advertisement

More than a third of the users do not bother with Wi-Fi protection – TotalDefense Blog

50 %
50 %
advertisement
Information about More than a third of the users do not bother with Wi-Fi protection –...
Technology

Published on February 26, 2014

Author: totaldefense

Source: slideshare.net

Description

How users neglect about protection while connecting to wireless access points. Visit http://blogs.totaldefense.com/securityblog.aspx for cloud-based endpoint security solutions for home and businesses.
advertisement

More than a third of the users do not bother with Wi-Fi protection It has become almost second nature - Surfing on the Wi-Fi network. However, while connecting to a wireless network can hold hidden risks, more than a third of the users do not take any caution when connecting. It is easy to connect to the network. Alongside cellular networks and broadband Internet communications, usually there is at least one wireless access point to which you can connect mobile devices and computers. However, many of these access points are saving costs when it comes to the users operation safeguards - many of whom are unaware of it or are not bothered by the possible problems that may be caused by the lack of security. Many users do not take special measures to protect browsing activity when connected to a wireless access point, and some even commit acts of purchasing or banking activities using the closest network. Most users do not even bother to take the time and check the encryption level of each access point. Is taking extra care when using Wi-Fi network is a public sense, or is it unnecessary hassle? Well, it is only you, the site and the man in the middle. You never know what "the man with laptop at the table next to" might do. Perhaps , like you, he checks his e-mails or chats with friends. But maybe he monitors the web traffic of all those around him - including yours. “man in the middle” attack makes this scenario possible - Every Wi-Fi connection is a window to the Internet for all the devices connected to it. All outgoing requests go through the access point, and only then proceed to the visited sites. Without encryption of the communication between users and access points, this is an easy task for a network hacker that can intercept any data you transmit. This may include information that is sent to the bank or shop online. Moreover, such attacks are possible even when the access point is password protected and when there is a secure HTTPS connection between the site and the user's browser. Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 1

What information network hackers are interested in? Anything which they can use to gain profit especially passwords to e-mail accounts, banking, payment services and social networks. So, it is clear that we need to secure the Wi-Fi connection, but how? The recommendation is to use only a secure connection to the access point. This alone will reduce significantly the risk of interception by traffic hackers. However, when planning to use sites that require personal information such as user name and password, it is recommended to add a reliable security product to this basic security measure. About TotalDefense: Total Defense(@Total_Defense) is a global leader in malware detection and anti-crimeware solutions. We offer a broad portfolio of leading security products for the consumer market used by over four million consumers worldwide. Our solutions also include the industry’s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia. Visit http://www.totaldefense.com/ for web, cloud & mobile security solutions for home users and businesses. Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 2

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...