5 steps to protect your data transmissions

 5 steps to protect your data transmissions Connecting to public wireless (Wi-Fi) hotspots has become routine for many of us – you ca...

 5 steps to protect your data transmissions

Connecting to public wireless (Wi-Fi) hotspots has become routine for many of us – you can find public wireless networks almost everywhere – in fast food chains, libraries, parks and urban hotspots, as well as in your home. They have liberated us from our desks and made it possible to work on the go – and they’re often free. But do they guarantee your safety?

The advantages are obvious

The use of Wi-Fi hotspots for wireless internet access is set to reach a total of 120 billion connections in 2015, due to growing support from major broadband internet service providers (ISPs).[1] Wi-Fi hotspots have become a service which is used by businesses as a competitive differentiator to attract customers to other product offerings, layered on top of core offerings. Notebook PCs account for most connections, but the rate of smartphone and tablet access is increasing rapidly.

But beware: “public hotspots” have been called that for a reason. They are open networks and therefore vulnerable to security breaches. They cannot guarantee your safety. When you connect to an unsecured Wi-Fi network, anyone on the same network potentially has access to your computer and to all your internet activities. They can snoop around in your emails and see what you’ve been doing on the internet, without needing your password. This applies to all hotspots – even to those that require pay-per-hour or monthly subscription fees. These are almost always unencrypted, so all your emails, passwords, security codes and other information can be visible to hackers lurking on the same network.

So it’s up to you to keep your data safe from prying eyes. These 5 tips will help:

5 ways to keep your data secure

1. Use encryption and https
If you have to send personal information when you’re on public Wi-Fi, then only send it to websites which are fully encrypted. You’ll know which these are by looking at the beginning of the resource locator (URL): if it has https at the beginning, it’s encrypted (the “s” stands for “secure”).

You should also protect your own files, or at least those which you’re intending to use on public Wi-Fi, by encrypting them, so they will need a password to open and modify them.

Protect your emails messages in public by selecting https or another secure connections option in your account settings. Most systems use https when you log in with your password, but some systems, for example some local software, switch back to plain http after authentication because they can more easily transmit advertising. In this case, motivated hackers on the same network potentially have access to your computer and can view the unencrypted internet traffic that you send. So make sure you know what system you’re using, and select the https or other secure connection option in your email account settings if your email provider supplies one.

2. Install a firewall
A firewall protects networks against all file-sharing, and protects your PC by acting as a barrier against all incoming information, blocking anything which is considered a potential threat. Normally, at home your firewall is down, because your home computers need to share your Wi-Fi connection and your files. But when you’re in public, on an open network, you must ensure you put up a firewall, to guard against potential hackers. All Windows operating systems come with a firewall already installed, so you just have to check it’s turned on.

3. Get VPN
For added safety, you should consider using a virtual private network (VPN) that puts encryption between your device and the internet, even when you’re using unsecured networks. You’ll have to pay for VPN service, but it’s worth it if you frequently use Wi-Fi. If your business doesn’t have its own VPN, you can download and install the software free.[2]

4. Turn Wi-Fi off
When you’re not working on it, turn off your Wi-Fi capability, in case your notebook connects to a potentially dangerous hotspot without your realising it. If your notebook doesn’t have a Wi-Fi hardware button to disable the Wi-Fi adapter, you can disable it using your operating system.

5. Use your common sense
  • Avoid transactions that require a lot of personal information, for example shopping and banking
  • Avoid giving credit card, insurance or social security numbers
  • Create different usernames and passwords for different accounts so if one is hacked the others stay safe
  • Cookies remember usernames and passwords, making data breaches easier. So before you connect to a public Wi-Fi hotspot, delete your browsing history and your cookies
  • Log out of websites when you’ve finished with them
  • Configure your PC to let you approve access points before you connect
  • Disable your file and printer sharing when you’re out of the office

If you follow these simple steps, you can help ensure that using Wi-Fi stays the huge benefit it’s intended to be, making you more mobile, more independent and more efficient. And if you don’t? Let’s just say: “better safe than sorry”.



Acronyms,1,Ads Ready,1,Adsense,1,Adserver,1,airtel,2,android,22,Apps,4,Auto Loader,19,backup,1,Bank,1,BB10,1,better,1,bios,1,blackberry,24,Blogger,11,blogger jquery,12,Blogger Template,3,blogger tips,12,Blogger Widget/Gadget,13,Bluetooth,1,BOIS Update,1,browser,2,Bug,1,business,3,CAD,1,capability,1,Career Development,2,Celebrate,1,chat,1,cloud computing,1,code,1,comment,2,computer,13,crack,17,crash,1,css,3,cure,1,CV,18,data,2,delete,1,Diamond Bank,2,download,32,email,6,ESPN,1,etisalat,2,Facebook,2,Feedburner,1,Firmware,3,Flash File,27,Flash Games,3,Flashing,3,For Seniors,2,free-up space,1,Freebies and Giveaways,2,FTP,1,Galaxy,2,games,5,glo,2,good,1,Google,8,Google Affiliate,1,Google Drive,1,Google Photos,1,Google Play Store,3,Google+.,1,great,1,GTA,4,guide,3,hacks,7,handle,1,Hard drive,2,HDD,1,how to,10,HTC,2,html,1,Huawei,1,ict,4,India,1,INEC,1,Infinity Best,1,Innovation,1,Intel,1,internet,6,internet explorer,1,iOS,2,ipad,4,iphone,7,Itel,1,java script,6,Jetpack,1,keyboard,8,know,3,Label,3,Laptop,1,Learning,12,LG,2,Lollipop,2,Mac,2,Management,1,Marriage,1,Mediafire,1,meeting,1,message,12,Microsoft,5,Microsoft excel,2,mobile,7,Mobile Phones Specifications,1,mobility,2,money,1,Motorola,1,Movie,1,Mozilla Firerfox,1,MS Word,1,MTK,2,mtn,4,music,1,need,1,Networking,1,NOBLE NOKIA INFO,9,Nokia,4,notebook,1,passwords,1,PayDirect,1,PayPal,1,PC,7,PC Games,45,PC mgazine,6,PC Tricks,3,pc-crash,1,PDF,1,Personal Productivity,4,Phone,3,photo shop,1,Play Station,9,Plugin,1,post,2,Premium Blogger Template,1,protect,3,ProtectTool,1,Racing Game,2,reasons,1,Responsive,1,Root,2,sagem,1,samsung,11,save,1,secrets,1,secure,4,security,9,security Enhancements,5,Server,1,shell-coding,1,shortcut,21,Simple Server,1,SmartsmsSolutions,2,SMS,6,social community,3,Sony,2,Spreadtrum,1,SSD,1,steps,1,Stock Rom,2,Symbian,1,Sync,2,Tablet PC,3,Talent,1,TECH_WORLD,2,Techniques,3,technology,3,technology tips,26,Tecno,7,template hacks,1,Theme,1,tips,19,transmissions,1,Tutorial,3,tutorials,28,types,1,USB Driver,1,users,1,Video,1,Virus,1,Visa Card,1,Volcano Box,8,Vote,1,WAP WORLD,8,Whatsapp,1,windows,11,Windows 10,2,Windows 7,1,Windows 8,1,windows mobile,1,Windows Phone,2,Windows Phone Store,2,windows xp,5,word of life,11,Wordpress,3,work place skills,7,WPTouch Mobile Plugin,1,Xbox,2,zain,1,Zenith Bank,1,
NOBLE ICT EXPLOITS ZONE™: 5 steps to protect your data transmissions
5 steps to protect your data transmissions
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy