Nine things you should never do while on a Wi-Fi hotspot - Intel

Nine things you should never do while on a Wi-Fi hotspot - Intel Nine things you should never do while on a Wi-Fi hotspot - Intel

10.07.2015 Views

IT@Intel Technology TipsIntel Information TechnologyDecember 201011Intel IT creates and publishes articles for Intel employees to educate them on a variety of information technology subjects.Our goal is to help them improve productivity, take advantage of new IT services and raise awareness on other IT topics ofinterest. We’ve modified these articles from their original version for sharing with external audiences.ong>Nineong> ong>thingsong> ong>youong> ong>shouldong> ong>neverong> ong>doong> ong>whileong> on a Wi-Fi hotspotA few preparations can go a long way toward warding off cyber crooksWe all appreciate being able to stay connected when we are away from the office. Whether we are traveling for vacations, off-sitemeetings and other away-from-work excursions, we can still ong>doong> so with a smile, serene in the knowledge that thanks to Wi-Fi hotspots,the Internet and e-mail are only a few clicks away.But not so fast. These often-free Internet access ports can be found everywhere from airports and coffee shops to public libraries, gasstations, and hotels and they offer many benefits in terms of flexibility and improved productivity for Intel employees. But they are notall safe to use. There are serious security risks to company and personal data. If ong>youong>’re not careful, ong>youong> can leave ong>youong>r PC wide open tohackers and other cyber villains.Here are some precautions to take wheong>neverong> ong>youong> access public Wi-Fi that can keep ong>youong>r computer and its information safe fromunwanted eyes.Check before ong>youong> connectDue to the number of locales offering Wi-Fi now (approximately 75,000 Wi-Fi hotspots in the U.S. and 300,000 worldwide by the startof 2011), a routine connection attempt from ong>youong>r local hotspot may bring up a half ong>doong>zen (or more) possible networks. Be extremelycautious here – hackers often set up networks with names such as ―Free Wi-Fi Hotspot‖ to nab unsuspecting users. In addition, a legitpublic Wi-Fi site will ask ong>youong> to log on to a Web page before ong>youong> can complete the connection. If the network or Web page ong>doong>esn’tmatch ong>youong>r locale – such as a generic ―Free Wi-Fi Here‖ page from ong>youong>r favorite coffee shop site – confirm the site name with someoneat ong>youong>r location, preferably an employee. Better yet, have that person connect ong>youong>.Consider using VPN when connecting corporate laptopsSome corporations require their employees to use Virtual Private Network (VPN) to ensure maximum data encryption when connectingcompany laptops to external Wi-Fi hotspots. Check with ong>youong>r IT department for their requirements.

