Archives - Mobile Hotspot


Be smart on open Wi-Fi networks

When you access a Wi-Fi network that is open to the public, your phone can be an easy target of cybercriminals. You should limit your use of public hotspots and instead use protected Wi-Fi from a network operator you trust or mobile wireless connection to reduce your risk of exposure, especially when accessing personal or […]

A mobile wireless hotspot is usually more secure than public Wi-Fi

Use your mobile network connection. Your own mobile network connection, also known as your wireless hotspot, is generally more secure than using a public wireless network. Use this feature if you have it included in your mobile plan.

Avoid free Internet access

When you find yourself out in the great “wild Wi-Fi West,” avoid free Internet access with no encryption. If you do use an unsecured public access point, practice good Internet hygiene by avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi.

Be cautious before you connect public Wi-Fi hotspots

Like on an airplane or in an airport, hotel, train/bus station or café — be sure to confirm the name of the network and exact login processes with appropriate staff to ensure that the network is legitimate. Cybercriminals can easily create a similarly named network hoping that users will overlook which network is the valid […]

Think before you connect to any public Wi-Fi hotspot

Like on an airplane or in an airport, hotel, train/bus station or café-be sure to confirm the name of the network and exact login procedures with appropriate staff to ensure that the network is legitimate. Using your mobile network connection is generally more secure than using a public Wi-Fi network.

Get savvy about WiFi hotspots

Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your mobile device while you are connected. Limit what you do on public WiFi and avoid logging in to key accounts like email and financial services on these networks. Consider using a virtual private network […]