No items in your cart
Cybercriminals can use the internet to gain access to your computer. For this reason, use only Wi-Fi networks with WPA2 or higher security, a cellular network, or a virtual private network when possible. Always try to avoid using public Wi-Fi. Also see our article: How to protect your privacy on public Wi-Fi
Not all Wi-Fi networks are equally secure. Look to see if the network is secured with WPA, or preferably the more advanced WPA2 or WPA3. The legacy WEP protocol is not considered secure.
Many public access points are not secured and the traffic they carry is not encrypted. This can put your sensitive communications or transactions at risk. Because your connection is being transmitted “in the clear,” malicious actors could use sniffing tools to obtain sensitive information such as passwords or credit card numbers. Ensure that all the […]
All other wireless encryption methods are outdated and more vulnerable to exploitation. In early 2018, the Wi-Fi Alliance announced WPA3 as a replacement to the longstanding WPA2 wireless encryption standard. As WPA3-certified devices become available, users should employ the new standard.
It’s never a good idea to leave your Wi-Fi network open, since it can then be accessed by anyone in range. Make sure a password is required and that the network is encrypted by WPA2 – not by either the original WPA or WEP, both of which are outdated and have known exploits.
It’s been obsolete for years, but make sure you are not still securing any Wi-Fi networks with the legacy WEP standard. WPA2 is ideal as of early 2018 and supported by any legitimate modern router or wireless-enabled device. Be on the lookout for WPA3-certified products in the coming years, as they will have additional features.
Privacy /
Legal
Do Not Sell My Information
Copyright ©2021 Total Defense Inc. All Rights Reserved.
At Total Defense we take your privacy seriously. We recently made updates to our privacy policy to comply with the European Union’s General Data Privacy Regulation. This policy explains:
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.