More than a third of the users do not bother with Wi-Fi protection – TotalDefense Blog

50 %
50 %
Information about More than a third of the users do not bother with Wi-Fi protection –...
Technology

Published on February 26, 2014

Author: totaldefense

Source: slideshare.net

Description

How users neglect about protection while connecting to wireless access points. Visit http://blogs.totaldefense.com/securityblog.aspx for cloud-based endpoint security solutions for home and businesses.

More than a third of the users do not bother with Wi-Fi protection It has become almost second nature - Surfing on the Wi-Fi network. However, while connecting to a wireless network can hold hidden risks, more than a third of the users do not take any caution when connecting. It is easy to connect to the network. Alongside cellular networks and broadband Internet communications, usually there is at least one wireless access point to which you can connect mobile devices and computers. However, many of these access points are saving costs when it comes to the users operation safeguards - many of whom are unaware of it or are not bothered by the possible problems that may be caused by the lack of security. Many users do not take special measures to protect browsing activity when connected to a wireless access point, and some even commit acts of purchasing or banking activities using the closest network. Most users do not even bother to take the time and check the encryption level of each access point. Is taking extra care when using Wi-Fi network is a public sense, or is it unnecessary hassle? Well, it is only you, the site and the man in the middle. You never know what "the man with laptop at the table next to" might do. Perhaps , like you, he checks his e-mails or chats with friends. But maybe he monitors the web traffic of all those around him - including yours. “man in the middle” attack makes this scenario possible - Every Wi-Fi connection is a window to the Internet for all the devices connected to it. All outgoing requests go through the access point, and only then proceed to the visited sites. Without encryption of the communication between users and access points, this is an easy task for a network hacker that can intercept any data you transmit. This may include information that is sent to the bank or shop online. Moreover, such attacks are possible even when the access point is password protected and when there is a secure HTTPS connection between the site and the user's browser. Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 1

What information network hackers are interested in? Anything which they can use to gain profit especially passwords to e-mail accounts, banking, payment services and social networks. So, it is clear that we need to secure the Wi-Fi connection, but how? The recommendation is to use only a secure connection to the access point. This alone will reduce significantly the risk of interception by traffic hackers. However, when planning to use sites that require personal information such as user name and password, it is recommended to add a reliable security product to this basic security measure. About TotalDefense: Total Defense(@Total_Defense) is a global leader in malware detection and anti-crimeware solutions. We offer a broad portfolio of leading security products for the consumer market used by over four million consumers worldwide. Our solutions also include the industry’s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia. Visit http://www.totaldefense.com/ for web, cloud & mobile security solutions for home users and businesses. Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 2

Add a comment

Related presentations

Related pages

More than a third of the users do not bother with Wi-Fi ...

More than a third of the users do not bother with Wi-Fi protection – TotalDefense Blog ... more than a third of the users do not take any caution ...
Read more

Security with Smart Cards

PINs offer significantly more protection than standard ... Because users are more likely to ... smart card readers that do not work with the smart cards of ...
Read more

Why Public WiFi Hotspots Are Trouble Spots for Users

Why Public WiFi Hotspots Are Trouble Spots for Users. ... not all hotspots are safe for you to do ... users were 80% more likely than ...
Read more

Official Google Blog

It also conducts more than 200 million daily security scans ... comprising more than 500,000 infected user ... not just mimic them. To do this, ...
Read more

Tech blog for sysadmins – GFI Blog - Web, Email and ...

GFI Blog is a tech blog for sysadmins and ... The 32 things you should do right now to make Data Protection ... In January’s Third Party Patch ...
Read more

Do Not Track - Wikipedia, the free encyclopedia

... of an individual user. The Do Not Track header was ... supplied by third ... in one or more items called "headers". Do not track ...
Read more

Microsoft OneNote - Wikipedia, the free encyclopedia

Microsoft OneNote is a ... users do not need to explicitly ... This facilitates collaboration among workgroups members who are not always online. More than ...
Read more

Network Share not working through Windows 7 home premium ...

Refer to any third party security program's Help or user forums for how to properly configure its firewall. Do not run more than one firewall.
Read more

WEFI DOWNLOAD CENTER

... our agile solutions provide more than basic user ... Download wefi PC for a fast and ... Study: More People Use Uber, But Lyft's Users Are More ...
Read more

The Twitter Rules | Twitter Help Center

All users must adhere to the policies set forth in the Twitter Rules. Failure to do ... more than six months may also ... third parties. Invitation spam ...
Read more