Free WiFi - 9 Safety

click fraud protection

How to protect your computer or smartphone, using social networks.

If you receive a call from the bank and asked to confirm the transaction on the map that you did not commit, you probably first dive in to check on the spot whether the ill-fated card, and to find it in your wallet, start to remember, do not remove you moneyin a suspicious ATM or sin on fraudulent cashiers.However, much more likely that the card turned out to be compromised during an online purchase that you made, waiting for the order in a cafe.

Dots free Wi-Fi is becoming more, and no one would argue with the fact that it's wonderful.However, rushing into the maelstrom of public Internet, do not forget about security.Setting your laptop, tablet or smartphone by default may not be enough to protect against fraud.Below we give the nine simple rules, observing that you can protect your personal information from those for whom it is not intended, and to save their money.

1. Disable Sharing

You can share your music library, files or printers and even allow remote login to your computer - but only if you're at home or in the office.When you use the public network Wi-Fi, this option is turned off or your device will become an easy target for hackers.

If you are using a computer running Windows, go to the sharing settings (Control Panel - & gt; network and internet).There you should disable file sharing, and to prohibit the detection of other computer users on the network.If you have a Mac, go to the menu in the system settings and make sure the checkbox is not checked, none of the options.

2. Use VPN

safest to use the public Internet via VPN (this abbreviation stands for virtual private network - virtual private network).VPN holds your traffic through a secure network, even when you are connected to free Wi-Fi.If you regularly connect to such networks, configure a VPN more than reasonable: it is possible to organize both free and paid with yet more reliable services.The latter, for example, allow you to select, through which countries will be streams of your data, and do not limit the scope and speed of data transmission.

3. Do not connect to Wi-Fi-networks automatically

your smartphone and a tablet, perhaps able to automatically connect to available Wi-Fi-points, but this option is a serious threat to your safety: the fact that the device can"catch" network created by attackers specifically to steal information.

Most modern devices automatically connect to the network is disabled by default, but it is still better to take a few seconds for it to check once again how things are with this case, in the section Wi-Fi settings from your device.

4. Use SSL

Many sites use SSL, you allow communication between them and users in encrypted form.Of course, it is possible to rely on this defense, but it's better to install a browser extension SSL Everywhere, in this case the exchange of encrypted and therefore not available to attackers information will be made with virtually all of the sites that you visit.

5. Do not neglect the two-step authentication

two-stage, two-stage or authentication means that access to your account you have to enter the information of two types: one that you have and the one you know.Most often it comes down to what you are asked to pre-set your password and the code sent by SMS.Thus, if someone steals your password, it will not be enough to use your account.

course, a two-step authentication takes a little more time, that sometimes annoying (such scheme is used by most Internet banks, and sometimes really want to turn it off, but do not make it impossible to accidentally).It is suggested to connect a double check of access where it can be done voluntarily - for example, an account in Gmail.To do this, go to the following path: Settings - Akkautny and imports - Other account settings Google - Safety - Two-stage authentication.

Google ask you to enter a mobile number and sends a six-digit code that is required to link the account to your phone.This code must be entered each time, in addition to the password when you log in to your account from a new device.

6. Specify the name of the network

Sometimes fraudsters can create a network to steal data, which is similar to the real name.For example, in addition to the official network, you can see Starbucks «Free Starbucks Wi-Fi».If detected in the cafe Wi-Fi makes you even the slightest doubt, do not hesitate to contact employees of the institution and to refine them, as it should be called net.

7. Protect your passwords

recalled the very simple and important rule: Do not set the same password for multiple accounts.Do not be lazy to come up with strong passwords, and if you are afraid to get lost in them - use a password manager like KeePass or LastPass.Both of these applications are free, both encrypt your data, but they do it in different ways: KeePass stores encrypted data on your computer, and LastPass - in the cloud.Each of the methods has its pros and cons, but in general, both services provide a high level of protection.

8. Turn on the firewall

Most operating systems come with a built-in firewall that monitors incoming and outgoing connections.The firewall does not guarantee 100 percent security, but it is a very useful option, which is enabled to keep.In Windows, it is included in the section of the System and Security (System And Security) control panel at the Mac - in the tab "Firewall" (System Preferences - Privacy and Security).

9. On forget antivirus

Regular run anti-virus software (of course, timely updates) will allow time to detect if someone got access to your system and makes a suspicious activity, such as editing system files.Antivirus report also connect to an unsecured network.

Alexander Kirichenko

Articles Source: aif.ru