IT@<strong>Intel</strong> Technology Tips<strong>Intel</strong> Informati<strong>on</strong> TechnologyDecember 201011<strong>Intel</strong> IT creates and publishes articles for <strong>Intel</strong> employees to educate them <strong>on</strong> a variety of informati<strong>on</strong> technology subjects.Our goal is to help them improve productivity, take advantage of new IT services and raise awareness <strong>on</strong> other IT topics ofinterest. We’ve modified these articles from their original versi<strong>on</strong> for sharing with external audiences.<str<strong>on</strong>g>Nine</str<strong>on</strong>g> <str<strong>on</strong>g>things</str<strong>on</strong>g> <str<strong>on</strong>g>you</str<strong>on</strong>g> <str<strong>on</strong>g>should</str<strong>on</strong>g> <str<strong>on</strong>g>never</str<strong>on</strong>g> <str<strong>on</strong>g>do</str<strong>on</strong>g> <str<strong>on</strong>g>while</str<strong>on</strong>g> <strong>on</strong> a <strong>Wi</strong>-<strong>Fi</strong> <strong>hotspot</strong>A few preparati<strong>on</strong>s can go a l<strong>on</strong>g way toward warding off cyber crooksWe all appreciate being able to stay c<strong>on</strong>nected when we are away from the office. Whether we are traveling for vacati<strong>on</strong>s, off-sitemeetings and other away-from-work excursi<strong>on</strong>s, we can still <str<strong>on</strong>g>do</str<strong>on</strong>g> so with a smile, serene in the knowledge that thanks to <strong>Wi</strong>-<strong>Fi</strong> <strong>hotspot</strong>s,the Internet and e-mail are <strong>on</strong>ly a few clicks away.But not so fast. These often-free Internet access ports can be found everywhere from airports and coffee shops to public libraries, gasstati<strong>on</strong>s, and hotels and they offer many benefits in terms of flexibility and improved productivity for <strong>Intel</strong> employees. But they are notall safe to use. There are serious security risks to company and pers<strong>on</strong>al data. If <str<strong>on</strong>g>you</str<strong>on</strong>g>’re not careful, <str<strong>on</strong>g>you</str<strong>on</strong>g> can leave <str<strong>on</strong>g>you</str<strong>on</strong>g>r PC wide open tohackers and other cyber villains.Here are some precauti<strong>on</strong>s to take whe<str<strong>on</strong>g>never</str<strong>on</strong>g> <str<strong>on</strong>g>you</str<strong>on</strong>g> access public <strong>Wi</strong>-<strong>Fi</strong> that can keep <str<strong>on</strong>g>you</str<strong>on</strong>g>r computer and its informati<strong>on</strong> safe fromunwanted eyes.Check before <str<strong>on</strong>g>you</str<strong>on</strong>g> c<strong>on</strong>nectDue to the number of locales offering <strong>Wi</strong>-<strong>Fi</strong> now (approximately 75,000 <strong>Wi</strong>-<strong>Fi</strong> <strong>hotspot</strong>s in the U.S. and 300,000 worldwide by the startof 2011), a routine c<strong>on</strong>necti<strong>on</strong> attempt from <str<strong>on</strong>g>you</str<strong>on</strong>g>r local <strong>hotspot</strong> may bring up a half <str<strong>on</strong>g>do</str<strong>on</strong>g>zen (or more) possible networks. Be extremelycautious here – hackers often set up networks with names such as ―Free <strong>Wi</strong>-<strong>Fi</strong> Hotspot‖ to nab unsuspecting users. In additi<strong>on</strong>, a legitpublic <strong>Wi</strong>-<strong>Fi</strong> site will ask <str<strong>on</strong>g>you</str<strong>on</strong>g> to log <strong>on</strong> to a Web page before <str<strong>on</strong>g>you</str<strong>on</strong>g> can complete the c<strong>on</strong>necti<strong>on</strong>. If the network or Web page <str<strong>on</strong>g>do</str<strong>on</strong>g>esn’tmatch <str<strong>on</strong>g>you</str<strong>on</strong>g>r locale – such as a generic ―Free <strong>Wi</strong>-<strong>Fi</strong> Here‖ page from <str<strong>on</strong>g>you</str<strong>on</strong>g>r favorite coffee shop site – c<strong>on</strong>firm the site name with some<strong>on</strong>eat <str<strong>on</strong>g>you</str<strong>on</strong>g>r locati<strong>on</strong>, preferably an employee. Better yet, have that pers<strong>on</strong> c<strong>on</strong>nect <str<strong>on</strong>g>you</str<strong>on</strong>g>.C<strong>on</strong>sider using VPN when c<strong>on</strong>necting corporate laptopsSome corporati<strong>on</strong>s require their employees to use Virtual Private Network (VPN) to ensure maximum data encrypti<strong>on</strong> when c<strong>on</strong>nectingcompany laptops to external <strong>Wi</strong>-<strong>Fi</strong> <strong>hotspot</strong>s. Check with <str<strong>on</strong>g>you</str<strong>on</strong>g>r IT department for their requirements.


