    Your best defense is to update your firmware and disable WPS (if possible). The method of disabling WPS depends on the manufacturer, but here we’ll use the NETGEAR Nighthawk RAX80 as an example.

    Using the web interface

    Step 1: Connect to the router’s Wi-Fi.

    Step 2: Open a browser and type in routerlogin.net.

    Step 3: Click on the ADVANCED tab displayed on the left.

    Step 4: Click on WPS Wizard listed on the left and follow the instructions to disable this feature.

    Flaw #5: Guests can download illegal content

    There’s nothing wrong with giving friends and external family members access to your home’s network, but you also don’t want them downloading questionable content using your internet connection. You certainly don’t want the FBI knocking at your door, and that could happen if guests download anything they want.

    Solution

    Create a second “guest” connection for everyone who lives outside your home. This virtual network keeps visitors off your primary connections and limits the number of devices that have access. Plus, you’re not sharing your main network’s password.

    With a guest network, you can limit bandwidth, block websites, set connection times, and more per device. We provide a separate guide on how to set up a guest Wi-Fi network.

    Flaw #6: Children have unlimited access to explicit content

    The internet is both a blessing and a curse for parents. On one hand, kids and teens can find the information they need. They can play games online with friends and take remote classes. Unfortunately, they can access inappropriate and unwanted content with just a single URL.

    Solution

    We provide a guide on how to set up parental controls on a router to protect your kids and teens. Here, you can block and allow specific sites, block and allow specific devices, and set hours of use.

    Some routers handle parental controls through a specific section within the router’s interface. You can also click on a device to manage the connection, use profiles to set the parental controls for each child, and manually block websites you don’t want the entire house or office to access.

    Parental controls aren’t just for children

    You can use parental controls to restrict devices used by adults so you can limit the content they can access, the websites they can visit, and when they can connect.

    Flaw #7: Remote access invites hackers

    Remote access allows you to load the router’s interface over the internet, like from a hotel room in another state. Combined with a default or lousy password, anyone can gain access from anywhere and change its settings to route all your internet traffic to nefarious websites.

    Solution

    Old-school remote access through the web interface really isn’t a thing anymore. Many routers still include it, but it’s disabled by default since it’s such a security risk. You can typically find Remote Access controls in the router’s Administration section if you ever need to use it or simply want to verify it’s toggled off.

    However, modern routers, gateways, and mesh systems now allow you to manage your network from afar through a mobile app and a linked cloud account, so you really don’t need the web-based remote management tool anymore.

    Router's default SSID displayed
    Most routers broadcast the manufacturer's name by default. Kevin Parrish | HighSpeedInternet.com

    Flaw #8: Your router broadcasts the manufacturer’s name

    Click or tap on your device’s Wi-Fi icon, and chances are you’ll recognize some of the names on the resulting list: Linksys, NETGEAR, and so on. Owners of these routers never changed the default Service Set Identifier (SSID) name, which is the wireless network’s public name.

    Why is that a problem? Anyone who sees “Linksys” or “NETGEAR” will know that someone owns one of these routers. With this information, hackers can launch an attack tailored to your router, break into your network, and steal your data.

    Solution

    Generally, you’re encouraged to change the default SSID during the setup. If you disable Smart Connect (band steering), you create a new SSID for each band. You can rename them to anything, whether it’s something simple or a label just to annoy your neighbors. Have fun or be practical—it’s all up to you.

    If you never changed the SSID, you can do so through the mobile app provided by the manufacturer or by using the web interface. The following instructions use the TP-Link Archer AXE75 router as an example.

    Using the web interface

    Step 1: Connect to the router’s Wi-Fi.

    Step 2: Open a browser and type in tplinkwifi.net.

    Step 3: Select Wireless listed on the left.

    Step 4: Select the Wi-Fi connection you want to change.

    Step 5: Enter the new SSID name and save your changes.

    Using the Tether app

    Step 1: Connect to the router’s Wi-Fi.

    Step 2: With the Home tab selected, tap on Wireless.

    Step 3: Select the Wi-Fi connection you want to change.

    Step 4: Enter the new SSID name and save your changes.

    The best way to protect your Wi-Fi network is to know what your router, gateway, or mesh system can do. We tend to change a few settings in our router apps and move on with life, but if you look closely, you can probably adjust other settings and your own personal habits to make your Wi-Fi network even safer than before.

    We walk you through nine suggestions that should help make your Wi-Fi network safer to use—but not before we highlight a few refresher suggestions you’ve probably read a billion times over. We’ll be quick about it. We promise.

    Do you have the best speeds for your secured Wi-Fi network?

    Don’t let a slow connection fool you into thinking someone hacked your network. You may need a faster plan to handle your increased in-home traffic. Enter your zip code below to see what’s available to you.

    Before we begin: The settings you probably already changed (or didn’t need to)

    Many how-tos you find (including some of ours) tell you to do this, to do that, and to do that too. But based on the dozens of routers we’ve set up and tested, we can guarantee that you’ve already completed most of the blanket suggestions during the initial setup. Let’s take a quick look.

    Settings you changed during setup

    Set a new administrator and account password

    You were asked to create one or two things, depending on the model:

    • A password or passcode containing letters, numbers, and symbols to access the router locally.
    • A cloud account, like TP-Link ID and MyNETGEAR, using a password or passcode containing letters, numbers, and symbols to access the router or system locally or remotely.

