How to avoid the risks in Wi-Fi hotspots
The number of WLAN hotspots is growing at least since the abolition of the so-called “Störerhaftung” (German term) which takes the operator of the WLAN network out of liability.
However, each medal always has two sides, and so the risks should not be ignored in addition to the benefits of higher data throughput and protection of their own high-speed data volume through free Wi-Fi networks. For smartphones and tablets that are primarily logged into hotspots are sometimes more personal information than on the home PC.
In addition to contact information, pictures, documents and passwords, motion profiles can also be stored there, which make the user completely transparent. In our article we would like to point out the most important points from our point of view which can provide more security in WLAN hotspots.
How to avoid the risks in Wi-Fi hotspots
The number of WLAN hotspots is growing at least since the abolition of the so-called “Störerhaftung” (German term) which takes the operator of the WLAN network out of liability.
However, each medal always has two sides, and so the risks should not be ignored in addition to the benefits of higher data throughput and protection of their own high-speed data volume through free Wi-Fi networks. For smartphones and tablets that are primarily logged into hotspots are sometimes more personal information than on the home PC.
In addition to contact information, pictures, documents and passwords, motion profiles can also be stored there, which make the user completely transparent. In our article we would like to point out the most important points from our point of view which can provide more security in WLAN hotspots.
1. Do not leave Wi-Fi permanently enabled
1. Do not leave Wi-Fi permanently enabled
By default, devices such as smartphones or tablets are set up so that the WLAN module is permanently activated in order to be able to immediately use your own WLAN at home without switching. As soon as you are on the move, the device constantly starts to search for available Wi-Fi networks in the area and log in there.
Since the access to WLAN hotspots for the users is to be kept as simple as possible by the operators, these are often accessible without a password. If you are now in the area of a public hotspot, then your device logs in (depending on the individual configuration) in this network without you have previously confirmed this active.
However, since you are not usually alone in such a network, and also have no control over the security settings (which usually do not exist), you may open the door to people with criminal intentions.
Therefore, it is recommended to turn off the WLAN module in the smartphone when leaving the home network, and only to activate as needed. Some devices also offer the option to disable the WLAN module automatically as soon as the home network is left, and reactivated as soon as it is available again.
With this measure, you even kill two birds with one stone. Because in addition to the security aspect, the permanent WLAN network search of the device also costs valuable battery power, which, despite power-saving operating systems and built-in hardware, hardly lasts more than a day.
By default, devices such as smartphones or tablets are set up so that the WLAN module is permanently activated in order to be able to immediately use your own WLAN at home without switching. As soon as you are on the move, the device constantly starts to search for available Wi-Fi networks in the area and log in there.
Since the access to WLAN hotspots for the users is to be kept as simple as possible by the operators, these are often accessible without a password. If you are now in the area of a public hotspot, then your device logs in (depending on the individual configuration) in this network without you have previously confirmed this active.
However, since you are not usually alone in such a network, and also have no control over the security settings (which usually do not exist), you may open the door to people with criminal intentions.
Therefore, it is recommended to turn off the WLAN module in the smartphone when leaving the home network, and only to activate as needed. Some devices also offer the option to disable the WLAN module automatically as soon as the home network is left, and reactivated as soon as it is available again.
With this measure, you even kill two birds with one stone. Because in addition to the security aspect, the permanent WLAN network search of the device also costs valuable battery power, which, despite power-saving operating systems and built-in hardware, hardly lasts more than a day.
2. Use VPN for WLAN Hotspot
2. Use VPN for WLAN Hotspot
Of course, even after you have bypassed the risk of automatic and uncontrolled login to a Wi-Fi hotspot, the danger is not banned.
Let’s say you are sitting in a café with free Wi-Fi hotspot, and ask the operator or even the operator for the security standards of the network before use.
Presumably, you will be first big silence paired with an even larger question mark over the head and reap incomprehensible views.
In short, it is very common that just because the Störerhaftung for operators of WLAN hotspots was defused – to strengthen the offer of these free Internet access – they do not care about security, and also do not have the appropriate know-how.
