{"id":2257,"date":"2013-07-29T10:03:58","date_gmt":"2013-07-29T14:03:58","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=2257"},"modified":"2020-02-26T20:27:06","modified_gmt":"2020-02-26T14:57:06","slug":"hot-security-tips-for-hotspots","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/hot-security-tips-for-hotspots\/2257\/","title":{"rendered":"Hot Security Tips for HotSpots"},"content":{"rendered":"<p>For many, summer vacations used to mean leaving all the trappings of home behind. But now that we\u2019re more inseparable from our devices than ever before, we never leave everything behind \u2014 especially anything that can connect us to the Internet. But the trouble with using the Internet on vacation is that often the only Wi-Fi hotspots available\u2014 at hotels, airports, coffee shops, etc. \u2014\u00a0are unsecured, public networks, and that <a href=\"https:\/\/www.kaspersky.co.in\/blog\/secure-vacation-tips\/\" target=\"_blank\" rel=\"noopener\">spells trouble<\/a>. Here\u2019s how to minimize the risk.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/07\/05083413\/wifi_title_EN.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2380\" alt=\"wifi_title_EN\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/07\/05083413\/wifi_title_EN.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<ol>\n<li>Whenever possible, <b>don\u2019t use a public network<\/b>. Try to use a secure, password-protected connection. <a href=\"https:\/\/www.kaspersky.com\/blog\/do-you-use-free-wifi-hotspots-a-survey\/\" target=\"_blank\" rel=\"noopener nofollow\">Attackers prey on public networks<\/a> to steal people\u2019s passwords and personal data and to download malicious programs to user systems. And be sure to verify that public network\u2019s name and IP address with an employee; creating bogus networks with names similar to the establishment offering the public network is a trick common to crafty attackers.<\/li>\n<li>\u00a0If you must use a public network, <b>exercise extreme caution<\/b>. Don\u2019t access social media accounts where personal information is accessible, and never, ever log into bank or credit card websites, thereby exposing your financial data to theft.\n<div class=\"pullquote\">Virtual Private Networks provide secure Internet connections for users and encrypt all data transmitted during those sessions.<\/div>\n<\/li>\n<li><b>Use a VPN<\/b>. Virtual Private Networks provide <a href=\"https:\/\/www.kaspersky.com\/blog\/vpns-use\/\" target=\"_blank\" rel=\"noopener nofollow\">secure Internet connections<\/a> for users and encrypt all data transmitted during those sessions. There are lots of good VPNs available that are free to use, and more robust solutions are available for a reasonable $5-$10 a month. Popular paid VPNs include <a href=\"https:\/\/secure.logmein.com\/products\/hamachi\/\" target=\"_blank\" rel=\"noopener nofollow\">Hamachi<\/a>, <a href=\"https:\/\/www.privateinternetaccess.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Private Internet Access<\/a> and <a href=\"https:\/\/www.astrill.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Astrill<\/a>. Widely used free VPNS include <a href=\"https:\/\/www.shrew.net\/software\" target=\"_blank\" rel=\"noopener nofollow\">Shrew Soft<\/a>, <a href=\"http:\/\/www.comodo.com\/home\/email-security\/vpn-access.php\" target=\"_blank\" rel=\"noopener nofollow\">Comodo Unite<\/a> and the free version of Hamachi.<\/li>\n<li>Users can also harness the cellular connections of their phones by turning them into <b>mobile hotspots<\/b>, or buying separate hotspot devices. These crafty setups allow you to access the Internet securely, but may not be as fast as wireless networks and, because they are attached to your monthly data access, you\u2019ll need to make sure you\u2019ve got the appropriate plan to allow for that.<\/li>\n<li>Because none of these solutions are ever 100-percent secure, you should always <b>use a robust Internet security suite<\/b> on your laptops, tablets and smartphones. Oh, did we mention to avoid public Wi-Fi networks like the plague? Yeah, do that.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>For many, summer vacations used to mean leaving all the trappings of home behind. But now that we\u2019re more inseparable from our devices than ever before, we never leave everything<\/p>\n","protected":false},"author":41,"featured_media":2258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[314,215,174],"class_list":{"0":"post-2257","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-data-breach","9":"tag-internet-security","10":"tag-wi-fi"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hot-security-tips-for-hotspots\/2257\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hot-security-tips-for-hotspots\/2307\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/data-breach\/","name":"data breach"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=2257"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2257\/revisions"}],"predecessor-version":[{"id":18847,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2257\/revisions\/18847"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/2258"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=2257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=2257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=2257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}