Office, Karriere und IT Blog

Office, Karriere und IT Blog

   
Anzeige

How to avoid the risks in Wi-Fi hotspots

The number of WLAN hotspots is growing at least since the abolition of the so-called “Störerhaftung” (German term) which takes the operator of the WLAN network out of liability.

However, each medal always has two sides, and so the risks should not be ignored in addition to the benefits of higher data throughput and protection of their own high-speed data volume through free Wi-Fi networks. For smartphones and tablets that are primarily logged into hotspots are sometimes more personal information than on the home PC.

In addition to contact information, pictures, documents and passwords, motion profiles can also be stored there, which make the user completely transparent. In our article we would like to point out the most important points from our point of view which can provide more security in WLAN hotspots.

WLAN Hotspot Risks

Topic Overview

Anzeige

How to avoid the risks in Wi-Fi hotspots

The number of WLAN hotspots is growing at least since the abolition of the so-called “Störerhaftung” (German term) which takes the operator of the WLAN network out of liability.

However, each medal always has two sides, and so the risks should not be ignored in addition to the benefits of higher data throughput and protection of their own high-speed data volume through free Wi-Fi networks. For smartphones and tablets that are primarily logged into hotspots are sometimes more personal information than on the home PC.

In addition to contact information, pictures, documents and passwords, motion profiles can also be stored there, which make the user completely transparent. In our article we would like to point out the most important points from our point of view which can provide more security in WLAN hotspots.

WLAN Hotspot Risks

Topic Overview

Anzeige

1. Do not leave Wi-Fi permanently enabled

1. Do not leave Wi-Fi permanently enabled

By default, devices such as smartphones or tablets are set up so that the WLAN module is permanently activated in order to be able to immediately use your own WLAN at home without switching. As soon as you are on the move, the device constantly starts to search for available Wi-Fi networks in the area and log in there.

Since the access to WLAN hotspots for the users is to be kept as simple as possible by the operators, these are often accessible without a password. If you are now in the area of a public hotspot, then your device logs in (depending on the individual configuration) in this network without you have previously confirmed this active.

However, since you are not usually alone in such a network, and also have no control over the security settings (which usually do not exist), you may open the door to people with criminal intentions.

Advertisement

Therefore, it is recommended to turn off the WLAN module in the smartphone when leaving the home network, and only to activate as needed. Some devices also offer the option to disable the WLAN module automatically as soon as the home network is left, and reactivated as soon as it is available again.

With this measure, you even kill two birds with one stone. Because in addition to the security aspect, the permanent WLAN network search of the device also costs valuable battery power, which, despite power-saving operating systems and built-in hardware, hardly lasts more than a day.

By default, devices such as smartphones or tablets are set up so that the WLAN module is permanently activated in order to be able to immediately use your own WLAN at home without switching. As soon as you are on the move, the device constantly starts to search for available Wi-Fi networks in the area and log in there.

Since the access to WLAN hotspots for the users is to be kept as simple as possible by the operators, these are often accessible without a password. If you are now in the area of a public hotspot, then your device logs in (depending on the individual configuration) in this network without you have previously confirmed this active.

However, since you are not usually alone in such a network, and also have no control over the security settings (which usually do not exist), you may open the door to people with criminal intentions.

Advertisement

Therefore, it is recommended to turn off the WLAN module in the smartphone when leaving the home network, and only to activate as needed. Some devices also offer the option to disable the WLAN module automatically as soon as the home network is left, and reactivated as soon as it is available again.

With this measure, you even kill two birds with one stone. Because in addition to the security aspect, the permanent WLAN network search of the device also costs valuable battery power, which, despite power-saving operating systems and built-in hardware, hardly lasts more than a day.

2. Use VPN for WLAN Hotspot

2. Use VPN for WLAN Hotspot

Of course, even after you have bypassed the risk of automatic and uncontrolled login to a Wi-Fi hotspot, the danger is not banned.

Let’s say you are sitting in a café with free Wi-Fi hotspot, and ask the operator or even the operator for the security standards of the network before use.

Presumably, you will be first big silence paired with an even larger question mark over the head and reap incomprehensible views.

In short, it is very common that just because the Störerhaftung for operators of WLAN hotspots was defused – to strengthen the offer of these free Internet access – they do not care about security, and also do not have the appropriate know-how.