So it’s up to you to be in a network with an unknown number of attendees and their usage patterns, and maybe even do banking or online shopping there, diligently entering your passwords. Nobody can guarantee you that the one or the other 2 tables continue to surf with the laptop now just in the net, or trying to gain access to the devices in the network.
One solution for this are the so-called VPN providers who provide a kind of tunneling solution especially for anonymous Internet access. The offer is now quite large, and offers a high level of security but it is usually not free. But you get a free trial account almost everywhere to test whether the offer is right for you.
Providers who offer completely free VPN (Virtual Private Network), and at the same time the high standards of security, there is not really, and therefore do not represent an adequate alternative. Because no one can permanently offer such a service for free and maintain their own performance.
Of course, even after you have bypassed the risk of automatic and uncontrolled login to a Wi-Fi hotspot, the danger is not banned.
Let’s say you are sitting in a café with free Wi-Fi hotspot, and ask the operator or even the operator for the security standards of the network before use.
Presumably, you will be first big silence paired with an even larger question mark over the head and reap incomprehensible views.
In short, it is very common that just because the Störerhaftung for operators of WLAN hotspots was defused – to strengthen the offer of these free Internet access – they do not care about security, and also do not have the appropriate know-how.
So it’s up to you to be in a network with an unknown number of attendees and their usage patterns, and maybe even do banking or online shopping there, diligently entering your passwords. Nobody can guarantee you that the one or the other 2 tables continue to surf with the laptop now just in the net, or trying to gain access to the devices in the network.
One solution for this are the so-called VPN providers who provide a kind of tunneling solution especially for anonymous Internet access. The offer is now quite large, and offers a high level of security but it is usually not free. But you get a free trial account almost everywhere to test whether the offer is right for you.
Providers who offer completely free VPN (Virtual Private Network), and at the same time the high standards of security, there is not really, and therefore do not represent an adequate alternative. Because no one can permanently offer such a service for free and maintain their own performance.
3. Use adequate antivirus protection
3. Use adequate antivirus protection
Of course, since a smartphone offers far more possibilities than even the simple mobile phones of the past, this also includes the possibility that viruses and Trojans spread out on the device, causing unnoticed unimaginable damage there.
It is therefore a duty to ensure adequate antivirus protection. Namely, not only the almost unlimited number of available apps pose a security risk, but also many other access routes that can come over networks on the device.
The manufacturers of anti-virus programs have meanwhile all corresponding offers as complete packages for several terminals in the program, so that in any case one will find it here. One should refrain from pure free antivirus programs, as they often do not offer the recognition rate of paid offers in tests.
Security has its price. And there you should not actually save at the wrong end, especially since complete packages for multiple devices only mean little or no extra charge.
Of course, since a smartphone offers far more possibilities than even the simple mobile phones of the past, this also includes the possibility that viruses and Trojans spread out on the device, causing unnoticed unimaginable damage there.
It is therefore a duty to ensure adequate antivirus protection. Namely, not only the almost unlimited number of available apps pose a security risk, but also many other access routes that can come over networks on the device.
The manufacturers of anti-virus programs have meanwhile all corresponding offers as complete packages for several terminals in the program, so that in any case one will find it here. One should refrain from pure free antivirus programs, as they often do not offer the recognition rate of paid offers in tests.
Security has its price. And there you should not actually save at the wrong end, especially since complete packages for multiple devices only mean little or no extra charge.
Popular Posts:
Warum dein Excel-Kurs Zeitverschwendung ist – was du wirklich lernen solltest!
Hand aufs Herz: Wann hast du zuletzt eine komplexe Excel-Formel ohne Googeln getippt? Eben. KI schreibt heute den Code für dich. Erfahre, warum klassische Excel-Trainings veraltet sind und welche 3 modernen Skills deinen Marktwert im Büro jetzt massiv steigern.
Cybersicherheit: Die 3 größten Fehler, die 90% aller Mitarbeiter machen
Hacker brauchen keine Codes, sie brauchen nur einen unaufmerksamen Mitarbeiter. Von Passwort-Recycling bis zum gefährlichen Klick: Wir zeigen die drei häufigsten Fehler im Büroalltag und geben praktische Tipps, wie Sie zur menschlichen Firewall werden.