    This step is unavoidable. Hopefully, you created strong ones. If not, log back in and do so now. Like, pronto.

    Set the Wi-Fi network name(s) and password(s)

    This step is usually next. Here you were supposed to change the network name and password—two or three times if you disabled Smart Connect (a.k.a. band steering). If you’re still using the defaults, load up the web interface or app and change them now.

    Settings you didn’t need to change during setup

    Here are a few more features that were automatically enabled when you set up your router or mesh system.

    Encryption

    Routers and mesh systems enable encryption by default, so you had nothing to do during the setup. WPA3 is the latest version, although many still default to WPA2 Personal. Never, ever turn off encryption. Never. Ever. It can leave you vulnerable to a host of problems, like hackers.

    Firewall

    Routers and mesh systems automatically enable the firewall by default. In many cases, you can’t even disable it. Your computers have firewalls enabled by default, too, but you can always ensure they’re active by following our guide on enabling or disabling a firewall.

    Automatic updates

    Routers and mesh systems automatically update their firmware by default. Based on our testing, ASUS is the only company requiring you to enable automatic updates manually. If it’s not already, you should enable this feature or manually update the firmware.

    Read our guide on how to update your router’s firmware for more information.

    Do you have the most secure Wi-Fi router you can get?

    If you’re in dire need of an upgrade, be sure to check out these suggestions based on our testing and hands-on reviews:

    How to secure your home Wi-Fi network

    Now, with the setup settings out of the way, we can jump into our nine suggestions for increasing the security of your Wi-Fi network. Some you may have read before, so consider them as Refresher Wi-Fi 101.

    Suggestion #1—Use the built-in security features

    Security features are a hit or miss in terms of what you get for free on a router, gateway, or mesh system. For example, TP-Link’s HomeCare suite for its standalone Archer-branded routers includes content filtering, website blocking, and antivirus. In contrast, HomeShield on its other routers and mesh systems locks antivirus and some parental controls behind a subscription.

    Still, in both cases, you can manually block specific websites and services network-wide for free to keep friends and family safe. You can also block apps and websites on a per-profile basis using routers and mesh systems that support them.

    The website and service-blocking function isn’t just a TP-Link thing, either. It’s typical across nearly every router and system we’ve tested to date.

    Suggestion #2—Use QR codes to share Wi-Fi login info

    Using QR codes should be your next step in protecting your Wi-Fi network. You worked hard to create a unique password or passphrase, right? The last thing you want is for someone to text, write down, or blurt it out to everyone entering your home—especially if you’re running an Airbnb or renting a room.

    To prevent your password from ending up on a napkin, share it using a QR code. All routers and mesh systems have this capability in their mobile apps. Be sure to check out our guide on how to share your Wi-Fi password from your phone for more information.

    Suggestion #3—Use profiles

    Profiles are usually associated with parental controls, but they’re a good way to identify devices and lock them down to specific individuals accessing your Wi-Fi network, not just kids.

    As previously mentioned, you can block specific users from accessing a website, app, or content type, like a troublesome teen who refuses to stop streaming those “free” movies still playing in theaters. This tool is essential in preventing them from downloading suspicious apps that can unleash malware across your network.

    What’s also useful is you can pause their internet access indefinitely or just block every device they own. However, not all standalone routers support profiles and those that do may lock features behind a subscription. All mesh systems use profiles with some paid and premium features.

    Suggestion #4—Enable connection alerts

    Technically, this feature doesn’t secure your Wi-Fi network. Instead, it presents a notification on your screen whenever a wired or wireless device joins your network. If it’s a device you don’t recognize, you can quickly jump into the mobile app or web interface and block it. Case closed, and ask questions later.

    Let’s look at an example of how this works. Suppose you didn’t use a QR code to share the Wi-Fi password with a family member. You created a profile and assigned their devices to that profile.

    Soon you discovered the family member was downloading pirated movies, so you used the profile to block all their devices. The sneaky sneak then connects a new device to the network using the password you previously provided.

    When the device connects for the first time, you receive an alert on your screen. You either block the device immediately or add it to the profile (which we recommend) and block it. Can you tell we deal with teens? It feels like a second job. Seriously.

    Of course, connection alerts apply to any strange device that accesses your Wi-Fi, like a hacker who managed to figure out your easy-to-guess password.

    Suggestion #5—Create a separate network for guests and IoT devices

    Allowing friends and family to access your Wi-Fi network is okay. They’re people you can trust to use your internet connection responsibly—well, usually. If they get out of hand, you can always pause their internet or block their devices if you follow our previous suggestions to create profiles and enable connection alerts.

    But for people you don’t really know, we suggest creating a guest network to separate their devices from yours. Technically, you’re all still on the same Wi-Fi network, but your guests use a virtual one that prevents their devices from accessing your devices, like a computer with shared folders or a network printer. Some routers and mesh systems allow you to give the guest network access to your local devices, but we suggest you keep the network isolated to prevent possible malware infections.

    IoT devices should be on a separate network, too. Some routers allow you to create a third network specifically for IoT device use. If your router doesn’t, create a second “guest” network even if you never plan to provide Wi-Fi access to strangers (who can always use their mobile data). This virtual network helps keep your devices safe from a possible attack carried out by hackers infiltrating your IoT devices.

