We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.

croom new

Exciting News! Preferred Acquires Business System Solutions Grand Rapids Learn More
Toggle Bar

Preferred Blog

Preferred has been serving the Tinley Park area since 1991, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Know Who Is Using Your WiFi

We all know how annoying WiFi can be at times. Sometimes it’s simply a bad connection, or perhaps there are too many devices accessing your network. Or, maybe it’s your sneaky neighbor stealing your WiFi. Regardless of what the cause is, there’s a way to check your WiFi usage in the Windows operating system.

A free application called Who is On My WiFi lets you get down to the root of the problem by letting you take a look at your network first-hand. But you might be wondering why you need to worry about your WiFi network. The fact remains that it can be risky having an unsecured network, as hackers could access your wireless signal and cause all sorts of mischief.

whosonmywifi

Even if you have encryption, many forms of wireless networks can be cracked all the same. To make matters worse, routers only tell you who is on your network in the given moment. If they have accessed your network before or after you check, you won’t know. Therefore, other options can be helpful toward keeping your network secure and safe.

In order to use it, follow these steps:

  • Install the application, Who is On My WiFi.
  • Open the app, then follow the tutorial steps. Your network scan should start.
  • Notice the list of IP addresses connected to your network. Each device should have a MAC address, as well as the local IP address of the modem you use to connect to the Internet.
  • Identify the different devices connected to your network. You’ll have to assign labels to your devices so you can tell which IP address belongs to which device. You can assign labels by using the Description box. Afterward, click Save. If you know your MAC addresses, you’ll have a much easier time identifying which device is which.
  • Look for unknown devices on your WiFi network. If you have some that are connected, you’ll probably want to change your password.

If you’re still unsure about your wireless network’s security, you should call Preferred at 708-781-7110. We can configure your wireless router to lock it down and prevent unwanted devices from accessing it. Additionally, with our comprehensive managed services offering we can monitor your network for suspicious activity. With Preferred on your side, you won’t have to fear those who might steal more than just your Internet access.

Cover Your Bases by Archiving Your Company’s Email
Will Microsoft’s New Office App Sway Dethrone Powe...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Sunday, December 14 2025

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Blog Archive

      Latest Blog Entry

      For many small and mid-sized businesses, cybersecurity once felt like something for the “big guys.” You had antivirus software, ran updates occasionally, and assumed your data was too small to attract attention. But that illusion is gone. Today, cybersecurity is no longer op...

      Latest News

      Preferred Communication Systems Acquires Business System Solutions’ Grand Rapids Operations, Expanding Midwest Footprint

      GRAND RAPIDS, MI, UNITED STATES, December 3, 2025 -- Preferred Communication Systems (Preferred), a leading provider of Managed IT and Cybersecurity services headquartered in Chicago, Illinois, proudly announced the acquisition of Business System Solutions’ (BSS) Grand Rapids location.

      This strategic acquisition enhances Preferred’s presence in the Midwest and strengthens its commitment to helping small and mid-sized businesses achieve peace of mind and a better bottom line through technology.