Protecting Your Privacy in Public: The Dangerous World of Public Wi-Fi Hotspots
On one hand, public Wi-Fi can be a godsend. You are stuck in an airport and can get work done, surf the Internet without using your data, or avoid that hassles of tethering. Or, you can go down the street to that Starbucks with a nice outside terrace, allowing you to get some work done without the same four walled cubicle staring straight at you. Public Wi-Fi has become such an integral part of our everyday lives that many people do not think twice about connecting to an unfamiliar network.
However, because we are so used to these Wi-Fi hotspots, we forget or are not simply aware of the real dangers these hotspots hide. Never using public free Wi-Fi hotspots is simply not realistic, and is in fact simply not practical in today’s world. There are ways to protect yourself though while using hotspots, but what exactly are you trying to protect yourself from?
Protecting your identity, Protecting Yourself
Easy, simple recommendations for security
Public Wi-Fi is becoming ubiquitous, as is our need for mobile computing. With laptops, tablets, smartphones, wearable technology, and as-yet-unknown technological advances on the horizon, we should be lauding the availability of public Wi-Fi networks. However, in order to enjoy their benefits, we need to take appropriate and necessary steps to protect ourselves. There are a few things you can do when connecting to public Wi-Fi hotspots to minimize risk of having you information stolen or compromised.
- Avoid sending and accessing sensitive information: If you are planning to do some online banking, perform sensitive tasks for work, or even access your personal social media accounts, try to avoid doing so while connected to Wi-Fi hotspots due to the multiple risks discussed earlier.
- Do not auto-connect to available Wi-Fi networks: Sure, it saves you a few moments if you are auto-connecting. However, many public wi-fi hotspots throughout cities and establishments carry the same names and entry requirements. Therefore, when walking around or simply ordering a Starbucks coffee to-go, you could be auto-connecting and putting yourself at risk for minimal reason or connection time. Connect to Wi-Fi networks you know - do not simply connect to any free Wi-Fi thinking you are getting a risk-free ride.
- Use a VPN: The best way to protect yourself, regardless of device and network, is by using a VPN (Virtual Private Network). A VPN masks your devices location and identity by rerouting your IP address to your selected VPN server. In addition, a VPN also functions as its own network with personal management and security tools, allow you to have encrypted browsing sessions and improving your overall user safety.
Other concerns with public Wi-Fi hotspots
Additionally, hacker and "malicious" information collection should not be your only concerns regardless of whether you are connected to your own or a public Wi-Fi network. Many apps and websites are tracking you and collecting information. Sometimes, this collection is helpful and non-harmful as it is aimed at improving your user experience. Other times, personally identifiable information, even that collected by a reputable company, can end up in the hands of hackers. To learn more about this topic, check out our guide on Data Mining. If you truly want to protect your personal information, you must consider that it is being collected non-stop by various different entities online. Even trusted apps such as Waze, Facebook, Facebook Messenger, and so forth are collecting and transmitting data regarding your activities online.
VPNs as a solution
VPNs are an affordable and very secure way to make the most of your desktop and mobile computing devices security. While there are free VPN services, these are often less secure and have fewer server choices and safety protocols than those which are paid. You can even find VPN providers that are able to protect each of your devices, sometimes even up to five devices with one account. When searching for a VPN, be aware of what kind you want and pay attention for services which utilize strong encryption protocols and no log policies so you can ensure your data is secure, private, and anonymous.