Skip to main content
HomeThe Web Writer Spotlight

- News, tips, inspiration you can trust to thrive in today’s digital age.

Search form

Main menu

  • Home
  • News & Features
  • Business & Economy
  • Tech & Trends
  • Health & Style
  • Arts & Culture
  • Contact Us
 

5 Ways to Keep Your Data Safe On Public Wi-Fi

George Mathews October 30, 2022

Each year, the internet becomes more tightly woven into our lives, and the pressure and incentives to be constantly online continues to increase. As if in answer to this, public Wi-Fi has become more commonplace in shopping malls, restaurants, coffee shops, public transport, airports, and more. 

Unfortunately, public Wi-Fi hasn’t gotten a whole lot safer. We have covered the basics of keeping your data safe on public Wi-Fi on this blog, but it’s worth revisiting the topic and expanding on it.

Just as the internet has become more widely accessible, so too has the means to spy on other internet users become accessible. Some spying methods are almost ridiculously simple, while other are complex and difficult to fend off. 

With that in mind, it pays to take extra precautions to protect your information and stay safe when using public Wi-Fi, such as the ones below:

 

Important Safety Precautions When Using Public Wi-Fi

public-wi-fi-data-safety.jpg

 

1. Vet the Networks

 

The evolution of the internet has obscured many things—like static websites, IRC, and several social media apps—but it hasn’t quite killed open networks. 

Network protection should be your first criteria: do not connect to WiFi that is completely unsecured. WPA2 or WPA encryption are best, but WEP will do in a pinch.

Networks that use in-browser login portals to limit users have been gaining popularity. They’re more secure than fully open networks, but carry risks of their own. Take time to read the terms of service before connecting to one, especially if you’re a repeat customer. They’ll give you an idea of how much the host establishment cares about guests’ safety. 

That said, before connecting to any network, verify if the network actually belongs to a nearby establishment—it could be a rogue hotspot imitating one.

 

2. Keep Security Software Updated

 

Both Windows and Apple operating systems come with fairly robust antivirus protection these days, making additional security software more optional than required. What’s more important is making sure your security programs, whichever you choose, are kept up-to-date. 

And of course, make sure you download those updates on a secure network, not a public one.

 

3. Choose Encrypted Connections

 

Just as you should choose only encrypted networks, you should stick to encrypted connections with websites, too. Secured websites are marked with a “Secure” label alongside a padlock icon in the address bar. They’re also recognizable by the “https://” prefix at the start of the URL.

You can further fortify your web browsing by using dedicated browser extensions for privacy. These extensions allow you to block specific sites and also provide some blanket protection against same-network threats, such as session hijacking and clickjacking.

 

4. Opt for Apps that Use Encryption

 

Mobile apps generally lack the security indicators browsers have, making it hard to ascertain if you’re accessing secure connections. On top of that, the security built into mobile apps can vary widely—it’s all up to each app’s developers.

One thing to note, though, is that a number of messenger apps don’t encrypt the information they send. If you’re on a public network, that means your conversations are easy targets for eavesdropping. 

If you want to keep your chats safe from prying eyes, switch to a messenger with reliable encryption and encourage your friends to do the same.

 

5. Use a VPN

 

We’ve said it once, but it’s worth repeating: when using public Wi-Fi, use a Virtual Private Network (VPN). VPNs send information through a tunnel that’s encrypted at both ends, providing the most reliable online privacy you can get.

Since these tunnels can be established using remote servers around the world, they can effectively conceal your IP address, too, making it difficult for third parties to track you. 

VPNs can provide a number of other benefits too, so using one is in your best interests, regardless of where you’re connecting from.

Read Also: Google’s Project Fi Wireless Option – Can It Really Save You Money?

