Skip to main content
HomeThe WWS Daily

- News, tips, inspiration you can trust to thrive in today’s digital age.

Search form

Main menu

  • Home
  • News & Features
  • Business & Economy
  • Tech & Trends
  • Health & Style
  • Arts & Culture
  • Contact Us

3 Easy Ways to Protect Your Privacy and Data When Using Public Wi-Fi

George Mathews September 23, 2016

Who doesn't love to hop on to the "Free Wi-Fi" at a favorite coffee shop to browse the internet, finish some work, check our social networks and maybe take a quick peek at our bank balance while enjoying our latte?

People have become so accustomed to having internet access that we don't hesitate to connect our devices to the free Wi-Fi hotspot around us like at hotels, airports, co-working spaces and shopping malls.The first thing we do when we wander into a shopping mall, hotel lobby or the airport is to flip our Wi-Fi on and try to find a free hotspot rather than using our own data plan. Some of us even go out searching for free Wi-Fi access points when traveling abroad, which can leave private information like passport details and credit card numbers visible to strangers at the hotspots.

While most WiFi hotspots have security set, some don’t. And using a network without security is a risk you'd be better not taking. If you don’t protect your privacy, somebody could pray on you or your clients’ information and easily pick up your passwords and data to use for cyber crimes. If, in particular, you use the same password on multiple sites, that could lead to an even bigger problem. This is why you need to take precautions to protect your privacy when using public hotspots.

 

Protect Your Privacy When Using Public Hotspot.

 

To protect your privacy when using a public network, use these three basic steps that will keep your data away from prying eyes:

 

1. Select networks that use secured encryption.

 

Select a public network that uses some form of encryption. You can tell which networks are secured in Windows 7 by left-clicking on the wireless network connections icon. Hovering the mouse over each SSID will display the security type. Avoid those networks with the security type, "Unsecured." In Windows 10, click or tap on the network icon from the system tray and connect to secured network SSIDs that are displayed with the words "Secured." Turn off automatic Wi-Fi connections so that you can check and choose the safest network within range each time before your device connects to it.

 

window10-connect_wireless.jpg

Windows 10 Secured connection.

You may find some establishments like hotels secure their networks using different technologies. In order of preference, choose networks secured with WPA2 encryption, then WPA. WEP is a better-than-nothing last resort.

 

2. Set Network Location to "Public."

 

When you connect to a network for the first time in Windows 10, the network location is automatically set to “Public.” Earlier versions of Windows operating systems like Windows 7 provided the option to set a new network connection to be either “Public” or “Private.” In Windows 7, soon after you connect to a new network, the "Set Network Location" window pops-up automatically. Set the location to "Public Network" when prompted. This is the safest option if you are connecting to a public hotspot as it will keep your computer invisible on the network.

The “Public” Network location blocks file and printer sharing, which are common routes for data snoopers. “Home Group” is not available with this option selected, and network discovery is turned off, too. All of these measures make your data less visible on a wireless network. If, however, you are connecting to a private network such as your home network you might want to share music, pictures, videos, or even printers with other devices on that network. In such situations, you can change the network location to “Private” to make your computer discoverable to other computers.

 

3. Use a VPN service.

 

A virtual private network (VPN) is a cloud-based service that takes all your outgoing and incoming traffic and runs it through an SSH tunnel, which means between you and the VPN provider everything is encrypted — even any possible HTTP communication. Once your VPN provider is reached, requests continue the usual way (maybe via HTTP or HTTPS). But the important thing is that nobody at the public WIFI can listen to your traffic.

 

android-vpn.jpg

Android VPN settings.

Your VPN provider stands at the end of the tunnel and potentially could record all of your communication so you need to trust the provider before you use them. Exercise due diligence and read and research providers carefully to pick one you can trust. Read blogs of vendors, go to security forums. Look for cases where vendors stand up for user privacy. If your provider is only known for letting you change outgoing server just to appear to be from another country, that provider is probably not a good option for you.

A vendor you can try is SecurityKISS that offers ad-free VPN access with data limited to 300MB/day. That's plenty of scope for checking email, looking at maps and other casual Wi-Fi uses. Another VPN you can try is Freedome by F-Secure. With a secured network and a working VPN setup, you are already in a great spot.

See Also: The Different Types of People You See at Coffee Shops (Infographic).

