Tagged: vpns

The Three Legs of Protection: Antivirus Software, Firewalls, and VPNs

We’ve all heard about antivirus software and firewalls. But we probably don’t know as much about the third leg of computer protection: a VPN, or virtual private network. In his latest article, company CEO Kent Lawson says we do this at our peril, because the damage we can suffer from not using a VPN may far outweigh the risks of the other two combined. After the large-scale hack attacks over the past few years, VPNs are now earning their spot as the third security leg that is vital to every-day computer security.

New Hotel WiFi Vulnerability

Earlier this year, the FTC declared a critical announcement for travelers: hotel WiFi is dangerous. Many people assume that because they are paying for it the network must be safe, but that is a dangerous assumption. Hotel WiFi networks are completely insecure; the bad news is that a new exposure in hotel WiFi has just been found. Read more to find out how you can keep yourself protected.

Managing BYOD Security Threats: VPNs Mitigate The Risks

It’s clear that the era of BYOD is here to stay. Workers are no longer confined to an office desk and computer, and instead are able to do work from anywhere: home, their local coffee shop, and while taking public transportation. The proliferation of public wireless networks has made this possible, and while this has freed employees up to do work from nearly everywhere, it also has introduced many security challenges.

Identity Protection: 5 Tips to Stay Mobile Secure in 2015

Living a mobile lifestyle does not come without risk, especially where your identity is concerned. But staying mobile secure doesn’t have to be complicated. Consider this: 94.2% of identity victims say they are still highly engaged online and via their mobile devices despite having had their personally identifiable information stolen, according to a recent study from The Identity Theft Resource Center.

So how do we stay safe? Just follow these five tips!

Don’t Give Your Data Away: Blur Your Passwords, Payments, and Privacy

Now is the time to make your online activity a blur. Why? Here are some startling reasons: In the last 18 month, over 157 million US credit card holders have been notified of a breach. Furthermore, the typical web surfer is tracked by 11 companies at each site they visit – resulting in over 2,500 unique tracking and data collection attempts weekly. This is the new reality of the Internet in 2014 – and as 2015 approaches, the treat level will only increase.

Holiday Shopping Goes Mobile: Be Cyber Secure [INFOGRAPHIC]

As the holiday shopping bustle approaches, don’t just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important!

This year PRIVATE WiFi has teamed up with the National Cyber Security Alliance to help consumers be safe online when using their mobile devices are they shop. Check out our infographic learn more about the the threats of holiday shopping on the go and follow our five tips for cyber secure shopping.

WiFi Footprint: Personal VPNs Endorsed as WiFi Hotspots and Autoconnect Functionality Proliferate

“WiFi footprint” is a simple term for a complex issue: the exploding pace of WiFi hotspot creation is not abating and soon a roamable, global alternative network will become our reality.

In a world seemingly saturated in WiFi, the notion of autoconnecting to these networks might seem appealing. However, whether using a laptop or mobile device, security threats remain a constant.

Experian Survey: We Understand WiFi Dangers but Don’t Protect Ourselves from Identity Theft

October is National Cyber Security Awareness Month, and in part to raise public awareness of the dangers of identity theft, Experian, a global information services company, has published a new survey regarding U.S. attitudes toward this serious problem. Check out the results — including why so many people still fail to take actions to protect themselves online.

Are Phone Calls Over WiFi Hotspots Safe from Hackers?

You might have heard that the new iPhone 6 supports making phone calls over WiFi networks. Using WiFi networks to make calls is the next big thing for mobile phones.

But how safe is it to make phone calls using public WiFi hotspots? Are your calls being encrypted? And should you take any steps to protect yourself from WiFi hackers? Read on to find out more.

How Hackers Protect Themselves When Using Public WiFi

Every year, thousands of hackers and security experts descend on Las Vegas for two of the world’s largest annual hacker conventions: Defcon and Black Hat. Security researchers present their latest findings and security exploits.

Keep reading to find out what types of hacking they are doing at these events and ways to protect yourself!