Skip to main content
HomeThe WWS Daily

- News, tips, inspiration you can trust to thrive in today’s digital age.

Search form

Main menu

  • Home
  • News & Features
  • Business & Economy
  • Tech & Trends
  • Health & Style
  • Arts & Culture
  • Contact Us

3 Easy Ways to Protect Your Privacy and Data When Using Public Wi-Fi

George Mathews September 23, 2016

Who doesn't love to hop on to the "Free Wi-Fi" at a favorite coffee shop to browse the internet, finish some work, check our social networks and maybe take a quick peek at our bank balance while enjoying our latte?

People have become so accustomed to having internet access that we don't hesitate to connect our devices to the free Wi-Fi hotspot around us like at hotels, airports, co-working spaces and shopping malls.The first thing we do when we wander into a shopping mall, hotel lobby or the airport is to flip our Wi-Fi on and try to find a free hotspot rather than using our own data plan. Some of us even go out searching for free Wi-Fi access points when traveling abroad, which can leave private information like passport details and credit card numbers visible to strangers at the hotspots.

While most WiFi hotspots have security set, some don’t. And using a network without security is a risk you'd be better not taking. If you don’t protect your privacy, somebody could pray on you or your clients’ information and easily pick up your passwords and data to use for cyber crimes. If, in particular, you use the same password on multiple sites, that could lead to an even bigger problem. This is why you need to take precautions to protect your privacy when using public hotspots.

 

Protect Your Privacy When Using Public Hotspot.

 

To protect your privacy when using a public network, use these three basic steps that will keep your data away from prying eyes:

 

1. Select networks that use secured encryption.

 

Select a public network that uses some form of encryption. You can tell which networks are secured in Windows 7 by left-clicking on the wireless network connections icon. Hovering the mouse over each SSID will display the security type. Avoid those networks with the security type, "Unsecured." In Windows 10, click or tap on the network icon from the system tray and connect to secured network SSIDs that are displayed with the words "Secured." Turn off automatic Wi-Fi connections so that you can check and choose the safest network within range each time before your device connects to it.

 

window10-connect_wireless.jpg

Windows 10 Secured connection.

You may find some establishments like hotels secure their networks using different technologies. In order of preference, choose networks secured with WPA2 encryption, then WPA. WEP is a better-than-nothing last resort.

 

2. Set Network Location to "Public."

 

When you connect to a network for the first time in Windows 10, the network location is automatically set to “Public.” Earlier versions of Windows operating systems like Windows 7 provided the option to set a new network connection to be either “Public” or “Private.” In Windows 7, soon after you connect to a new network, the "Set Network Location" window pops-up automatically. Set the location to "Public Network" when prompted. This is the safest option if you are connecting to a public hotspot as it will keep your computer invisible on the network.

The “Public” Network location blocks file and printer sharing, which are common routes for data snoopers. “Home Group” is not available with this option selected, and network discovery is turned off, too. All of these measures make your data less visible on a wireless network. If, however, you are connecting to a private network such as your home network you might want to share music, pictures, videos, or even printers with other devices on that network. In such situations, you can change the network location to “Private” to make your computer discoverable to other computers.

 

3. Use a VPN service.

 

A virtual private network (VPN) is a cloud-based service that takes all your outgoing and incoming traffic and runs it through an SSH tunnel, which means between you and the VPN provider everything is encrypted — even any possible HTTP communication. Once your VPN provider is reached, requests continue the usual way (maybe via HTTP or HTTPS). But the important thing is that nobody at the public WIFI can listen to your traffic.

 

android-vpn.jpg

Android VPN settings.

Your VPN provider stands at the end of the tunnel and potentially could record all of your communication so you need to trust the provider before you use them. Exercise due diligence and read and research providers carefully to pick one you can trust. Read blogs of vendors, go to security forums. Look for cases where vendors stand up for user privacy. If your provider is only known for letting you change outgoing server just to appear to be from another country, that provider is probably not a good option for you.

A vendor you can try is SecurityKISS that offers ad-free VPN access with data limited to 300MB/day. That's plenty of scope for checking email, looking at maps and other casual Wi-Fi uses. Another VPN you can try is Freedome by F-Secure. With a secured network and a working VPN setup, you are already in a great spot.

See Also: The Different Types of People You See at Coffee Shops (Infographic).

