For many professions, work involves mobility and the use of public WIFI. Places where WIFI technology can be used via wireless WLANs are steadily increasing. On the one hand, this is a convenience, but on the other it is an exposure to hacking data.
On the surface, public WIFI is a great convenience, as we save mobile data. An entrepreneur, a sales specialist, a marketer, a graphic designer, an IT specialist, in fact any profession these days can then do their work remotely. However, how to do it safely? How can data be hacked if we use a hotspot in a coffee shop?
7 threats of data theft in public WIFI.
It might seem that using a hotspot is similar to working in an office. WIFI technology is made available through WLAN via a router connected to a service provider. However, data security in this case is a trap.
- Unencrypted data. Encryption is a basic operation that should be done on the Internet, as the security of data depends on it. It works by providing sent information with a code that cannot be read by outsiders. Owners of a given public WIFI network should take care to encrypt all transmitted messages. Unfortunately, most WIFI hotspots do not do this. In a situation where no WPA or WPA2 password is required to log in, the Internet is not safe at all. So if you open sensitive data on your device or log in to a financial application, you are handing your own data on a platter.
- Unfinished WIFI network configuration. One cannot be sure that the owners of the hotspot site have properly secured the data. It is quite common that default user accounts and passwords stored on the router are available to others. Besides, the owners may not have control over the configuration of the equipment, and in this case even simple mistakes make it easy to break in.
- Man-in-the-middle attacks. This is one of the most common attacks on public networks. In situations such as those previously mentioned, security flaws allow a criminal to access and “eavesdrop” on data. When a user connects to the Internet, data to and from the device is sent to the site. It has turned out that even a 7-year-old child can launch such an attack in a matter of minutes.
- Malware. When vulnerabilities are exploited, another user, or an attacker, is able to deliver malware to a computer undetected.
- Snooping. At the time of the attack, the cybercriminal has access to your username, password, as well as your bank account information if you used it while connecting to public WIFI.
- Worms. They resemble computer viruses, but the latter only function when hooked up to a particular program. Worms are very difficult to catch because they can operate on their own and spread to other computers and devices.
- Creating fake access points. It is also worth watching out for fake hotspot names. They often look like the real thing (E.g. Ana`s Cafe, while the correct access point is Ana`s Coffee). Failure to connect will result in information being sent to the cybercriminal.
Public WIFI or VPN?
So what to choose? How do you work outside the office to keep yourself safe?
It is recommended to use a VPN, or virtual private network. The user buys such a service, installs it on his computer and is able to use the network securely. Data is transmitted in encrypted form, and the IP address is invisible and cannot be accessed. You are welcome to use the VPN at ITH.