So it’s up to you to be in a network with an unknown number of attendees and their usage patterns, and maybe even do banking or online shopping there, diligently entering your passwords. Nobody can guarantee you that the one or the other 2 tables continue to surf with the laptop now just in the net, or trying to gain access to the devices in the network.

One solution for this are the so-called VPN providers who provide a kind of tunneling solution especially for anonymous Internet access. The offer is now quite large, and offers a high level of security but it is usually not free. But you get a free trial account almost everywhere to test whether the offer is right for you.

Providers who offer completely free VPN (Virtual Private Network), and at the same time the high standards of security, there is not really, and therefore do not represent an adequate alternative. Because no one can permanently offer such a service for free and maintain their own performance.

Learn more about VPN here >>>

Ads
Nord VPN

Of course, even after you have bypassed the risk of automatic and uncontrolled login to a Wi-Fi hotspot, the danger is not banned.

Let’s say you are sitting in a café with free Wi-Fi hotspot, and ask the operator or even the operator for the security standards of the network before use.

Presumably, you will be first big silence paired with an even larger question mark over the head and reap incomprehensible views.

In short, it is very common that just because the Störerhaftung for operators of WLAN hotspots was defused – to strengthen the offer of these free Internet access – they do not care about security, and also do not have the appropriate know-how.

So it’s up to you to be in a network with an unknown number of attendees and their usage patterns, and maybe even do banking or online shopping there, diligently entering your passwords. Nobody can guarantee you that the one or the other 2 tables continue to surf with the laptop now just in the net, or trying to gain access to the devices in the network.

One solution for this are the so-called VPN providers who provide a kind of tunneling solution especially for anonymous Internet access. The offer is now quite large, and offers a high level of security but it is usually not free. But you get a free trial account almost everywhere to test whether the offer is right for you.

Providers who offer completely free VPN (Virtual Private Network), and at the same time the high standards of security, there is not really, and therefore do not represent an adequate alternative. Because no one can permanently offer such a service for free and maintain their own performance.

Learn more about VPN here >>>

Ads
Nord VPN

3. Use adequate antivirus protection

3. Use adequate antivirus protection

Of course, since a smartphone offers far more possibilities than even the simple mobile phones of the past, this also includes the possibility that viruses and Trojans spread out on the device, causing unnoticed unimaginable damage there.

It is therefore a duty to ensure adequate antivirus protection. Namely, not only the almost unlimited number of available apps pose a security risk, but also many other access routes that can come over networks on the device.

Ads

The manufacturers of anti-virus programs have meanwhile all corresponding offers as complete packages for several terminals in the program, so that in any case one will find it here. One should refrain from pure free antivirus programs, as they often do not offer the recognition rate of paid offers in tests.

Security has its price. And there you should not actually save at the wrong end, especially since complete packages for multiple devices only mean little or no extra charge.

Blogverzeichnis Bloggerei.de

Of course, since a smartphone offers far more possibilities than even the simple mobile phones of the past, this also includes the possibility that viruses and Trojans spread out on the device, causing unnoticed unimaginable damage there.

It is therefore a duty to ensure adequate antivirus protection. Namely, not only the almost unlimited number of available apps pose a security risk, but also many other access routes that can come over networks on the device.

Ads

The manufacturers of anti-virus programs have meanwhile all corresponding offers as complete packages for several terminals in the program, so that in any case one will find it here. One should refrain from pure free antivirus programs, as they often do not offer the recognition rate of paid offers in tests.

Security has its price. And there you should not actually save at the wrong end, especially since complete packages for multiple devices only mean little or no extra charge.

Blogverzeichnis Bloggerei.de

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.

Search by category:

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.

Search by category:

Popular Posts:

2110, 2025

Windows 12: Where is it? The current status in October 2025

October 21st, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Windows 10/11/12|Tags: , , |

Everyone was waiting for Windows 12 in October 2025, but it didn't arrive. Instead, Microsoft is focusing on Windows 11 25H2 and "Copilot+ PC" features. We'll explain: Is Windows 12 canceled, postponed, or is it already available as an AI update for Windows 11?

2010, 2025

Blocking websites on Windows using the hosts file

October 20th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Windows 10/11/12|Tags: , , , |

Want to block unwanted websites in Windows? You can do it without extra software using the hosts file. We'll show you how to edit the file as an administrator and redirect domains like example.de to 127.0.0.1. This will block them immediately in all browsers.

2010, 2025

The “Zero Inbox” method with Outlook: How to permanently get your mailbox under control.

October 20th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice, Microsoft Office, Microsoft Outlook, Office 365, Windows 10/11/12|Tags: , , , |

Caught red-handed? Your Outlook inbox has 1000+ emails? That's pure stress. Stop the email deluge with the "Zero Inbox" method. We'll show you how to clean up your inbox and regain control using Quick Steps and rules.

2010, 2025

5 simple security rules against phishing and spam that everyone should know

October 20th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice, Internet, Finance & Shopping, Microsoft Office, Office 365, Software, Windows 10/11/12|Tags: , , , |

Deceptively authentic emails from your bank, DHL, or PayPal? That's phishing! Data theft and viruses are a daily threat. We'll show you 5 simple rules (2FA, password managers, etc.) to protect yourself immediately and effectively and help you spot scammers.

1810, 2025

The 5 best tips for a clean folder structure on your PC and in the cloud

October 18th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Windows 10/11/12|Tags: , |

Say goodbye to file chaos! "Offer_final_v2.docx" is a thing of the past. Learn 5 simple tips for a perfect folder structure on your PC and in the cloud (OneDrive). With proper file naming and archive rules, you'll find everything instantly.

1710, 2025

Never do the same thing again: How to record a macro in Excel

October 17th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Excel, Microsoft Office, Office 365|Tags: , , |

Tired of repetitive tasks in Excel? Learn how to create your first personal "magic button" with the macro recorder. Automate formatting and save hours – no programming required! Click here for easy instructions.

Offers 2024: Word & Excel Templates

Popular Posts:

2110, 2025

Windows 12: Where is it? The current status in October 2025

October 21st, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Windows 10/11/12|Tags: , , |

Everyone was waiting for Windows 12 in October 2025, but it didn't arrive. Instead, Microsoft is focusing on Windows 11 25H2 and "Copilot+ PC" features. We'll explain: Is Windows 12 canceled, postponed, or is it already available as an AI update for Windows 11?

2010, 2025

Blocking websites on Windows using the hosts file

October 20th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Windows 10/11/12|Tags: , , , |

Want to block unwanted websites in Windows? You can do it without extra software using the hosts file. We'll show you how to edit the file as an administrator and redirect domains like example.de to 127.0.0.1. This will block them immediately in all browsers.

2010, 2025

The “Zero Inbox” method with Outlook: How to permanently get your mailbox under control.

October 20th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice, Microsoft Office, Microsoft Outlook, Office 365, Windows 10/11/12|Tags: , , , |

Caught red-handed? Your Outlook inbox has 1000+ emails? That's pure stress. Stop the email deluge with the "Zero Inbox" method. We'll show you how to clean up your inbox and regain control using Quick Steps and rules.

2010, 2025

5 simple security rules against phishing and spam that everyone should know

October 20th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice, Internet, Finance & Shopping, Microsoft Office, Office 365, Software, Windows 10/11/12|Tags: , , , |

Deceptively authentic emails from your bank, DHL, or PayPal? That's phishing! Data theft and viruses are a daily threat. We'll show you 5 simple rules (2FA, password managers, etc.) to protect yourself immediately and effectively and help you spot scammers.

1810, 2025

The 5 best tips for a clean folder structure on your PC and in the cloud

October 18th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Windows 10/11/12|Tags: , |

Say goodbye to file chaos! "Offer_final_v2.docx" is a thing of the past. Learn 5 simple tips for a perfect folder structure on your PC and in the cloud (OneDrive). With proper file naming and archive rules, you'll find everything instantly.

1710, 2025

Never do the same thing again: How to record a macro in Excel

October 17th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Excel, Microsoft Office, Office 365|Tags: , , |

Tired of repetitive tasks in Excel? Learn how to create your first personal "magic button" with the macro recorder. Automate formatting and save hours – no programming required! Click here for easy instructions.

Offers 2024: Word & Excel Templates

Ads

Popular Posts:

Search by category:

Autumn Specials:

Anzeige
Go to Top