    Read our guide on how to set up a guest Wi-Fi network for more information.

    Suggestion #6—Disable remote management

    Web-based remote management really isn’t a thing anymore, but some routers still offer it. In short, you can access the router’s web interface and change the settings from anywhere, but it can be an easy entry point for hackers—especially on older routers with their original login credentials still intact. Toggle this feature off if it’s not already.

    However, don’t confuse web-based remote management with the cloud-based one. Most routers and all mesh systems now support remote management through cloud accounts and mobile apps. You can also disable this feature on standalone routers if you never intend to use it outside your Wi-Fi network.

    Here are a few examples of where you can find the remote management setting:

    ManufacturerPath
    ASUS ROG Rapture GT-AX11000Advanced Settings > Administration > System Settings
    TP-Link Archer AX5400 ProAdvanced > System > Remote Management

    Suggestion #7—Disable Universal Plug and Play (UPnP)

    Universal Plug and Play (UPnP) was initially designed to connect and use devices on a wired network without manually installing drivers or configuring settings. Now, many moons later, nearly all Wi-Fi routers support UPnP and enable it by default.

    The problem is there are no means to authenticate and authorize UPnP devices, so they all essentially “trust” each other. They’re also now exposed to the internet, so a hacker can fool your router by posing as a UPnP device and march right in to infect every device you own with malware.

    To keep hackers out, we suggest disabling UPnP. The drawback is UPnP devices use virtual connections (ports) to communicate, which are opened automatically with UPnP enabled. You’ll need to manually configure these ports on the router for your UPnP devices to work.

    Here are a few examples of where you can find the UPnP setting based on the routers we’ve tested:

    ManufacturerPath
    ASUS ROG Rapture GT-AX11000Advanced Settings > WAN > Internet Settings > Basic Config
    NETGEAR Nighthawk RAX80Advanced > Advanced Setup > UPnP
    TP-Link Archer AX5400 ProAdvanced > NAT Forwarding

    Suggestion #8—Disable Wi-Fi Protected Setup (WPS)

    Wi-Fi Protected Setup (WPS) is supposed to be an easy way to connect any wireless device to your Wi-Fi network. You don’t need the password to do so, either—simply press the WPS button on the router, or enter the supplied eight-digit PIN. Easy, right?

    The security issue lies with the PIN. Hackers can use software in a brute-force attack to uncover and use that PIN to take control of your Wi-Fi router and network. Why leave it on if you never plan to use the WPS function?

    Unfortunately, some routers, like the NETGEAR Nighthawk RAX80 and RAXE500, don’t allow you to disable WPS.

    ManufacturerPath
    ASUS ROG Rapture GT-AX11000Advanced Settings > Wireless > WPS
    Linksys EA8300Router Settings > Wi-Fi Settings > WPS
    TP-Link Archer AX5400 ProAdvanced > Wireless > WPS

    Suggestion #9—Schedule a reboot

    Your standalone router, gateway, or mesh system router has two addresses: a private one that faces your devices and a public one assigned by your internet provider. The second address is viewable by all internet devices—including those controlled by hackers. It’s usually refreshed every 14 days, but you should reboot your router weekly to keep the target off your back. A reboot also clears any junk in the router’s memory that could reduce your speeds.

    Unfortunately, some routers don’t have the means to schedule a reboot, so you’ll need a smart plug you can schedule to cut the power for a minute once a month (which may or may not work, depending on the router) or set yourself a reminder.

    Here are a few examples of where you can find the setting based on the routers we’ve tested:

    ManufacturerPath
    ASUS ROG Rapture GT-AX11000Advanced Settings > Administration > System > Basic Config
    ExpressVPN AircoveAdvanced Settings > Router Settings
    TP-Link Archer AX5400 ProAdvanced > System > Reboot

    Read more about how often you should reboot your router for more information.

    Other suggestions

    Add a firewall router

    Want to really secure your Wi-Fi network? Get a wired firewall router. It sits between your modem or ONT and your Wi-Fi router or mesh system. Its sole purpose is to thoroughly examine every bit of data that flows to and from your modem or ONT, so your speeds will be slower than usual.

    The Cisco Meraki Go GX50 is a good example. You can create up to four virtual networks and assign each to an Ethernet port. So, in theory, your Wi-Fi router can be on one network and your wired devices on another. You can isolate these networks or let them mingle—whatever works best for you.

    But the GX50’s biggest selling point is how it thoroughly inspects all traffic, giving you an extra layer of security at the cost of reduced speeds. Some routers have a similar “stateful” firewall you can toggle on, but again, you’ll see a speed reduction since the deep inspection takes longer to process.

    Hide your network name

    Changing your Wi-Fi network’s name is smart. The default ones usually include the manufacturer’s name, which you want to avoid broadcasting to every hacker in the vicinity. Even if they see you have a NETGEAR router, your chances of getting hacked are slimmer now that manufacturers use random passphrases for setting up routers instead of static passwords. Still, you’d like to be as anonymous as possible. No sense in baiting the nefarious, right?

    That’s probably why you’ll see suggestions to hide your network name altogether—even after you created something so unique and cool that you hoped would be applauded each time your neighbors saw it on the Wi-Fi list. But with your network name broadcast disabled, anyone searching for a Wi-Fi network will see “Hidden” instead of the name you painstakingly chose.