Share this article

  • facebook
  • twitter
  • linkedin
  • pinterest
  • pocket
  • email
  • hackernews
  • reddit
  • tumblr
  • whatsapp

bg_carousel_header_0.png

SUBSCRIBE TO OUR NEWSLETTER  newsletter icon.png

Get our best content, tips, and inspiration free in your inbox. Subscribe here >>

bg_carousel_header_0.png

 

You might also like...

female-vegan-dietary-supplements-vegies-water-on-table

Dietary Supplements for Vegans: What You Should Know

The Key to Effective Mobile App Development

Natural Ways to Combat Anxiety, Depression, and Insomnia

Female Freelancer Image for Steps to Quit the Rat Race and Finally Start Freelancing

5 Steps to Quit the Rat Race and Finally Start Freelancing

Alternative Treatments: The Ailments a Chiropractor Can Help Treat

Bad Teeth Might Be Ruining Your Weight Loss Goals

 

Join over 20,000 Subscribers!

And get our best content, news, tips, and inspiration free in your inbox. Subscribe ››

twitter.gif linkedin-gray.jpg email.gif RSS feed

 

 

 

 

 

 

Most read this week


people-audience-event-find-your-target-market
How to Find Your Target Market & Connect with the Right Audience
Mike Austin

asian-woman-looking-ahead-power-language-index
10 Most Powerful Languages in the World Ranked
Jonathan Brown

Smartphone and Dollar Bills Image for App Monetization Trends You Should Not Ignore
Mobile App Monetization Strategies, Tips, and Trends You Should Not Ignore
Syeda Khadeer …

Image for The Job of a Web Designer: Ensure Usability, Desirability, and Utility in UX Design
The Job of a Web Designer: Ensure Usability, Desirability, and Utility in UX Design
Vergis Eva

 

Got a story or tip for us?

 

Tips_0_0_0.png

Here's how to submit it →

 

 

 

Like this content? Never miss a story!

Get our best content, tips, and inspiration free in your inbox.

CAPTCHA
Please check this box to prove you are a human visitor and help us prevent automated spam submissions.
 

New stories


Tech Troubles? 4 Key Business Strategies To Avoid Tech Disasters

Suzanne Elly September 24, 2023
SOFTWARE & TECH TROUBLES
businessman-with-laptop-tech troubles-software-problems-distress-disappointment

Software and tech troubles affect the best of us, but there are important safeguards you can put in place to avoid tech disasters and reduce tech troubles in business.

Top Link Building Techniques and Tips for Marketers

Vergis Eva September 23, 2023
LINK BUILDING
serious-bearded-man-using-laptop-cafe-link-building

No matter what you are doing to boost your business website, link building is something you cannot avoid. Leverage the right link building strategies and marketing tactics to build quality links.

How to Spy on Your Competitors and Steal Traffic Ethically

Marc Sullivan September 22, 2023
WEBSITE TRAFFIC STRATEGY
man-using-binoculus-spy-on-competitors-steal-website traffic

Want to increase traffic to your website? You can spy on your competitors' website traffic and ethically steal some traffic. Spy website traffic for competitor analysis and traffic growth replication.

Ransomware Defense: Safeguarding Your Data with Backup Protection

George Mathews September 22, 2023
MALWARE DEFENSE
cyber-criminal-wearing-white-mask-guard-agains-malwake-back-up-data
Becoming a victim of ransomware is more probable than you might think. You need to backup your data and implement ransomware defense strategies to safeguard your data and protect yourself from malware.

Evolution of the Transport Sector: Key Changes Worth Noting

George Mathews September 21, 2023
TRANSPORT EVOLUTION
bullet-train-transport-sector-evolution-changes

From the new fastest planes for commercial air travel to widespread use of hydrogen fuel in vehicles, the transportation industry is changing and evolving faster than ever.

Unlocking the Power of Software-Defined Storage: A Comprehensive Guide

Alexis Davis September 21, 2023
DATA STORAGE SOLUTION
software-team-man-woman-software-defined-storage-concept
Many companies struggle with storage challenges like storage downtime, latency issues, and high software costs. SDS comes in handy to address these challenges, and more.

Marketing Funnels vs Customer Journey Funnels: What You Should Know

Amanda DiSilvestro September 20, 2023
CUSTOMER JOURNEY MAP
man-whiteboard-marketing-funnel-customer-journey-map

The marketing funnel and customer journey map — or customer journey funnel — are similar ideas, but they mean different things and should not be used interchangeably.

