Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Top tips to stay safe on public Wi-Fi networks

7 of 8 NEXT PREV
  • Enable your firewall

    Enable your firewall

    Let's start with the basics -- enabling your firewall is the first layer of protection for your PC. Firewalls can stop malware and intruders from compromising your system, and it takes no more than selecting 'On' to implement on both Windows and Mac systems.

    In the latest Windows 10 build, go to Search --> type Firewall, and select Turn Windows Firewall on or off. In Mac systems, go to System Preferences --> Security and Privacy, and then make sure the Firewall button is green and enabled.

    Published: October 8, 2015 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Use a VPN

    Use a VPN

    Virtual private networks (VPNs) are a popular way to disguise your Internet activity, but they can also be a way to protect your communication channels. VPNs, available for free and by subscription, provide a level of encryption which can prevent eavesdropping -- which is particularly important when using public networks.

    Published: October 8, 2015 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • HTTPS

    HTTPS

    While VPNs are a good start, using HTTPS, a protocol which encrypts requests sent to a domain, can also help keep your data safe. While usually found on sites which deal with financial transactions, using browser extensions such as HTTPS Everywhere activates encryption on websites which support the protocol. The add-on is available from EFF for the Chrome, Opera and Firefox browsers.

    Published: October 8, 2015 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Avoid accessing sensitive information

    Avoid accessing sensitive information

    The hotspot is public and you don't know how secure it is, nor are you in control. Therefore, you should avoid accessing any sensitive accounts -- such as financial services or online payment providers -- as a matter of caution. If malware is present and your keystrokes are being recorded -- or a man-in-the-middle attack has been performed -- you will be letting yourself in for heartache later. Wait until you get home.

    Published: October 8, 2015 -- 08:00 GMT (01:00 PDT)

    Photo by: Europol

    Caption by: Charlie Osborne

  • Check for spoofed hotspots

    Check for spoofed hotspots

    Double-check for any spoofed hotspots before you connect, as they may look official but lure you to download malicious software. Spoofed hotspots may appear legitimate with names such as "Free Wi-Fi" or duplicating a retail store's hotspot i.e. "Starbucks WiFi." but are actually gateways for attackers to conduct phishing campaigns, MITM attacks and surveillance. If a hacker conducts a man-in-the-middle attack, any communication sent from your system to online services may be spied upon, leading to data theft or potential malware payloads being deployed.

    Published: October 8, 2015 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Patch regularly

    Patch regularly

    If you connect your device to a public Wi-Fi hotspot and your system is out-of-date, vulnerabilities may exist in your software which are avenues for hackers to infiltrate. Make sure all of your software is bumped up to the latest version to reduce the risk of exploit.

    Published: October 8, 2015 -- 08:00 GMT (01:00 PDT)

    Photo by: Symantec

    Caption by: Charlie Osborne

  • Enable two-factor authentication

    Enable two-factor authentication

    Online service providers are rolling out two-factor authentication more widely as data breaches become more common. By linking accounts to a mobile device and requiring a second layer of authentication before being granted access to an account -- such as inputing a code sent to your smartphone -- even if credentials are stolen via public Wi-Fi networks, attackers still cannot compromise your account.

    Published: October 8, 2015 -- 08:00 GMT (01:00 PDT)

    Photo by: Devices: Apple

    Caption by: Charlie Osborne

  • Do not automatically connect to open hotspots

    Do not automatically connect to open hotspots

    While connection features offered by smartphone vendors which automatically switch from mobile roaming to open Wi-Fi networks can save you on your bill, they can also put you at risk if you're not careful. For the sake of security over convenience, consider turning these features off so you can control which networks your mobile connects to manually.

    Published: October 8, 2015 -- 08:00 GMT (01:00 PDT)

    Photo by: F-Secure

    Caption by: Charlie Osborne

7 of 8 NEXT PREV
Charlie Osborne

By Charlie Osborne for Zero Day | October 8, 2015 -- 08:00 GMT (01:00 PDT) | Topic: Security

  • Enable your firewall
  • Use a VPN
  • HTTPS
  • Avoid accessing sensitive information
  • Check for spoofed hotspots
  • Patch regularly
  • Enable two-factor authentication
  • Do not automatically connect to open hotspots

There are a number of quick and easy ways to improve your personal privacy and safety when using public Internet services.

Read More Read Less

Enable two-factor authentication

Online service providers are rolling out two-factor authentication more widely as data breaches become more common. By linking accounts to a mobile device and requiring a second layer of authentication before being granted access to an account -- such as inputing a code sent to your smartphone -- even if credentials are stolen via public Wi-Fi networks, attackers still cannot compromise your account.

Published: October 8, 2015 -- 08:00 GMT (01:00 PDT)

Caption by: Charlie Osborne

7 of 8 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne for Zero Day | October 8, 2015 -- 08:00 GMT (01:00 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums