< End-user Computer Security < Main content

End-user Computer Security
Inexpensive security

for   

⦾ individuals
⦾ sole traders
⦾ small businesses

Wireless Communications  /  Chapter 3

If internet connection is hacked, computers will become vulnerable. Although maintaining security on the user's machine will probably mean that security overall will be sufficiently maintained, it is still worthwhile safeguarding against such an event.

Wired vs. wireless

Whenever there is a choice between wired or wireless communication (such as in the case of wired tethering for internet connections), wired communication is likely going to be more secure; it appears that most wireless routers usefully also permit wired ethernet connections.

Shared WiFi

It's best not to use a shared WiFi router at all, if it can be helped; or if it is used, only to use it with a highly secure client-machine set-up. When a router is shared, it can be difficult to convince others about the need to perform certain security tasks, such as the changing of the WiFi password on a regular basis. Essex police’s cyber-security advice as of March 2020, was not to use free WiFi for anything you wouldn’t want a stranger to see.

Keep communication systems turned off

Keeping wireless technologies such as WiFi, Bluetooth, NFC, and infrared ports, disabled when not in use, is a good precautionary security measure.


Chapter 2
Passwords and digital keys

Contents, Index, Foreword

Chapter 4
Digital storage






































This article is issued from Wikibooks. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.