So, before you take a chance and trust a hotel’s Wi-Fi service, make sure you take these precautionary steps: 1. Set up good defence. Your computer's firewall and a strong antivirus software provide your first line of defence. Your firewall permits or denies traffic to and from your computer, so it’s important to make sure it’s turned on. If you're using Windows, click on the START menu, then click on the control panel. Click on security centre (look for the multi-coloured shield). A green indicator means your firewall is on. If you use a Mac, open System Preferences and click Sharing, then click Firewall. You'll also need to make sure your security software is updated and run daily scans while you’re traveling. If you need a good antivirus go to www.bestav.co.uk 2. Be careful to connect to the correct network. Often, free hotel Wi-Fi requires a password that is provided to you by the hotel upon check-in. make sure you're indeed connecting to the hotel's Wi-Fi and not an Evil Twin, which is a look-alike connection designed to trick you. 3. Avoid file-sharing. Steer clear of file-sharing sites such as Lime Wire and Morpheus, which offer free downloads of software, usually the software has been tampered with which has new hidden features. "Avoid doing things where two computers can talk to each other," File-sharing sites can leave your computer vulnerable to malicious attacks, such as viruses or spyware. 4. Disconnect when not in use. Minimize your risks by disconnecting from the network when you're not actively using the Wi-Fi.
5. Avoid financial transactions. If you can avoid making online purchases or accessing your bank account from the free Wi-Fi connection, it's a good idea. If you must conduct financial business online, make sure the site is protected through "https," a protocol that provides a secure connection. A secure website will have the "https" rather than "http" in the Web address and a lock symbol in the bottom right corner. 6. Use a VPN. If you're traveling for work, ask if your company uses a virtual private network (VPN). A VPN is a computer network that provides employees with remote access to company servers. These networks use data-scrambling technologies which ensure secure access to company data through an Internet connection. In a VPN, your online activity will be encrypted so that the bad guys can't see what you're doing. 7. Change passwords frequently. Malicious types are often "sniffing" or looking for password information over unsecured networks. You might not think it's a big deal if someone grabs your user ID and password for Facebook. After all, the worst they might do is change your status or delete a few friends, right? Don’t be so sure. Many of us have the same passwords and user IDs for many online activities. Too often, we use the same password for Facebook as we do for our online banking. 8. Updates Update your Apple OS or Windows system away from a Public network and make sure you do apply all updates. 9. Images and Documents do not keep copies of Driving licences, passports, HMRC records on the computer as files etc., NEVER name them what they are!
10. Use Two Factor Authentication Two-factor authentication means you need two pieces of information to log into an account: One is something you know and the other is something you have. Most often this takes the form of a password and a code sent to your mobile phone. Many popular websites and services support two-factor authentication. This means that even if someone is able to get your password due to a hole in a public Wi-Fi network, they won’t be able to log into your account. 11. Turn off Sharing You may share your music library, printers or files, or even allow remote login from other computers on your Wi-Fi network in the privacy of your own home. Unless you disable these settings before connecting to a public Wi-Fi network, anyone else in the vicinity may be able to hack into your PC. 12. Don’t forget the Physical Take caution when you are out and about in order to prevent theft and loss of your device. Everything that you have ever browsed, downloaded/ user accounts that are logged in and open will be vulnerable to exposure.