Wi-Fi is a popular technology that allows Internet-enabled devices

Similar documents
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Best Practices Guide to Electronic Banking

WEB BROWSING PL Y IT SMART DON T BE PLAYED!

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Online Banking Fraud Prevention Recommendations and Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices

National Cyber Security Month 2015: Daily Security Awareness Tips

High Speed Internet - User Guide. Welcome to. your world.

Reliance Bank Fraud Prevention Best Practices

Boston University Security Awareness. What you need to know to keep information safe and secure

Business ebanking Fraud Prevention Best Practices

General Security Best Practices

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013

Online Cash Manager Security Guide

Internet basics 2.3 Protecting your computer

Know the Risks. Protect Yourself. Protect Your Business.

10 best practice suggestions for common smartphone threats

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system

The Hidden Dangers of Public WiFi

TMCEC CYBER SECURITY TRAINING

Cyber Essentials Scheme

Keep Hackers Guessing: Protecting Corporate Information While On The Go

Windows Operating Systems. Basic Security

Mac OS X Secure Wireless Setup Guide

HomeNet. Gateway User Guide

Safe Practices for Online Banking

Malware & Botnets. Botnets

Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin

Why you need. McAfee. Multi Acess PARTNER SERVICES

Internet threats: steps to security for your small business

10 Quick Tips to Mobile Security

Wireless Network Best Practices for General User

Social Media Status Update Messages. Twitter

Five Tips to Reduce Risk From Modern Web Threats

Frequently Asked Questions

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking?

Corporate Account Take Over (CATO) Guide

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens BlackVue Cloud BlackVue Wi-Fi Internal Memory...

Cyber Security. Securing Your Mobile and Online Banking Transactions

Countermeasures against Unauthorized Access

Accessing TP SSL VPN

Understand What s Going On

Fraud Prevention Tips

Introduction. PCI DSS Overview

BYOD Policy for [AGENCY]

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

F-Secure Mobile Security for Business. Getting Started Guide

Comodo Mobile Security for Android Software Version 2.5

Cyber Security: Beginners Guide to Firewalls

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

U.S. Cellular Mobile Data Security. User Guide Version 00.01

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

Securing end-user mobile devices in the enterprise

Quick Start Guide. Business Wireless Gateway. WiFi Devices. Model Number: DPC3939B. Business Wireless Gateway

Cyber Security: Software Security and Hard Drive Encryption

OUTLOOK WEB ACCESS. User Guide

Infocomm Sec rity is incomplete without U Be aware,

Secure Your Information and Communication Technology Devices

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Password Depot for Android

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Feature List for Kaspersky Password Manager

A practical guide to IT security

SENIORS ONLINE SECURITY

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Table of Contents. Description of the BlackVue App 3. Supported Devices 4. Screen Description 5. Home Screen 5. Video List Screen 6

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Your Digital Dollars Online & Mobile Banking

User Manual for National Transplant Procurement Management (NTPM) TOP team user Web Application

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

Safety precautions for Internet banking or shopping How to avoid identity theft online

Verizon Remote Access User Guide

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

NATIONAL CYBER SECURITY AWARENESS MONTH

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Cybersecurity Best Practices

Chapter 15: Computer and Network Security

Section 12 MUST BE COMPLETED BY: 4/22

HIPAA Security Training Manual

Version 2 January 2015

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

Data Protection Act Bring your own device (BYOD)

Tips for Banking Online Safely

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Transcription:

WI-FI: NOTHING IS PRIVATE WHEN DONE IN PUBLIC You have to take all necessary measures to protect yourself, your information, and your identity for no matter what, cyber criminals are out to get you Wi-Fi is a popular technology that allows Internet-enabled devices (notebooks, smartphones, tablets, etc.) to exchange data or to connect to the Internet wirelessly, using radio waves. Wi-Fi is a service that is available at home, work, cafes, restaurants, airports, hotels and other public places. The list of activities that can be performed, when connected to Wi-Fi, are endless. Office work can be completed and emailed to bosses with ease, from anywhere and at any time. In some public places, businesses provide public Wi-Fi to attract patrons. Patrons can leisurely enjoy the flexibility of surfing the Internet while enjoying a cup of coffee. This service is usually available for free but at certain places, payment for access is required. However, this flexibility and mobility of Wi-Fi, has also brought about new threats in the physical world, and more dangerously in the cyber world. Unlike Wi-Fi that is used at home whereby only those who are known to us have access, public Wi-Fi connections are shared and accessible by anybody and everybody. Public Wi-Fi users do not have the privilege of managing the security settings of the network i.e. changing network name and changing the encryption to suit their needs. The evolution of Wi-Fi technology offers innumerable benefits which unfortunately comes alongside risks as well. However, the risks exposed to each individual is largely based upon the attitude they possess. These risks can be minimised, if good habits are practiced as the weakest point in any security-strengthened system is usually the human element. Here are some essential safety tips that can help you enjoy a safer online presence. 2