 


George Mathews is a staff writer for WebWriterSpotlight.com. He is passionate about personal growth and development.


Image Credit:  Flickr_elmada

 

SUBSCRIBE TO OUR NEWSLETTER  newsletter icon.png

Get our best content, news, tips, and inspiration in your inbox - free.

The subscriber's email address.
 

 

Join Over 20,000 Subscribers!

Get our best content, tips, and inspiration free in your inbox. Subscribe ››

Connect with us:  twitter.gif linkedin-gray.jpg email.gif RSS feed

 

 

 

 

 

Most read this week


The Document Foundation Announces LibreOffice 7.5 Community
The Document Foundation Announces LibreOffice 7.5 Community
Alexis Davis

6 Easy Tips to Take Your Business to the Next Level
Priyanshu Yadav

writer-working-at-night-exceptional-writers
9 Things Exceptional Writers Habitually Do So Well
Books Editors

How to Implement Workplace Drug and Alcohol Testing Protocols: Policy To Practice
How to Implement Workplace Drug and Alcohol Testing Protocols
Alexis Davis

 

Got a story or tip for us?

 

Tips_0_0_0.png

Here's how to submit it →

 

 

 

 
 

EXPLORE MORE ...

black-nav-bar1.png

News & Features  ›


Research Shows Over a Third of Brits Still Find Running a Business Attractive Despite COVID

A Third of Brits Find Running a Business Attractive Despite COVID [Study]

college_student_studying_using_ChatGpt

34% of University Students Admit to Using ChatGPT for Exam Preparation

woman-outdoors-nature-looking-up-glitter-free-christmas-protect-environmental

Why We Must Have a Glitter-Free Christmas to Protect the Environment


Understand and Plan Your Digital Afterlife

The Most Annoying Video Call Habits at Work - Are You Guilty?

The Digital Playground: Creating Safe and Engaging Online Spaces for Kids

hor-line-blue

Tech & Trends  ›


businessman-sitting-at-desk-with-laptop-monitoring-website-changes

Monitoring Changes on Your Company Website: Benefits & Methods

15 Ways to Harness Technology to Boost Your Creativity

How Cloud Technology Helps Entrepreneurs Win on the Internet


Should You Have a Dedicated Outsourced Development Team?

Tech Troubles? 4 Business Strategies To Avoid Tech Disasters

Understanding the Limitations of Antivirus Software
 

hor_line_yellow

Arts & Culture  ›


What Famous Writers Are Reading [Infographic]

How to Leverage Telecommunications in the Education Sector

How to Leverage Telecommunications in the Education Sector

How to Wear Streetwear for Both Grown-ups and Youngsters


What Your Handwriting Says About You

12 Reasons Reading Widely Is So Important for Writers

How Reading More Inspires Better Writing

hor-line-brown

Business & Economy  ›


young-woman-shopping-holiday-cut-costs-save-money

Hacks to Cut Shopping Costs, Save Money with AI This Christmas

Best Ways of Using QR Codes in Your Marketing Strategy

Best Ways of Using QR Codes in Your Marketing Strategy

woman_food_courier_in_uniform_carrying_food_in_paper_bag_and_takeaway

Different Types of Food Delivery Business Models & Platforms to Leverage Them


How to Build Up an Online Portfolio and Presence for Your Business

The Key to Safety: Why Hiring a Professional Locksmith Matters

10 Lame Excuses You Probably Use to Procrastinate

hor-line-green

Health & Style  ›


Plastic Surgery Myths Debunked

3 Plastic Surgery Myths Debunked

 Strategies for Overcoming Loneliness in a New Country

Solo But Strong: Strategies to Overcome Loneliness While in a New Country

man-athlete-strong-sports-diet

Top 5 Sports Diet Myths & Mistakes Revealed!

hori-3.jpg

The Truth Behind 5 Common Food Label Claims

hori-3.jpg

Why It's Okay to Daydream As a Creative Person

hori-3.jpg

Can Mindfulness Help to Stop Substance Abuse and Addiction?
 

Home | About Us | Contributors | Submissions | Advertise | Disclosure | Privacy Policy | Contact Us

Follow Us:

twitter_e.jpg linkedin-pg.jpg email-updates_icon.jpg

Committed to quality content and journalistic ethics.

RSS rss

Search WWS search-icon-trans_0_1.png

© 2026 The WWS Daily.