Der Blog für digitale Kompetenz

Der Blog für digitale Kompetenz

How to avoid the risks in Wi-Fi hotspots

The number of WLAN hotspots is growing at least since the abolition of the so-called “Störerhaftung” (German term) which takes the operator of the WLAN network out of liability.

However, each medal always has two sides, and so the risks should not be ignored in addition to the benefits of higher data throughput and protection of their own high-speed data volume through free Wi-Fi networks. For smartphones and tablets that are primarily logged into hotspots are sometimes more personal information than on the home PC.

In addition to contact information, pictures, documents and passwords, motion profiles can also be stored there, which make the user completely transparent. In our article we would like to point out the most important points from our point of view which can provide more security in WLAN hotspots.

WLAN Hotspot Risks

Topic Overview

Anzeige

How to avoid the risks in Wi-Fi hotspots

The number of WLAN hotspots is growing at least since the abolition of the so-called “Störerhaftung” (German term) which takes the operator of the WLAN network out of liability.

However, each medal always has two sides, and so the risks should not be ignored in addition to the benefits of higher data throughput and protection of their own high-speed data volume through free Wi-Fi networks. For smartphones and tablets that are primarily logged into hotspots are sometimes more personal information than on the home PC.

In addition to contact information, pictures, documents and passwords, motion profiles can also be stored there, which make the user completely transparent. In our article we would like to point out the most important points from our point of view which can provide more security in WLAN hotspots.

WLAN Hotspot Risks

Topic Overview

Anzeige

1. Do not leave Wi-Fi permanently enabled

1. Do not leave Wi-Fi permanently enabled

By default, devices such as smartphones or tablets are set up so that the WLAN module is permanently activated in order to be able to immediately use your own WLAN at home without switching. As soon as you are on the move, the device constantly starts to search for available Wi-Fi networks in the area and log in there.

Since the access to WLAN hotspots for the users is to be kept as simple as possible by the operators, these are often accessible without a password. If you are now in the area of a public hotspot, then your device logs in (depending on the individual configuration) in this network without you have previously confirmed this active.

However, since you are not usually alone in such a network, and also have no control over the security settings (which usually do not exist), you may open the door to people with criminal intentions.

Advertisement

Therefore, it is recommended to turn off the WLAN module in the smartphone when leaving the home network, and only to activate as needed. Some devices also offer the option to disable the WLAN module automatically as soon as the home network is left, and reactivated as soon as it is available again.

With this measure, you even kill two birds with one stone. Because in addition to the security aspect, the permanent WLAN network search of the device also costs valuable battery power, which, despite power-saving operating systems and built-in hardware, hardly lasts more than a day.

By default, devices such as smartphones or tablets are set up so that the WLAN module is permanently activated in order to be able to immediately use your own WLAN at home without switching. As soon as you are on the move, the device constantly starts to search for available Wi-Fi networks in the area and log in there.

Since the access to WLAN hotspots for the users is to be kept as simple as possible by the operators, these are often accessible without a password. If you are now in the area of a public hotspot, then your device logs in (depending on the individual configuration) in this network without you have previously confirmed this active.

However, since you are not usually alone in such a network, and also have no control over the security settings (which usually do not exist), you may open the door to people with criminal intentions.

Advertisement

Therefore, it is recommended to turn off the WLAN module in the smartphone when leaving the home network, and only to activate as needed. Some devices also offer the option to disable the WLAN module automatically as soon as the home network is left, and reactivated as soon as it is available again.

With this measure, you even kill two birds with one stone. Because in addition to the security aspect, the permanent WLAN network search of the device also costs valuable battery power, which, despite power-saving operating systems and built-in hardware, hardly lasts more than a day.

2. Use VPN for WLAN Hotspot

2. Use VPN for WLAN Hotspot

Of course, even after you have bypassed the risk of automatic and uncontrolled login to a Wi-Fi hotspot, the danger is not banned.

Let’s say you are sitting in a café with free Wi-Fi hotspot, and ask the operator or even the operator for the security standards of the network before use.

Presumably, you will be first big silence paired with an even larger question mark over the head and reap incomprehensible views.