    But keep this in mind: You’re hiding the Wi-Fi network from your neighbors, but hackers can see your network’s name by using software to eavesdrop on your devices’ unencrypted requests before they fully connect to Wi-Fi. In other words, your “hidden” network isn’t completely hidden, so disabling your network name broadcast is kinda pointless in terms of hiding from hackers.

    Use a Virtual Private Network (VPN)

    Virtual Private Networks (VPNs) don’t protect your Wi-Fi network as a whole—they protect individual connections, so this suggestion isn’t part of our main list.

    For example, you may subscribe to ExpressVPN, but the only way to use it with your Xbox or PlayStation is to add the console’s IP address to your ExpressVPN account. After that, you enter the provided ExpressVPN DNS server IP address into the console’s settings. If anything, you’d use the router to create a static IP address for the console so it doesn’t change.

    The only exception is if a router includes a VPN client. In this case, you’d enter your ExpressVPN login credentials directly into the router’s web interface. Now, every device connected to the router is redirected to the ExpressVPN network, including your devices that don’t support VPN software (like the Xbox).

    Not all routers, gateways, and mesh systems have built-in VPN clients.

    Our verdict: Know your router’s capabilities

    Based on all the routers and mesh systems we’ve tested, you must set a new admin password, Wi-Fi name, and Wi-Fi password before you can even use your new network. There’s no getting around it, and hopefully, you made the right choices to keep your Wi-Fi network, devices, and people safe. Other features are automatically selected for you, so we didn’t zero in on those suggestions.

    Overall, routers, gateways, and mesh systems have some free security you can utilize, like blocking websites and services, but you may have to dig into the web interface to use them. Most now also support QR codes and connection alerts, so you can safely share your Wi-Fi credentials and see who connects in real time.

    Protecting your Wi-Fi network isn’t difficult, but you must be proactive. Block websites. Set filters. Create profiles. Disable unused features. Take the time to really dig into what your router or mesh system can do so everyone in your home can safely use the internet.

    • Best overall
      Kurupira Web Filter
      • Automatic web filtering
      • Both blacklisting and whitelisting
      • Time controls and scheduling
    • Best monitoring app
      Life360 Family Locator
      • Geolocation tracking
      • Place alerts
      • Family Driving Summary
    • Best freemium
      Qustodio Free
      • Free version with no time limit
      • Web filtering
      • Time controls

    Our pick: Which free parental control software is best?

    The best free option for parental controls is easily Kurupira Web Filter. It gives you a huge amount of control over the content your kids can stumble upon online. It even has blacklisting and whitelisting options that many paid programs lack. There are no arbitrary limitations on the number of users or devices that can use it, and it doesn’t try to upsell you after a brief trial period. Unfortunately for Mac users, it’s only available on Windows.

    The 3 best free parental controls

    Need an internet connection that can keep up with everyone in your household? See what providers are available in your area.

    Best free parental control software

    Model/servicePriceWeb FilteringDevicesGet it
    Best overallKurupira Web FilterFree
    • Automatic smart filtering
    • Blacklist
    • Whitelist
    Unlimited Windows devicesGet for Free
    Best monitoring appLife360 Family LocatorFree
    • None
    Unlimited iOS or Android devicesGet for Free
    Best freemiumQustodio FreeFree
    • Automat smart filtering
    1 iOS or Android deviceGet for Free

    What should you look for in free parental control software?

    Finding good options that are also free adds an additional challenge. Most parental controls provide a free trial period, but an actual free solution has to give you permanent access to the features you need. Freemium options can be good choices because, while they give you the ability to upgrade for more features, you still have a fully-functional piece of software at no cost. A free 3-day trial is not the same as an actual free version.

    There are a lot of good free options out there, but each generally specializes in one or two things. You probably need different pieces of software for different purposes. If you want a single parental control system that covers all your devices and gives you all the tools you need for both mobile and desktop, you won’t find one for free.

    If a more versatile option sounds worth paying for, check out our review of the best parental control tools to see if one of these options works for you.

    Best overall—Kurupira Web Filter

    Best overall

    Kurupira Web Filter

    Specs:

    • Automatic web filtering
    • Blacklisting and whitelisting
    • Time controls and scheduling

    Kurupira Web Filter is a simple and robust program for setting up parental controls on your computer. Kuripira offers a wide range of parental control features:

    • Web filtering
    • Time scheduling
    • Social media filtering
    • Application blocking
    • Activity reports

    Importantly, while the default web filter uses a smart filter to block potentially inappropriate websites, Kuripira also gives you the ability to set up a blacklist (only blocking specific sites) or a whitelist (only allowing specific sites) for internet use. You can also opt to allow access to any website and simply enable tracking.

    Kurupira Web Filter is Windows-only, so it can’t fill the role of a comprehensive parental control system across all your devices, but it’s a simple and powerful tool for setting up parental controls on your computer.

    Pros:

    • Full free version
    • Robust, customizable features

    Cons:

    • Windows only compatibility

    Best monitoring app—Life360 Family Locator

    Best monitoring app

    Life360 Family Locator

    Specs:

    • Geolocation tracking
    • Place alerts
    • Family Driving Summary

    Life 360 is a location monitoring app that allows parents to keep track of kids while giving them the freedom to roam about on their own. It gives parents several tools, such as customizable alerts when someone reaches places like home or school, location history, and weekly reports to keep track of activity.