So sieht das wirklich perfekte Homeoffice-Setup für 2026 aus
Ihr Homeoffice ist veraltet? Steigern Sie 2026 Produktivität & Gesundheit. Unser Guide zeigt das perfekte Setup: von ergonomischen Stühlen und 4K-Webcams bis zu Mesh-WLAN und Kabelmanagement. So investieren Sie in Ihre Karriere.
Internet, Telefon & TV: Die besten Komplettpakete
Internet, TV & Telefon aus einer Hand? Wir vergleichen die Komplettpakete von Telekom, Vodafone, O2 & 1&1. Wer punktet bei Speed, TV-Komfort (MagentaTV vs. GigaTV) und Preis? So finden Sie das beste Triple-Play-Angebot für Ihre Adresse.
5 Anzeichen, dass dein Chef dich im Homeoffice digital überwacht
Nur weil du im Homeoffice bist, heißt das nicht, dass dir niemand zusieht. "Bossware" ist auf dem Vormarsch. Wir zeigen 5 subtile Anzeichen für digitale Überwachung – von "Teams-Status"-Kult bis zu verdächtigen IT-Tools. So erkennst du die Warnsignale und schützt deine Karriere.
Schluss mit dem Tool-Chaos: 5 Apps, die Euer Office wirklich produktiver machen
Schluss mit digitaler Reibung: Diese 5 Apps machen Ihr Büro wirklich produktiver. Entdecken Sie, wie Asana, Loom, Notion, Zapier und Slack die Effizienz steigern, Meetings reduzieren und Ihr Team smarter vernetzen – wenn man sie richtig einsetzt.
Popular Posts:
Warum dein Excel-Kurs Zeitverschwendung ist – was du wirklich lernen solltest!
Hand aufs Herz: Wann hast du zuletzt eine komplexe Excel-Formel ohne Googeln getippt? Eben. KI schreibt heute den Code für dich. Erfahre, warum klassische Excel-Trainings veraltet sind und welche 3 modernen Skills deinen Marktwert im Büro jetzt massiv steigern.
Cybersicherheit: Die 3 größten Fehler, die 90% aller Mitarbeiter machen
Hacker brauchen keine Codes, sie brauchen nur einen unaufmerksamen Mitarbeiter. Von Passwort-Recycling bis zum gefährlichen Klick: Wir zeigen die drei häufigsten Fehler im Büroalltag und geben praktische Tipps, wie Sie zur menschlichen Firewall werden.
So sieht das wirklich perfekte Homeoffice-Setup für 2026 aus
Ihr Homeoffice ist veraltet? Steigern Sie 2026 Produktivität & Gesundheit. Unser Guide zeigt das perfekte Setup: von ergonomischen Stühlen und 4K-Webcams bis zu Mesh-WLAN und Kabelmanagement. So investieren Sie in Ihre Karriere.
Internet, Telefon & TV: Die besten Komplettpakete
Internet, TV & Telefon aus einer Hand? Wir vergleichen die Komplettpakete von Telekom, Vodafone, O2 & 1&1. Wer punktet bei Speed, TV-Komfort (MagentaTV vs. GigaTV) und Preis? So finden Sie das beste Triple-Play-Angebot für Ihre Adresse.
5 Anzeichen, dass dein Chef dich im Homeoffice digital überwacht
Nur weil du im Homeoffice bist, heißt das nicht, dass dir niemand zusieht. "Bossware" ist auf dem Vormarsch. Wir zeigen 5 subtile Anzeichen für digitale Überwachung – von "Teams-Status"-Kult bis zu verdächtigen IT-Tools. So erkennst du die Warnsignale und schützt deine Karriere.
Schluss mit dem Tool-Chaos: 5 Apps, die Euer Office wirklich produktiver machen
Schluss mit digitaler Reibung: Diese 5 Apps machen Ihr Büro wirklich produktiver. Entdecken Sie, wie Asana, Loom, Notion, Zapier und Slack die Effizienz steigern, Meetings reduzieren und Ihr Team smarter vernetzen – wenn man sie richtig einsetzt.



