Pagination

  • (Page 1)
  • Next page Next ›

Contributors blogs


Blog here »

Mobile Commerce: The Stats & Future Projections

Ronak Meghani

 


Save Money in Your Home with These Sustainable Investments

Delilah Roberts

 


Exercise May Help Reduce Risk of Deadly COVID-19 Complication, Scientists Say

Zhen Yan

 


man-business_trucks_maintenance

Truck Maintenance Guide for Business Owners: Tips & Best Practices

Mikha Dela Cruz

 


Why You Need to Add Live Videos to Your Marketing Plan Now

Saun Tatt

 


man-using-binoculus-spy-on-competitors-steal-website traffic

How to Spy on Your Competitors and Steal Traffic Ethically

Marc Sullivan

 


Manage Footfall in Business with Automated Queue Management System

Morris Edwards

 


 

EXPLORE MORE ...

black-nav-bar1.png

News & Features ›


How Growing Businesses Can Do Away with Early-Stage Investments

YouTube Is Rolling Out a New Website Design, Invites Users to Give Feedback

The Biggest Problems With Retirement (and How to Fix Them)


The Present & Future Benefits of CRM Solutions - Salesforce Case Study

Will iPhone 15 ‘Wonderlust’ Event Help Apple Recover $200BN Lost?

Philippines' Rich History with Rum – A Dive into Sugar & Spirits

Mothers Are Less Wealthy Than Women Without Children, Study Finds

Painting Technicolor Futures with Innovation

UK Regions That Are Perfect for Stress-free Staycation

hor-line-light-blue.png

Tech & Trends ›


How Artificial Intelligence Is Powering the Digital Transformation of SMEs

How Metadata Is Related to Data

The Most Coveted Digital Technologies Businesses Want (& Countries Investing the Most for Them)


Tech Troubles? 4 Key Business Strategies To Avoid Tech Disasters

Ransomware Defense: Safeguarding Your Data with Backup Protection

Unlocking the Power of Software-Defined Storage: A Comprehensive Guide

How To Increase Your App Downloads On Google Play Store & Other App Stores

Revolutionizing Industries: The Exciting Future of Metaverse & Predictions

Compatibility of Bitcoin with AI Attracting Institutional Investors
 

horizontal yellow line

Arts & Culture ›


Best Music to Maximize Your Mental Capacity and Boost Performance

Image for 10 Writing Contests And Why You Should Enter Them

10 Best Writing Contests And Why You Should Enter Them

Image for Celebrating “Mockingbird” Author Harper Lee: 10 of her Best Quotes We’ll Never Forget

Celebrating “Mockingbird” Author Harper Lee: 10 of her Best Quotes We’ll Never Forget


Common Mistakes that Doom Writing Careers

Six Simple Tips to Overcome Wedding Speech Nerves

How to Overcome Uncertainty, Doubt, & Fear - the Bane of Creatives

5 Philosophical Ideas to Make You a Better Writer (& also a Better Person)

5 Best Books on Writing for When You Need to Be Inspired

How to Build a Strong Reputation Online As a Writer

hor-line-brn.png

Business & Economy ›


Amazon_PPC_advertising_guide

Amazon PPC Ads Optimization - Guide for Better Sales & Visibility

Online Reputation Management: Key Factors & Insights You Must Know

The Expectations vs Reality of Becoming an Entrepreneur


Top Link Building Techniques and Tips for Marketers

How to Spy on Your Competitors and Steal Traffic Ethically

Evolution of the Transport Sector: Key Changes Worth Noting

Marketing Funnels vs Customer Journey Funnels: What You Should Know

3 Areas Businesses Invested in to Make it Through the Pandemic

Applications & Benefits of Mass Text Messaging Services for Reaching Users

Home | About | Contributors | Write for Us | Advertise | Disclosure | Privacy Policy | Contact Us

Follow Us:

twitter_e.jpg linkedin-pg.jpg email-updates_icon.jpg

© 2023 Copyright, The Web Writer Spotlight.

Committed to quality content and journalistic ethics.

RSS rss

Search WWS search-icon-trans_0_1.png

Webwriterspotlight.com. All rights reserved.
x
x