BEFORE CONNECTING TO PUBLIC WI-FI 3

These are several essential safety tips that you can adopt in order to increase the security of your Internet-enabled device before connecting to public Wi-Fi. Before you go online, ensure that your Internet-enabled device fulfils the following: 1. Set Strong Passwords Setting a strong password will minimise the possibility of a perpetrator cracking your password and subsequently accessing your accounts and exploiting available information. It is recommended that a password should be more than eight characters and should consist of a combination of upper and lowercase letters, numbers and symbols. Have a different password for different accounts. How do you check the strength of your passwords? Try using Password Meter at http://www. passwordmeter.com/. 2. Enable Password Protected Screen Saver Regardless of the type of device you use to surf the Internet when you are in public places, ensure that the device is screen saver protected. 3. Encrypt File and Folders Encrypt all the important files to protect the confidentiality of the information in the Internet enabled device. 4. Secure Operating System (OS) Install genuine operating systems for your notebook and devices. This is to ensure that you will receive support and regular updates from the developers. Vulnerabilities increase by the day. Therefore, these updates are crucial for continuous security and enhancement of your operating system and to maintain and ensure optimal performance of your notebook or device. 5. Secure Browser Ensure that your Internet browser is updated and is the latest version. Devices usually come with a feature that prompts a request to automatically save your passwords and another feature that automatically fills fields entered. These features should be disabled as these features will store your passwords and entries in the cache. 6. Disable Network Discovery Network discovery enables you to view other computers or devices that are within the same network. It also enables others to view your computer or device 4

too. This visibility will expose you to threats. Some operating system have by default, disabled the network discovery feature. Before connecting to public Wi- Fi, disable the network discovery feature. The network discovery setting is applicable to notebooks regardless of operating system. 7. Turn Off File Sharing Enabling file sharing when not required exposes and increases the probability of remote logins and also the transfer of malicious data to your device. It also enables others to have access to your files and folders. Disable file sharing by default and enable it only when required. Ensure that this feature is disabled before you connect to a public Wi-Fi network. The file sharing setting is applicable to notebooks regardless of operating system. 8. Install Security Software Install security softwares such as firewall and antivirus. Make sure it is activated and always turned on. Personal firewalls can detect abnormal activities like attempts to intrude, for instance. While, antivirus softwares can detect and remove viruses. 5

6 WHEN CONNECTED TO PUBLIC WI-FI

Once you are about to connect to the public Wi-Fi, the following tips are recommended: 1. Verify the Network Name There may be two or more similar network names of one place. One of them could be a false network name set up by the perpetrator. Therefore, always verify the network name with perhaps an employee of the location or place, providing the said network. 2. Use HTTPS Data transferred is usually in plain/clear text, which is easily legible by others. HTTPS wraps the data with an encapsulation technology to secure data from unauthenticated users. Download and enable HTTPS extensions on your browser. 3. Avoid Sensitive Transactions Avoid performing any sensitive transactions when connected to public Wi-Fi, more so, financial or private transactions. It would be best to avoid performing financial transactions completely, over public Wi-Fi connections. 4. Avoid Leaving Device Unattended Never leave your Internetenabled device unattended in public places. A stolen device with confidential and valuable data would be a very high price to pay. The device can be replaced but the loss of confidential and valuable data are irreplaceable. 5. Get Paranoid Practice healthy paranoia. Be alert of your surroundings in public areas as sensitive or private information on the screen of your device is exposed and vulnerable. You could also minimise the brightness of the screen or purchase a privacy filter or screen which limits and reduces the visibility of your screen to others around you. Someone might literally look over your shoulder with the hope of sighting your username, password or credit card number. This is known as shoulder surfing. 7

8 BEFORE DISCONNECTING FROM PUBLIC WI-FI

The following are steps to be taken when you decide to disconnect from a public Wi-Fi connection. 1. Clear Cache Unscrupulous individuals may hack your device and capture your passwords or entries, as it is stored in the cache. Clearing your cache simply means clearing the history stored in the cache. How to clear your cache would depend largely upon the browser you are using, as the steps to do so, would differ from browser to browser. The clear cache option can be found under Tools Internet Options or History Tab at the menu bar of your browser. Some browsers provide you with an option to select what it is that you would like to clear. 2. Disconnect from public Wi-Fi Do not forget to disconnect the Wi- Fi connection by disabling Wi-Fi, when you are done. The longer you are connected to a network, the more exposed you are to an attack. It is a good practice to regularly check the connection status of the Internet-enabled device. 3. Manage Wireless Network If you are a regular user of public Wi-Fi networks, always disable auto connect and delete ID s of previously connected public Wi-Fi networks stored on your device. 9

REFERENCES 1. Brian Burgess, Wi-Fi, 21 August 2013 http://www.gizmag.com/how-to-stay-secure-on-public-wirelesshotspots/28694/ 2. John Spaulding, Alyssa Krauss, and Avinash Srinivasan, Exploring an Open Wi-Fi Detection Vulnerability as a Malware Attack Vector on ios Devices, 2012, IEEE 3. Matthias Korn, Clemens Nylandsted Klokmose, Putting Local Back into Public Wi-Fi Hotspots, UbiComp 12, September 2012 4. Syahrul Fahmy, Akhyari Nasir and Nooraida Shamsuddin, Wireless Network Attack : Raising Awareness of Kampung Wi-Fi Residents, 2012 5. Samara Lynn, Ten Tips for Public Wi-Fi Hotspot Security, 7 September 2010 http://www.pcmag.com/article2/0,2817,2368802,00.asp 6. Steven Andres, How to Stay Safe on Public Wi-Fi, PCWorld, 12 April 2010 http://www.pcworld.com/article/194062/how_to_stay_safe_on_public_ wifi.html 7. Dependability in Wireless Networks Can We Rely on Wi-Fi, Jan/Feb 2007, IEEE Security & Privacy 8. Microsoft Safety and Security Centre, Four Safety Tips for Using Wi- Fi, http://www.microsoft.com/security/online-privacy/public-wireless. aspx 10

Corporate Office: CyberSecurity Malaysia Level 5, Sapura@Mines No 7, Jalan Tasik, The Mines Resort City 43300 Seri Kembangan Selangor Darul Ehsan Malaysia Tel : +603 8992 6888 Fax : +603 8992 6841 Email : info@cybersecurity.my Customer Service Hotline : 1300-88-2999 www.cybersecurity.my CyberSecurity Malaysia 2013-All Rights Reserved