    Life 360 focuses on one thing, and does it well. Still, it lacks useful features you find in more general-purpose parental control apps. It doesn’t monitor or filter web activity on your child’s devices, it just keeps track of location. Even so, its geolocation features make it a great supplement to other parental controls or a simple solution for those who just want to keep track of their kids.

    Pros:

    • iOS and Android availability
    • Real-time geolocation info

    Cons:

    • No web or activity monitoring

    Best freemium—Qustodio Free

    Best freemium

    Qustodio Free

    Specs:

    • Cross-platform compatibility
    • Screen time scheduling
    • Smart web filtering
    • Daily and weekly activity reports

     

    Get for Free

    Qustodio is one of the best paid parental control apps available, but it also has a free version. Unlike many parental controls with free trials that last only a few days, Qustodio’s free version lets you use it indefinitely.

    Although the free version lacks many of the features you get in the full version, this parental control app still has features for both time management and web filtering. It also comes from an established and reputable company, so you don’t have to worry about an open-source project running out of steam or breaking with your next software update.

    The biggest drawback to the free version of Qustodio is that it allows you to use it on only a single device—not particularly useful if you have more than one kid. On the other hand, this freemium business model allows you to upgrade to a paid plan if you find the free version useful enough that you’re willing to pay for additional features.

    Pros:

    • No expiration for free version
    • Web filtering
    • Time management tools

    Cons:

    • 1-device limit
    • Limited features compared to premium version

    Parental control features

    Parental controls have a wide range of features. Many programs take a broad approach and try to do a little bit of everything, while others focus on one feature and try to do it better than everyone else.

    If you limit yourself to free software, you don’t usually get the broad approach. Comprehensive parental control solutions usually require a paid subscription. Fortunately, there are excellent free options that focus on specific features, so thrifty parents can mix and match programs to get the most important features.

    Web filters

    Web filters are designed to block websites containing content that is inappropriate or potentially harmful for children. This can include malware, pornography, social media, instant messaging, and so forth. Any kind of automatic filtering suffers from two fundamental problems: overblocking or underblocking. Even customizable filters might block appropriate content while letting certain unwanted sites slip through.

    The best content filters give parents the option to blacklist or whitelist individual sites. A blacklist blocks specific sites, while a whitelist allows access only to approved sites. Such fine-tuned controls take more work to manage properly, but they can make sure your kids don’t get locked out of the sites they need for their biology homework. It also can save you from listening to Baby Shark 50 times in a row.

    Pro tip: Many routers come with built-in parental controls, such as web filters and time management tools. Buying a new router with parental controls can be a bit of an investment, but if your current router already has these features, setting them up doesn’t cost you a thing.

    Activity monitoring

    Web browsers keep an activity log by default, but activity monitoring software takes it up a notch, ranging from simply keeping a separate, uneditable browser history to detailed keylogging that captures every keypress and mouse click.

    Depending on use, activity trackers can be either the most hands-off parental controls or the most invasive. Choosing a tracker instead of a web filter can show trust in your children’s judgment and allow them the freedom to go where they want on the internet. On the other hand, keeping a tight watch over everything they do can feel more intrusive than outright blocking content.

    Pro tip: Keyloggers are most closely associated with computer hackers, who use them to steal passwords and other information from unsuspecting users. Some parental controls come with keyloggers, though in most cases, we’d consider this overkill.

    The difference between these scenarios has less to do with the software itself and more to do with communication with your kids. When you have clear expectations and boundaries with your kids, monitoring software can be a way to build trust. If your kids feel like you’re spying on them, it can have the opposite effect.

    Geolocation

    Much like activity tracking, location tracking works best when you communicate with your kids. Most geolocation software has features that can help you set expectations and reduce the amount of effort it takes to keep track of your kids.

    For example, geofencing and other location-based alerts let you know when your kids arrive at home, school, or work. Similarly, location history logs keep your kids accountable but don’t require constant monitoring.

    Our verdict

    If you’re a Windows user looking for parental controls, Kurupira Web Filter is the best free option we’ve seen. If you’re looking for parental controls for a Mac or mobile device, the free version of Qustodio is a solid choice, even if it doesn’t have all the features of the paid version.

    Free parental controls FAQ

    Is there a completely free parental control app?

    Kurupira Web Filter is our top pick for a completely free parental control program for Windows. You can download the full version of the program free of charge and install it on as many machines as you want.

    Can you use free parental controls indefinitely?

    You can use all the products recommended here for free as long as you need them. Many parental control apps offer just limited free trials. Qustodio, on the other hand, lets you use its free version indefinitely, though it does limit some features and how many devices it can be installed on.

    Using a VPN (virtual private network) slows down your internet connection. According to our research, you’ll see Wi-Fi speeds drop by as much as 77% as soon as you sign onto a VPN. 

    But you can still maintain reliable Wi-Fi speeds if you get a quality, subscription-based VPN. And you can keep your internet running smoothly as well if you keep your router updated and placed in a centralized location in your home.

    Here’s a quick guide on how a VPN impacts internet bandwidth. We’ll explain why your speeds get slower with a VPN and recommend the best VPNs to maintain fast speeds.

