Archives - Wi-Fi


Set up your home wireless network using WPA2 encryption

All other wireless encryption methods are outdated and more vulnerable to exploitation. In early 2018, the Wi-Fi Alliance announced WPA3 as a replacement to the longstanding WPA2 wireless encryption standard. As WPA3-certified devices become available, users should employ the new standard.

Connect via password-protected networks or cellular

When shopping online, get the maximum possible security and privacy for your transactions. That means never buying anything while connected to public or open Wi-Fi networks, or even to the Wi-Fi of someone you don’t know well. Stick to your own Wi-Fi or to cellular service like LTE for the safest results.

Protect your data from interception

Networks without passwords do not encrypt your connection. Accordingly, it’s possible for other connected users to spy on your activity, including any password you type. Don’t view your bank balance or log into any accounts tied to a debit/credit card while on public Wi-Fi. Cellular is much safer in these cases.

Beware of Public USB charging ports

Like public Wi-Fi, public USB ports in cafes and airports can’t be trusted. Connecting your device to one of them could result in a virus infection. Bring your own external battery pack, or find a standard wall socket instead.

Use a VPN for extra online protection

Virtual private networks (VPNs) are helpful security utilities that encrypt your internet connection, hiding it from prying eyes. This strong protection is beneficial if you ever need to use public Wi-Fi. Think of your connection as a car and the VPN as a secure parking garage. Continuing the metaphor, the latter protects you from having […]

Protect your wireless network Service Set Identifier (SSID)

To prevent outsiders from easily accessing your network, avoid publicizing your SSID. All Wi-Fi routers allow users to protect their device’s SSID, which makes it more difficult for attackers to find a network. At the very least, change your SSID to something unique. Leaving it as the manufacturer’s default could allow a potential attacker to […]