IT@<strong>Intel</strong> Technical Tip www.intel.com/itPick the most secure networkMany <strong>hotspot</strong>s are unsecured, but some from more well-known providers <str<strong>on</strong>g>do</str<strong>on</strong>g> offer encryptednetworks. If <str<strong>on</strong>g>you</str<strong>on</strong>g> have a choice, choose the latter. You can tell which networks are secured in <strong>Wi</strong>n<str<strong>on</strong>g>do</str<strong>on</strong>g>ws7* by left-clicking <strong>on</strong> the wireless network c<strong>on</strong>necti<strong>on</strong>s ic<strong>on</strong> in <str<strong>on</strong>g>you</str<strong>on</strong>g>r system tray. Hovering the mouseover each SSID will display the security type. Avoid networks with the security type ―Unsecured,‖ ifpossible (see <strong>Fi</strong>gure 1). In <strong>Wi</strong>n<str<strong>on</strong>g>do</str<strong>on</strong>g>ws XP*, secured network SSIDs are displayed with a lock when <str<strong>on</strong>g>you</str<strong>on</strong>g>click open wireless network c<strong>on</strong>necti<strong>on</strong>s. In either case, <str<strong>on</strong>g>you</str<strong>on</strong>g> will need a password key for access, or <str<strong>on</strong>g>you</str<strong>on</strong>g>’ll need to agreeto a Terms of Use statement <strong>on</strong> the provider’s Web site. In order of preference, choosenetworks secured with WPA2 encrypti<strong>on</strong> (see <strong>Fi</strong>gure 2), then WPA. WEP is a better-thannothinglast resort.<strong>Fi</strong>gure 1: Avoid using unsecurenetworks unless <str<strong>on</strong>g>you</str<strong>on</strong>g> have nochoice.Remember to update securityKeep anti-virus and anti-spyware programs up to date. These protect <str<strong>on</strong>g>you</str<strong>on</strong>g> against mostcyber attacks.<strong>Fi</strong>gure 2: Networks with WPA2 encrypti<strong>on</strong>have the highest level of security againsthackers.D<strong>on</strong>’t mess with <str<strong>on</strong>g>you</str<strong>on</strong>g>r firewallMost company-provided laptops have a preset, activatedfirewall in <str<strong>on</strong>g>you</str<strong>on</strong>g>r laptop to prevent easy outside intrusi<strong>on</strong>by hackers. Do not shut this off. In other cases, Microsoft<strong>Wi</strong>n<str<strong>on</strong>g>do</str<strong>on</strong>g>ws operating systems have a built-in pers<strong>on</strong>alfirewall installed and switched <strong>on</strong>. This <str<strong>on</strong>g>should</str<strong>on</strong>g> be usedunless <str<strong>on</strong>g>you</str<strong>on</strong>g> install a more-powerful firewall via third-partysoftware ven<str<strong>on</strong>g>do</str<strong>on</strong>g>r. To check and adjust <str<strong>on</strong>g>you</str<strong>on</strong>g>r firewallstatus, go to C<strong>on</strong>trol Panel > System andSecurity/Security Center > <strong>Wi</strong>n<str<strong>on</strong>g>do</str<strong>on</strong>g>ws <strong>Fi</strong>rewall (see <strong>Fi</strong>gure3).Avoid transmitting pers<strong>on</strong>al informati<strong>on</strong>Because of the low level of encrypti<strong>on</strong>, if any, at <strong>Wi</strong>-<strong>Fi</strong><strong>hotspot</strong>s, beware of the types of informati<strong>on</strong> <str<strong>on</strong>g>you</str<strong>on</strong>g> mighttransmit through a laptop or cell ph<strong>on</strong>e. Assume thatwhat <str<strong>on</strong>g>you</str<strong>on</strong>g> will transmit will be read by a third party. Savelogging into e-mail, bank and credit card accounts, and themaking of <strong>on</strong>line purchases, for times when <str<strong>on</strong>g>you</str<strong>on</strong>g>’re fully<strong>Fi</strong>gure 3: <strong>Wi</strong>n<str<strong>on</strong>g>do</str<strong>on</strong>g>ws computers have a built-in firewall that <str<strong>on</strong>g>should</str<strong>on</strong>g> <strong>on</strong>ly be turne<str<strong>on</strong>g>do</str<strong>on</strong>g>ff if <str<strong>on</strong>g>you</str<strong>on</strong>g> have a better third-party versi<strong>on</strong> installed – or if <str<strong>on</strong>g>you</str<strong>on</strong>g>’re using an <strong>Intel</strong>computer with its own firewall setup.protected. If <str<strong>on</strong>g>you</str<strong>on</strong>g> must <str<strong>on</strong>g>do</str<strong>on</strong>g> it, use <strong>on</strong>ly Web sites with addresses that start with ―https‖ (or that send <str<strong>on</strong>g>you</str<strong>on</strong>g> there during <str<strong>on</strong>g>you</str<strong>on</strong>g>r visit). Whilenot perfect, these sites are far more secure than the basic ―http‖ variety. During commercial transacti<strong>on</strong>s, look for a small padlock at thebottom (<strong>Wi</strong>n<str<strong>on</strong>g>do</str<strong>on</strong>g>ws XP) or next to the address line (<strong>Wi</strong>n<str<strong>on</strong>g>do</str<strong>on</strong>g>ws 7) indicating a commercial transacti<strong>on</strong> is secure.2 PUBLIC