    Want to test your internet speed?

    Take our internet speed test to measure how your VPN is impacting your speeds.

    Download our free speed test app to test your speed from anywhere via your mobile phone.

    What are the best VPNs for internet speed?

    ServiceBest price option# of serversMax devices per subscriptionGet it
    NordVPN$59.88 for first year, then $99.48/year (starts at $4.99/mo.)5,000+6Sign Up
    ExpressVPN$99.84 for first year ($8.32/mo.)3,000+5Sign Up
    Surfshark$59.76 for two years ($2.49/mo.)3,200+UnlimitedSign up
    Private Internet Access$56.94 for first two years, then that price per year10,000+10Sign up
    Hotspot Shield$95.99/year ($7.99/mo.)3,200+5Sign Up
    CyberGhost$78.00 for two years ($3.25/mo.)8,000+7Sign up
    Hide.meFree ($69.95 for two years for paid version)1,700+1 (10 for paid service)Sign up

    NordVPN, ExpressVPN, and Surfshark consistently rank as the fastest VPNs among reviewers and experts—and they’re generally considered the best VPNs for privacy and other features, too. All three use efficient, up-to-date encryption protocols and have enough servers so you’re less likely to experience major network congestion when you sign on.

    Private Internet Access, Hotspot Shield, and CyberGhost are also well-known VPNs and have performed excellently in many speed tests. Private Internet Access also boasts the most servers of any VPN in the world, giving you more options to choose from. Hide.me isn’t as fast, but it’s a great free VPN service that doesn’t eat as much bandwidth as most free VPNs.

    Find fast internet

    The key to getting good speed on a VPN is starting with a good internet connection. Run a search with your zip code below to see what kind of internet providers and plans you can find in your area.

    Want to see how a VPN impacts your speed? Take a speed test

    Take our speed test to see if your VPN is slowing down your internet.

    Even the best VPN speeds can fluctuate daily. Your internet speed can also easily be impacted by a range of other factors, including your internet provider, the connection type, your plan, and the router you’re using. But a speed test gives you a ballpark estimate of how different VPNs impact your bandwidth.

    Here’s a quick rundown on how to do it.

    How to test VPN speed

    Step one: Run a speed test with your VPN disabled. Write down the results.

    Step two: Turn on the VPN and run the test again. Write down these results as well.

    Step three: Compare the two speeds to see how they are different.

    Step four: Repeat the process a few times throughout the day to see how the numbers differ.

    Why does a VPN slow down your internet?

    A VPN slows down your internet because it adds multiple extra steps to the process of getting data from your home internet network to your internet provider and back.

    VPNs work by letting you sign on to a separate server—usually located in a different state or foreign country. This creates a virtual tunnel that masks your online activity, IP address, and location, keeping you safe from hacking and online surveillance and giving you access to websites that you might not be able to visit otherwise (like foreign versions of Netflix).

    But encryption takes up bandwidth, routing a VPN through a foreign server increases latency (especially if it’s a server located in a distant state or country). A VPN’s own server bandwidth and efficiency can also impact your speed. If a VPN server is crowded with other users, it can lead to slower speeds and a less reliable connection.

    On the flip side, a VPN can also combat speed throttling from an ISP, as it masks the kind of data you use. So if your provider, say, caps video streaming at 5 Mbps, using a VPN could potentially improve your speed.

    How much speed do you need?

    Not everyone needs the fastest internet in the world—but having fast internet definitely helps ensure a smooth connection even when a slow VPN is in play. Use our “How Much Internet Speed Do I Need?” tool to see what bandwidth is best for your home setup.

     

     

     

    How can you make a VPN faster (or at least not as slow)?

    It’s hard to predict just how much a VPN may slow your internet speed because a lot of factors play into the speeds you’re getting. But there are a few things you can do to make sure you’re getting the most out of your VPN, speed-wise.

    Avoid free VPNs

    Free VPNs might work if you’re on a budget, but they typically don’t perform as well as subscription-based VPNs. They have fewer servers, so you have to share a single server with more users, and some are also loaded with malware that drains your bandwidth or even hijacks it for nefarious purposes. Also, some lesser VPNs collect your user data and sell it to make money, which is another good reason to avoid them.

    To ensure the best speeds—not to mention the best security and other features—stick to a well-vetted VPN that costs a monthly or annual subscription.

    Switch your VPN server location

    The best VPNs host servers all over the world. Some servers may perform better than others, depending on where they’re located and how many users are on each one. Try picking a server close to you to reduce the amount of time it takes to route your data to and from the VPN server.

    Troubleshoot your internet connection

    There are lots of ways to improve your internet connection. In addition to these VPN fixes, you can:

    • Get a router with Wi-Fi 5 or Wi-Fi 6 standards
    • Move your router to a centralized location in your home
    • Plug your computer directly into your modem/router with Ethernet
    • Remove unwanted users from your Wi-Fi network
    • Upgrade to a faster internet plan

    Take a look at our guide to faster Wi-Fi for more ideas.