In short, it is very common that just because the Störerhaftung for operators of WLAN hotspots was defused – to strengthen the offer of these free Internet access – they do not care about security, and also do not have the appropriate know-how.

So it’s up to you to be in a network with an unknown number of attendees and their usage patterns, and maybe even do banking or online shopping there, diligently entering your passwords. Nobody can guarantee you that the one or the other 2 tables continue to surf with the laptop now just in the net, or trying to gain access to the devices in the network.

One solution for this are the so-called VPN providers who provide a kind of tunneling solution especially for anonymous Internet access. The offer is now quite large, and offers a high level of security but it is usually not free. But you get a free trial account almost everywhere to test whether the offer is right for you.

Providers who offer completely free VPN (Virtual Private Network), and at the same time the high standards of security, there is not really, and therefore do not represent an adequate alternative. Because no one can permanently offer such a service for free and maintain their own performance.

Learn more about VPN here >>>

cshow
Ads
Nord VPN

Of course, even after you have bypassed the risk of automatic and uncontrolled login to a Wi-Fi hotspot, the danger is not banned.

Let’s say you are sitting in a café with free Wi-Fi hotspot, and ask the operator or even the operator for the security standards of the network before use.

Presumably, you will be first big silence paired with an even larger question mark over the head and reap incomprehensible views.

In short, it is very common that just because the Störerhaftung for operators of WLAN hotspots was defused – to strengthen the offer of these free Internet access – they do not care about security, and also do not have the appropriate know-how.

So it’s up to you to be in a network with an unknown number of attendees and their usage patterns, and maybe even do banking or online shopping there, diligently entering your passwords. Nobody can guarantee you that the one or the other 2 tables continue to surf with the laptop now just in the net, or trying to gain access to the devices in the network.

One solution for this are the so-called VPN providers who provide a kind of tunneling solution especially for anonymous Internet access. The offer is now quite large, and offers a high level of security but it is usually not free. But you get a free trial account almost everywhere to test whether the offer is right for you.

Providers who offer completely free VPN (Virtual Private Network), and at the same time the high standards of security, there is not really, and therefore do not represent an adequate alternative. Because no one can permanently offer such a service for free and maintain their own performance.

Learn more about VPN here >>>

cshow
Ads
Nord VPN

3. Use adequate antivirus protection

3. Use adequate antivirus protection

Of course, since a smartphone offers far more possibilities than even the simple mobile phones of the past, this also includes the possibility that viruses and Trojans spread out on the device, causing unnoticed unimaginable damage there.

It is therefore a duty to ensure adequate antivirus protection. Namely, not only the almost unlimited number of available apps pose a security risk, but also many other access routes that can come over networks on the device.

cshow
Ads

The manufacturers of anti-virus programs have meanwhile all corresponding offers as complete packages for several terminals in the program, so that in any case one will find it here. One should refrain from pure free antivirus programs, as they often do not offer the recognition rate of paid offers in tests.

Security has its price. And there you should not actually save at the wrong end, especially since complete packages for multiple devices only mean little or no extra charge.

Blogverzeichnis Bloggerei.de

Of course, since a smartphone offers far more possibilities than even the simple mobile phones of the past, this also includes the possibility that viruses and Trojans spread out on the device, causing unnoticed unimaginable damage there.

It is therefore a duty to ensure adequate antivirus protection. Namely, not only the almost unlimited number of available apps pose a security risk, but also many other access routes that can come over networks on the device.

cshow
Ads

The manufacturers of anti-virus programs have meanwhile all corresponding offers as complete packages for several terminals in the program, so that in any case one will find it here. One should refrain from pure free antivirus programs, as they often do not offer the recognition rate of paid offers in tests.

Security has its price. And there you should not actually save at the wrong end, especially since complete packages for multiple devices only mean little or no extra charge.

Blogverzeichnis Bloggerei.de

Search for other topics:

About the Author:

Michael W. Suhr
Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.

Search by category:

Search for other topics:

About the Author:

Michael W. Suhr
Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.

Search by category:

Popular Posts:

2306, 2023

With the webcam to your dream job: Preparation for the video job interview!