IT@<strong>Intel</strong> Technical Tip www.intel.com/itD<strong>on</strong>’t save passwordsWeb sites and browsers are forever asking if <str<strong>on</strong>g>you</str<strong>on</strong>g> want to save and store passwords. A general rule of thumb: <str<strong>on</strong>g>you</str<strong>on</strong>g>’re probably better offnot storing <str<strong>on</strong>g>you</str<strong>on</strong>g>r username and password anywhere, especially when it comes to banking sites and the like. That goes <str<strong>on</strong>g>do</str<strong>on</strong>g>uble for roadwarriors or travelers who frequently c<strong>on</strong>nect via public <strong>Wi</strong>-<strong>Fi</strong>.Secure <str<strong>on</strong>g>you</str<strong>on</strong>g>r public foldersComputers have public folders—such as shared music, pictures, and video locati<strong>on</strong>s—that are easily available to any<strong>on</strong>e <strong>on</strong> the samenetwork. D<strong>on</strong>’t keep anything pers<strong>on</strong>al in those folders. Better yet, <str<strong>on</strong>g>do</str<strong>on</strong>g>n’t have any folders that are designated as sharable.In <strong>Wi</strong>n<str<strong>on</strong>g>do</str<strong>on</strong>g>ws XP, right-click <strong>on</strong> a folder, select Properties > Sharing and Security and make sure Do not share this folder isselected.In <strong>Wi</strong>n<str<strong>on</strong>g>do</str<strong>on</strong>g>ws 7, right-click <strong>on</strong> a folder, highlight Share with and make sure Nobody is selected.Hide sensitive folders<strong>Fi</strong>rewalls and various anti-intrusi<strong>on</strong> software work well, but <str<strong>on</strong>g>you</str<strong>on</strong>g> can also hide <str<strong>on</strong>g>you</str<strong>on</strong>g>r folders. This is not the str<strong>on</strong>gest of securitydefenses, but it <str<strong>on</strong>g>do</str<strong>on</strong>g>es make it that much harder for intruders to readily see sensitive data:Right-click <strong>on</strong> a folderand select Properties.Under the General tab,set the folder’sattributes to Hidden.Decide whether <str<strong>on</strong>g>you</str<strong>on</strong>g> want theHidden status to apply to <strong>on</strong>ly thefolder, or to all folders and filesinside the folder as well (this willappear the first time <str<strong>on</strong>g>you</str<strong>on</strong>g> attemptto hide a folder). Click OK.The folder <str<strong>on</strong>g>should</str<strong>on</strong>g> completelydisappear, effectively invisible. If itturns transparent, <str<strong>on</strong>g>you</str<strong>on</strong>g> haveanother series of steps toperform:<strong>Fi</strong>gure 4: Hiding sensitive folders can make it harder for hackers to see files <strong>on</strong> <str<strong>on</strong>g>you</str<strong>on</strong>g>r machine.Go into <strong>Wi</strong>n<str<strong>on</strong>g>do</str<strong>on</strong>g>ws Explorer’s C<strong>on</strong>trol Panel > Appearance > Folder Opti<strong>on</strong>s > Show hidden files and folders.From here, under Advanced Settings > Hidden files and folders, choose D<strong>on</strong>’t show hidden files, folders or drives and click OK(see <strong>Fi</strong>gure 4).Transparent folders, and all future hidden folders, will turn invisible.3 PUBLIC


IT@<strong>Intel</strong> Technical Tip www.intel.com/itTo restore the viewing of hidden files and folders, repeat the sec<strong>on</strong>d series of steps, but choose Show hidden files, folders and drives.Any hidden folders will appear transparent, as noted above.To restore a transparent folder, right-click again <strong>on</strong> the folder, select Properties and uncheck the Hidden status.Remember that with just a few precauti<strong>on</strong>s, <str<strong>on</strong>g>you</str<strong>on</strong>g> can make c<strong>on</strong>necting away from the office a safer experience.For more straight talk <strong>on</strong> current topics from <strong>Intel</strong>’s IT leaders,visit www.intel.com/it.This paper is for informati<strong>on</strong>al purposes <strong>on</strong>ly. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OFMERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL,SPECIFICATION OR SAMPLE. <strong>Intel</strong> disclaims all liability, including liability for infringement of any proprietary rights, relating to use of informati<strong>on</strong> in this specificati<strong>on</strong>. No license,express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.<strong>Intel</strong>, the <strong>Intel</strong> logo, and other <strong>Intel</strong> products or trademarks are trademarks of <strong>Intel</strong> Corporati<strong>on</strong> in the U.S. and other countries.* Other names and brands may be claimed as the property of others.Copyright © <strong>Intel</strong> Corporati<strong>on</strong>. All rights reserved.Printed in USA Please Recycle 1210/JLG/PDF4 PUBLIC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!