educational

Wi-Fi - Security First

One of the benefits of modern mobile technology is the ability of many devices to connect to the Internet — wherever and whenever wireless signals are available. From laptops to Smartphones and other devices, users are surfing the web, checking emails, sending and receiving instant messages, monitoring their online bank accounts and more — all while on the road and away from their home or office.

While this level of information availability is beneficial, it comes at a substantial risk to the privacy of that data and the security of the system used to view it when the source of the device’s Internet access comes via an unsecured Wi-Fi connection. Indeed, this is a problem area for complacent home and office Wi-Fi users as well, when proper security precautions are not in place to bolster network security.

Although newer computer operating systems such as Windows 7 easily recognize and configure themselves to available Wi-Fi networks, these networks — especially in public settings such as coffee shops — tend to be openly accessible, in part due to the support burden of issuing and maintaining user accounts and passwords for a transient user base.

This opens up the possibility that other users on the same network — such as the nice fellow sitting across from you at the coffee shop, or in the next hotel room — are reading your emails and looking at your bank statements. Readily available software tools allow anyone to view the content being sent between wireless access devices and its connected users on unencrypted networks, making surfing as private as a conversation in a crowded restaurant — with your phone set to “Speaker.”

Consider the amount of competitive intelligence that is gleaned by savvy users while at industry gatherings — regardless of the industry — as conventioneers make use of that free Wi-Fi Internet access. Perhaps that is one reason why “the other guy” always seems to know your plans ahead of time…

For those looking to surf more safely, a number of simple solutions can dramatically improve the privacy of Internet communications. The first and most important thing users can do is to limit online access to secured, rather than open, Wi-Fi networks. This is not an issue of whether or not a fee is involved, as premium services are not always secure; but of having to use a username and password to gain network access at a level deeper than that required of payment gateways alone.

When a secure, encrypted network is not available, computer users must take other steps to ensure the greatest degree of privacy.

One major move in the right direction is the use of a secure webmail program rather than a standard email program like Outlook. You can tell if your webmail is secure by looking at the URL — it should start with https:// rather than simply https:// — and that includes the internal pages, where your email is displayed, read and sent, not just on the account’s login page. The new version of Google’s Gmail is a great example of a secure webmail client — unlike some well known competitors that only use secure login pages.

A virtual private network (VPN) is your best chance for data security at unencrypted hot spots and is available to many corporate users, allowing for a virtual tunnel between the user and the office network, which then passes along Internet requests. This is not always an option, however — but this does not mean that you cannot have the benefits of your own VPN, free of charge.

Hotspot Shield is a service of AnchorFree (www.anchorfree. com) which provides its users with “private, secure and anonymous” Internet access — even from your iPhone. Download the software to encrypt your surfing sessions using https://, without revealing your IP address — on wired and wireless connections alike — without bandwidth limits or ongoing service fees.

If your device is equipped with a firewall, ensure that it is activate to prevent access by unauthorized users. This will not prevent you from sending or receiving unencrypted data across an unsecure network, but it will minimize attacks from other network users — even when they are unaware that they are attacking you, such as when malware infected machines spread so-called botnets.

Be sure to verify that the network that you are connecting to is indeed the network you intend to connect to, using connection verification prompts if your system allows it. This is especially important in urban areas where many Wi-Fi networks may be available — including those run by criminals attempting to compromise unprotected systems.

Check your system’s settings to make sure that folder sharing access is set to private and disable file and printer sharing features to shore up these vulnerable points which are often left open for secure home or office networking — and left unlocked while traveling.

Finally, if you are deeply concerned about the security of your personal or business data and online communications, then the best bet is to remove as many sensitive files from your system as possible before accessing an unsecured network — and encrypt the files that you have remaining.

Properly setting up your Internet accessible devices and taking other proactive measures is fundamental to surfing security when Wi-Fi networks are involved. With the information presented here as a guide, using a hotspot will no longer be akin to publicly displaying your most sensitive information — and coupled with a VPN, plus updated antivirus and firewall software — should allow you to enjoy worry-free surfing.

Related:  

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

How to Halt Hackers as Fraud Attacks Rise

For hackers, it’s often a game of trial and error. Bad actors will perform enumeration and account testing, repeating the same test on a system to look for vulnerabilities — and if you are not equipped with the proper tools, your merchant account could be the next target.

Cathy Beardsley ·
profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
opinion

Creating Payment Redundancies to Maximize Payout Uptime

During the global CrowdStrike outage that took place toward the end of July, a flawed software update brought air travel and electronic commerce to a grinding halt worldwide. This dramatically underscores the importance of having a backup plan in place for critical infrastructure.

Jonathan Corona ·
opinion

The Need for Minimal Friction in Age Verification Technology

In the adult sector, robust age assurance, comprised of age verification and age estimation methods, is critical to ensuring legal compliance with ever-evolving regulations, safeguarding minors from inappropriate content and protecting the privacy of adults wishing to view adult content.

Gavin Worrall ·
opinion

Account-to-Account Payments: The New Banking Disruptor?

So much of our industry relies upon Visa and Mastercard to support consumer payments — and with that reliance comes increased scrutiny by both brands. From a compliance perspective, the bar keeps getting raised until it feels like we end up spending half our time making sure we are compliant rather than growing our business.

Cathy Beardsley ·
profile

WIA Profile: Samantha Beatrice

Beatrice credits the sex positivity of Montreal for ultimately inspiring her to pursue work in adult entertainment. She had many friends working in the industry, from sex workers to production teams, so it felt like a natural fit and offered an opportunity to apply her marketing and social media savvy to support people she truly believes in and wants to see succeed.

Women In Adult ·
Show More