fbpx Skip to content

Secret Threats of Public WiFi

No matter where you travel to these days, you’re destined to never be left without a means of contact, with the help of public wi-fi hotspots. Free access internet is now available at nearly every shopping centre, train station, airport, major tourist attraction and even on populated streets. The temptation, to save your monthly data allowance in exchange for simply handing over your email address and full name, seems harmless, right?

Unbeknownst to too many people, by connecting to these open networks you are letting hackers know you’re open for business. By accessing emails and online banking, you have inadvertently marked yourself as a target and made all your sensitive information, vulnerable. 

Here’s How

‘Man in the Middle’ attacks

This is when someone within range of the hotspot reach is essentially eavesdropping on your online activity. They are able to intercept the flow of information you’re sending between your device and the internet service.

Unencrypted networks

The information that flows from device to wireless router should be in the form of a secret code, meaning sensitive information cannot be read. Most routers are unencrypted until set up by IT professionals who know how to encrypt it, so anyone who uses this router is protected by this private network. Public and unencrypted networks deliberately set up by hackers don’t enable this safety feature so that they can survey your activity from afar.

Malicious hotspots

Cyber criminals will set up fake hotspots named similarly to reputable businesses. They will be branded and made to look legitimate, the same way in which, BT for example has their access pages displayed. These rogue hotspots then act as a direct portal for criminals to peer into your sensitive information and give them to platform to use it anyway they see fit. When doing so they can see which web pages you visited, any log in information you submitted and hack any accounts.

Tips for staying safe:

Do

  • Turn wifi off when you’re not using it
  • Log out of accounts when done
  • Disable Bluetooth and file sharing
  • Only use web search

Don’t

  • Allow auto-connect
  • Access apps with sensitive information such as online banking/health records
  • Fill in credentials like username/password
Tech Tips

5 Steps to Improve Your Ransomware Resilience

At any time, your business could be subject to a ransomware attack. The only way to avoid the devastation this type of attack can cause to companies is to be prepared. Keep reading as we share the five steps any business should take to improve their ransomware resilience this year.

Read More »
Tech Tips

Preparing to Go Back to Your Workplace

There are two things that we are unsure of regarding the lockdown. First, is when it will end, and second is what will be the new normal when it does. To be ready, here are three important factors to consider when you go back into your workplace.

Read More »
What is a managed IT service?
Tech Tips

What is a Managed IT Service

Two-thirds of businesses use managed outsourced IT services, but what are they and how do they work? Blog Sections What can a managed IT service do for your business? Managed

Read More »

IT Services Buyer's Guide
2024

standing-book-mockup (1)
Here's a free download of our informative guide that will help you make the best
IT decisions for your business.
Insights on business IT infrastructure
Guide on how to choose an IT partner

How Can We Help?