2. Turn off Wi-Fi if you don't use the Internet - Deepstash
2. Turn off Wi-Fi if you don't use the Internet

2. Turn off Wi-Fi if you don't use the Internet

By turning off Wi-Fi, you resolve three issues at once: rapid discharge of your battery, automatic connection to a fraudulent network, and annoying ad emails . For additional protection against the latter, add an extension called DoNotTrackMe to your browser - it won't let the device track your movements.

7 STASHED

MORE IDEAS FROM THEARTICLE

6. Install a good antivirus software

Always use the latest antivirus versions. There are new ways of hacking appearing almost every day, and your antivirus should stay up to date. Besides, antivirus software warns you of possible fake hotspot connections.

6 STASHED

3. Connect Using VPN

VPN, or Virtual Private Network , allows you to stay anonymous while online: websites you enter will see the virtual network IP, not yours.

Such networks, though, are mostly paid, and they slow down your connection. However, the price is usually not that high, and most VPN providers still have free services too. Yeah that's right, check out Windscribe VPN.

7 STASHED

9. Check the website's URL

Fake networks might also redirect you to well-known websites, except those are really only collecting your personal data. If you see any weird characters in a familiar website's URL, it most likely means that this website is not authentic. Google.com and ɢoogle.com aren’t the same thing. Make sure to use a reliable and secure browser because a good browser will detect such differences and warn you.

6 STASHED

1. Don't use Internet banking or type in your bank card details

The only foolproof way to protect yourself from data theft is to use mobile traffic to make online purchases or Internet banking . A few paid megabytes are a reasonable price for your account safety.

6 STASHED

1 LIKE

A network that doesn't require any additional actions to connect is possibly a fraudulent one. To stay on the safe side, choose a hotspot that requires you to enter a code sent as a text message to your phone. This will protect you from criminals duplicating the names of free networks.

6 STASHED

5. Pay attention to the name of the network

Hackers often use networks with names similar to ones already in the vicinity. The only difference is that an authentic hotspot requires payment or authorization/password, while a fake one is free to use. So before connecting to a free network, ask its owner for its name first.

6 STASHED

8. Keep Your Passwords encrypted

Despite it being seemingly obvious that you shouldn't write down your passwords in your devices, many do just that. Such carelessness makes it much easier for criminals to get access to your data. If you'd still like to store passwords on your media device, at least use a password manager that encrypts information in it.

6 STASHED

Most devices will automatically remember and connect to the hotspot they used at least once before. Frauds could create their own access point with the same name and thus get access to your profile data or even, with certain artifice, to your finances.

7 STASHED

Deepstash helps you become inspired, wiser and productive, through bite-sized ideas from the best articles, books and videos out there.

GET THE APP:

RELATED IDEAS

Targeted by cybercriminals

There are many benefits to being a freelancer. But, as a mobile worker, you likely have volumes of client data on your computer, and that information is attractive to cybercriminals.

As a freelancer, you might be targeted by online criminals, so you have to take precautions to avoid a costly data breach.

2 STASHED

Understanding WiFi

Many cities use WiFi to provide free or low-cost internet access to people. WiFi networks are easy to set up, inexpensive and unobtrusive.

 A wireless network uses radio waves, just like cell phones, radios and televisions . 

  • A computer's wireless adapter decodes data into a radio signal and transmits it via an antenna. 
  • The wireless router receives the signal, interprets it, and sends the information to the internet using a wired ethernet connection. 
  • The process also happens in reverse.

8 STASHED

1 LIKE

Protecting the Mobile Phone from Hackers

There's little reprieve for your dedicated smartphone. In case you're similar to numerous experts today, you use it for work, play, and a blend of private concern in the middle. Presently, imagine a scenario in which something turned out badly with that smartphone, similar to misfortune or robbery. More regrettable yet, imagine a scenario where your cell phone got hacked. Let’s try and keep that away from happening to you.

2 STASHED

1 LIKE