 


George Mathews is a staff writer for WebWriterSpotlight.com. He is passionate about personal growth and development.


Image Credit:  Flickr_elmada

 

SUBSCRIBE TO OUR NEWSLETTER  newsletter icon.png

Get our best content, news, tips, and inspiration in your inbox - free.

No spam. Just great stories. Promise!
 

 

Join Over 20,000 Subscribers!

Get our best content, tips, and inspiration free in your inbox. Subscribe ››

Connect with us:  twitter.gif linkedin-gray.jpg email.gif RSS feed

 

 

 

 

 

Most read this week


Camping Ideas to Make Your Summer Vacations More Exciting and Fun
Taylor Starc

4 Daily Habits You Should Practice to Create an Epic Life
Alycia Gordan

female-sitted-laptop-on-table-contemplationg-setting-goals
Powerful Alternative Goal-Setting Strategies You Should Know
Amanda Pell

Let's Talk About Success in Today’s Often Mediocre World
Let's Talk About Success in Today’s Often Mediocre World
Staff Editor

 

Got a story or tip for us?

 

Tips_0_0_0.png

Here's how to submit it →

 

 

 

 
 

EXPLORE MORE ...

black-nav-bar1.png

News & Features  ›


Why the Internet Is the Best Source of News

Why the Internet Is the Best Source of News

Hawaii Small Businesses Most Affected in the US by Coronavirus, Study Finds

Hawaii Small Businesses Most Affected in the US by Coronavirus, Study Finds

Disney Announces Video Streaming App to Rival YouTube


Understand and Plan Your Digital Afterlife

The Most Annoying Video Call Habits at Work - Are You Guilty?

The Digital Playground: Creating Safe and Engaging Online Spaces for Kids

hor-line-blue

Tech & Trends  ›


A Step-by-Step Approach to Building an Enterprise Data Warehouse

Featured Image – The Far-Reaching Impact of Tech & Digital Transformations in Business

The Far-Reaching Impact of Tech & Digital Transformations in Business

Robot Hand AI in Web Development

The Role of Artificial Intelligence in Web App Development


Should You Have a Dedicated Outsourced Development Team?

Tech Troubles? 4 Business Strategies To Avoid Tech Disasters

Understanding the Limitations of Antivirus Software
 

hor_line_yellow

Arts & Culture  ›


zodiac signs illustration night sky background

The Most Incompatible Celeb Couples, According to An Astrologer

church-building-architecture-religious-sector-adapting-pandemic

How Religious Organizations Adapted to the Pandemic

Books in Library Shelf Image for Six Trending Book Cover Design Ideas & Principles in 2021

Best Book Cover Design Trends, Ideas, & Principles You Can Use


What Your Handwriting Says About You

12 Reasons Reading Widely Is So Important for Writers

How Reading More Inspires Better Writing

hor-line-brown

Business & Economy  ›


How to Reinvent Your Business to Achieve Growth During a Slump

How to Reinvent Your Business to Achieve Growth During a Slump

5 Ways to Develop Your Leadership Capacity and Skills

5 Ways to Develop Your Leadership Capacity and Skills

US States With Longest Work Commutes: How to Use Your Commute Effectively

US States With Longest Work Commutes: How to Use Your Commute Effectively


10 Lame Excuses You Probably Use to Procrastinate

10 Ways Resourceful People Build Resilience & Turn Failure to Success

How to Buy a House or Property With Bad Credit

hor-line-green

Health & Style  ›


5 Best Herbal Teas to Calm Your Mind and Relieve Stress

7 Benefits and Side Effects of the Keto Diet

woman-bored-outside-sited-mindfulness-meditation

Bored of Mindfulness Meditation? Mindlessness Is Good for You Too

hori-3.jpg

Why It's Okay to Daydream As a Creative Person

hori-3.jpg

Can Mindfulness Help to Stop Substance Abuse and Addiction?

hori-3.jpg

Asbestos Hazard: Your Responsibilities As a Property Owner
 

Home | About Us | Contributors | Submissions | Advertise | Disclosure | Privacy Policy | Contact Us

Follow Us:

twitter_e.jpg linkedin-pg.jpg email-updates_icon.jpg

Committed to quality content and journalistic ethics.

RSS rss

Search WWS search-icon-trans_0_1.png

© 2025 The WWS Daily.