    Use the WireGuard protocol

    Although OpenVPN is the most common and best-respected VPN protocol in use today, a newer protocol called WireGuard has been drawing positive attention since it launched in early 2021. Speed tests show it to be faster and more efficient than OpenVPN—although the latter still remains stronger for privacy.1, 2

    Most top-rated VPNs allow you to switch between different protocols, and NordVPN specifically supports WireGuard. You can switch between protocols on your VPN by going to the settings menu. Also, you can adjust the protocol settings to make your speeds faster.

    Get a better VPN

    Of course, if you’re experiencing consistent speed issues on your VPN, you can always try a new VPN to see if it fares better. NordVPN, ExpressVPN, and Surfshark are often the top-rated VPNs, but there are plenty of others worth trying. See our guide to the best VPNs for recommendations.

    Search below to see what internet you can get in your area—hopefully you can find fast speeds to support your sweet VPN.

    Sources

    1. JP Jones, TopVPN.com, “Wireguard vs. OpenVPN,” March 11, 2022. Accessed April 14, 2022.
    2. Sven Taylor, RestorePrivacy, “Wireguard VPN: Secure and Fast, but Bad for Privacy?” January 10, 2022. Accessed April 14, 2022.

    You can do several things right now to amp up the security on your router or gateway and keep those pesky hackers out. Start by changing the router’s default login credentials if you haven’t done so already. Also, change the wireless network’s name to something other than the manufacturer’s name, like from Linksys88578.

    Those two changes are just a few examples. We’ll walk you through seven steps to beef up the security on your router or gateway, such as changing passwords, updating firmware, and ensuring you’ve picked the correct settings to create an impenetrable fortress.

    Shopping around for new internet?

    Enter your zip code below to see which providers are available in your area.

     

    First, log in to your router

    Most of our instructions require you to dig into the router’s settings. You will need four things before we begin:

    • Username
    • Password
    • IP address or custom URL
    • Web browser or router app

    Generally, you can find the information you need on a label affixed to the bottom of the router—especially if you never changed the default credentials.

    For more in-depth instructions on how to find your default IP address and log in, check out our simple step-by-step guide on how to log in to your router.

    Now, let’s get started!

    7 ways to improve your router’s security

    Fix #1—Change the default login credentials

    This really isn’t a thing anymore, but we’ll address it nonetheless.

    All modern standalone routers and mesh systems include a label affixed to the bottom displaying the default username (usually admin) and a unique passphrase or PIN. This passphrase/PIN method is a little different than in years past when manufacturers shipped routers with generic login credentials many users supposedly never changed—credentials you can still find online today.

    And even though the supplied passphrase or PIN is unique to the router, it’s not meant for everyday use. The setup process forces you to create a new passphrase or password before you can use the router—no exceptions. In some setups we’ve seen, the passphrase and PIN apply only to Wi-Fi upon first connection—you don’t need login credentials to start the setup process.

    But what if you created a simple password—like the name of your favorite pet or pizza topping— to log in to your router? Change it, like, pronto.

    Why? A hacker armed with every possible username and password can brute-force their way into your router and take control. After that, someone could accuse you of crimes you didn’t commit. Sounds like fun? Of course not.

    We suggest using a password manager or creating a passphrase containing multiple unrelated words with characters and numbers. Do whatever it takes to make it memorable but unique and hard to crack, and then never use it on any other account or device—not even with the router’s Wi-Fi network.

    Fix #2—Change your Wi-Fi network name

    Make sure your Wi-Fi network’s name (or SSID) doesn’t identify the manufacturer. This step ensures that hackers lurking nearby don’t see the name broadcasted as Linksys and say, “How convenient! They have a Linksys router! I know how to break into their network!

    Changing the network name also makes hacking more difficult. The name ties into the router’s encryption, so you’re essentially giving hackers a head start if you’re using the default network name. And if you didn’t change the login credentials to something difficult to crack, you might as well open the door and let the hackers walk right on in. Please, help yourself!

    Naming your network something like Pretty Fly For A Wi-Fi or The LAN Before Time doesn’t tell would-be hackers any information except that your pun game is strong. Plus, it makes your Wi-Fi network easily distinguishable from other nearby networks—which is more important if you live within range of multiple networks.

    But keep the name 32 characters or shorter, and don’t use anything that can identify you, your address, your router, your pet, your favorite TV show, and so on. And don’t hide the network name—it’s not worth the trouble.

    Fix #3—Set a good Wi-Fi network password

    All routers require you to set the network name and password during the initial setup, so be sure to use a password that’s hard to crack.

    As previously suggested, use a password manager or set a memorable passphrase using multiple unrelated words with characters and numbers. Longer passwords are more secure—but don’t use something like Password1234.

    Check out our guide on how to change your Wi-Fi network name and password for more information.

    Fix #4—Update your firmware

    Like every other operating system you use, keep your router’s firmware version current. Firmware updates increase your router’s efficiency, patch any bugs, and fix known vulnerabilities. Most router manufacturers keep up with firmware updates for several years after the router’s initial release.

    All routers check the manufacturer’s distribution server for firmware updates, but not all of them download and install updates automatically. On the ones that do, the “automatic update firmware” setting is toggled on by default, so there’s no manual input on your part.

    But there’s a caveat to consider. Some routers don’t automatically download and install firmware updates on purpose, which gives us pause when we suggest the auto-update function. Why? Here are two possible scenarios:

    • A manufacturer could upload and distribute unintentionally faulty firmware—it’s rare, but it happens.
    • Hackers could infiltrate the distribution server and infect all firmware files.

    Overall, you’re probably safe in using the auto-update feature if it’s available to you. There shouldn’t be any issues installing and using new firmware. But we wanted you to be aware that the chance of irreversible damage is still a faint possibility, as bad firmware can turn your router into a $300 paperweight.

    Read our guide on how to update your router’s firmware.

    Fix #5—Disable unnecessary features

    There are a few router features that are built for convenience but not security:

    Wi-Fi Protected Setup (WPS)

    WPS lets you connect devices to your Wi-Fi network without entering a password. All you do is press a button or enter an eight-digit pin to connect the new device to your Wi-Fi network. Convenient, right? That convenience allows a hacker to use a brute-force attack to figure out the PIN and take control of the router—they don’t need to access the WPS button. Disable this feature immediately.

    Remote access

    There are two types of remote access, but the one you should be concerned about resides in the web interface.

    In short, you can access the router from anywhere outside your home network and change the settings. But it’s also an easy entry point for hackers if you never changed the default login credentials—or use simple ones hackers can easily crack. Manufacturers generally toggle off this feature by default, but it doesn’t hurt to double-check for peace of mind.

    If you intend to use this feature while on a business trip, then by all means, toggle it on as needed, but don’t leave it on 365 days a year. Most leading router brands now offer mobile apps and free cloud accounts, so you can remotely manage your home network safely.

    Universal Plug and Play (UPnP)

    The UPnP protocol was initially designed to connect devices to each other without the need to install drivers or configure settings manually. Now everything seems to be UPnP-compatible, so you can share a printer across your network, for example, or connect your Amazon Fire TV stick to your Smart TV.

    All this convenience allows the router to open ports (or doorways) for these devices—no questions asked. But it also opens up a whole new world of connections from the internet side, allowing hackers to connect by posing as a UPnP device requesting access remotely.

    UPnP in routers is a vulnerability that has been exploited several times over the last 12 years. You can disable UPnP in the router’s settings, but you might notice the inconvenience. Deciding whether to disable this setting is a trade-off of convenience vs. security.

    Fix #6—Create a guest network

    A guest network gives visitors access to the internet, but it prevents them from accessing files, folders, and devices you share over the local network (or intranet).

    The router creates a virtual network name (SSID) when you enable a guest network. You can then create a unique password and share both with guests—you don’t need to share your local network’s password. You can even allow the guest network to access your shared files, folders, and devices—but that opens the door to malware infections.

    A guest Wi-Fi network also gives you more power over how your guests use your Wi-Fi. For example, you can block certain websites or types of content, limit bandwidth usage, or set a schedule for when the guest network is active—it’s like parental controls for adults. In fact, you can create a guest network for kids and teens if the router’s parental controls are insufficient.

    Read our guide on how to set up a guest Wi-Fi network.

    Fix #7—Schedule a reboot

    Your internet provider assigns your public internet address to the first device connected to your modem or fiber ONT. That’s typically your router, and the address assigned to it usually refreshes every 14 days. Still, rebooting the router once a week wouldn’t hurt just in case a hacker obtained one of your public addresses. Plus, a reboot clears out the router’s memory and any communication problems.

    Read more about how often you should reboot your router.

    Do you have the best, most secure router?

    All routers have security features to keep you and your family safe. But you want a router with security that’s as solid as a brick wall. Check out our guide on the best routers for security to beef up your home network.

    Other security measures you should consider

    You can do other things to protect your router from malware and other unfriendly connections.

    Never disable encryption

    All routers enable some version of Wi-Fi Protected Access (WPA) encryption by default during setup. It protects all data transmissions between your router and devices from eavesdropping hackers lurking nearby. Never disable encryption unless you’re troubleshooting a Wi-Fi connection—and only do so briefly.

    Wi-Fi Protected Access 3 (WPA3) is the most recent and secure encryption in Wi-Fi 6 and Wi-Fi 6E routers. If you don’t have access to WPA3, Apple suggests using WPA2-AES (Advanced Encryption Standard) as your next-best solution, which all modern routers provide.

    Keep your devices up to date

    For your whole network to be secure, you want to make sure that every device on your network is also secure. The best way to do this is to keep all your devices updated. That means phones, computers, gaming consoles, smart home devices, printers, and everything else that uses an internet connection.

    Make sure to keep up with software updates and patches. Many routers have some built-in security features to scan your network and connected devices for vulnerabilities, so take advantage of that to ensure your connections stay secure.

    Use a VPN

    A virtual private network (VPN) is a network of remote servers that removes your location and other information when they forward your data to the destination. VPNs don’t increase your router’s security but instead hide the public internet addresses they use.

    You may be familiar with VPNs like NordVPN used on individual devices. Some routers include a built-in VPN client, so you don’t have to install software on every device you own. Just enter the VPN subscription credentials into the router, and you’re good to go. Even devices that don’t support VPN software are protected.

    Routers may include a VPN server too. This component allows you to use the router as a private VPN server, so you can forward your browsing data through the router while using a coffee shop’s public Wi-Fi.

    One downside to VPNs is that they can increase latency, which can interfere with online gaming or video calls. To keep an eye on this, you should keep track of your network speeds with an internet speed test.

    Load the Speed Test

    Back to top