June 23rd, 2023|Categories: Career, Hardware, Homeoffice, Shorts & Tutorials|Tags: , , |

Streamline your video interview with our tips on technique, setting, dress, body language and preparation. It's not quite success from the sofa, but this is where you can prove your professionalism.

1805, 2023

IT security: The deceptive appearance of digital security

May 18th, 2023|Categories: Data Protection, Hardware, Homeoffice, Software|Tags: , |

In a digitized world, IT security is an important factor. But technology alone is not enough. A holistic strategy is needed that also takes into account the human component.

2104, 2023

Create Excel Budget Book – with Statistics – Tutorial

April 21st, 2023|Categories: Internet, Finance & Shopping, Microsoft Excel, Microsoft Office, Office 365, Shorts & Tutorials|Tags: , , , |

Create your own Excel budget book with a graphical dashboard, statistics, trends and data cut-off. A lot is possible with pivot tables and pivot charts.

1504, 2023

Excel Database with Input Form and Search Function

April 15th, 2023|Categories: Microsoft Excel, Microsoft Office, Office 365, Shorts & Tutorials|Tags: , |

So erstellen Sie eine Datenbank mit Eingabemaske und Suchfunktion OHNE VBA KENNTNISSE in Excel ganz einfach. Durch eine gut versteckte Funktion in Excel geht es recht einfach.

Spring Specials 2024: Word & Excel Templates

Special Offers 2023: Word Design CV-Templates

Monthly Technique Bestsellers:

Bestseller 2022-2023 WLAN-Heizkoerperthermostate

SmartHome | Energy & Security

SmartHome | Energy & Security

Bestseller 2022-2023 WLAN-Heizkoerperthermostate
Bestseller 2022-2023 Notebooks

PC & Accessoires

PC & Accessoires

Bestseller 2022-2023 Notebooks
Bestseller 2022-2023 Smartphones

Smartphone & Accessoires

Smartphone & Accessoires

Bestseller 2022-2023 Smartphones

Popular Posts:

2306, 2023

With the webcam to your dream job: Preparation for the video job interview!

June 23rd, 2023|Categories: Career, Hardware, Homeoffice, Shorts & Tutorials|Tags: , , |

Streamline your video interview with our tips on technique, setting, dress, body language and preparation. It's not quite success from the sofa, but this is where you can prove your professionalism.

1805, 2023

IT security: The deceptive appearance of digital security

May 18th, 2023|Categories: Data Protection, Hardware, Homeoffice, Software|Tags: , |

In a digitized world, IT security is an important factor. But technology alone is not enough. A holistic strategy is needed that also takes into account the human component.

2104, 2023

Create Excel Budget Book – with Statistics – Tutorial

April 21st, 2023|Categories: Internet, Finance & Shopping, Microsoft Excel, Microsoft Office, Office 365, Shorts & Tutorials|Tags: , , , |

Create your own Excel budget book with a graphical dashboard, statistics, trends and data cut-off. A lot is possible with pivot tables and pivot charts.

1504, 2023

Excel Database with Input Form and Search Function

April 15th, 2023|Categories: Microsoft Excel, Microsoft Office, Office 365, Shorts & Tutorials|Tags: , |

So erstellen Sie eine Datenbank mit Eingabemaske und Suchfunktion OHNE VBA KENNTNISSE in Excel ganz einfach. Durch eine gut versteckte Funktion in Excel geht es recht einfach.

Spring Specials 2024: Word & Excel Templates

Special Offers 2023: Word Design CV-Templates

Monthly Technique Bestsellers:

Bestseller 2022-2023 WLAN-Heizkoerperthermostate

SmartHome | Energy & Security

SmartHome | Energy & Security

Bestseller 2022-2023 WLAN-Heizkoerperthermostate
Bestseller 2022-2023 Notebooks

PC & Accessoires

PC & Accessoires

Bestseller 2022-2023 Notebooks
Bestseller 2022-2023 Smartphones

Smartphone & Accessoires

Smartphone & Accessoires

Bestseller 2022-2023 Smartphones

Title

Ads

Popular Posts:

Search by category:

Autumn Specials:

Anzeige
Go to Top