WiFi Security

Be cautious of public WiFi

image of a wifi symbolWhen using a public WiFi, ensure you connect to a genuine access point and be cautious about what sites you are accessing. Utilize the WSU VPN when at locations with public WiFi.  This will provide you a secure connection to the WSU network to conduct your Internet traffic through. 

Instructions for the WSU VPN are located at: https://www.weber.edu/softwaredownloads/vpn.html

Tips & Tricks While Using Public Wi-Fi

image of a cell phone with a security shield next to it.

  • Banking Online – If you can avoid doing things like online banking or shopping you should.  Unless you are on a secure Wi-Fi your account numbers, credit cards or log-in information could be at stake! If you can’t avoid it ensure you are using the WSU VPN to secure your connection. VPN stands for Virtual Private Network and it is required if you are using a mobile device for work.  Please review the WSU policies on Mobile Device usage.  
  • Antivirus Software and Firewall – installed on your mobile devices. Check your mobile device it may have these applications installed already.  If you are not sure go to your dealer and discuss security measures with them.  There are sites you can visit to learn more about this, but some of the top mobile security applications have been reviewed by PC magazines so go visit Norton, AVG, McAfee and others for more information.  Also, if you have Comcast cable they may provide free antivirus software you can download for your devices.  With mobile malware on the rise security software is no longer optional. Research and install the right App for your needs.  
  • Keep your Operating System up-to-date – Always keep your system up-to-date with the latest security updates and patches available. Patch everything. 

image of a cell phone with a security shield next to it.

  • Two-Factor Authentication –  We encourage you to use two-factor authentication.  If you are an employee of WSU you are able to get DUO for your work accounts, but for your personal accounts go to Google and learn how to enable Two-Factor Authentication.  This means you’ll have a code sent to you via email or text if you’re logging in from an unrecognized IP address (you can do this for your email and social accounts). Check with your bank to see if they do Two-Factor Authentication and enable it before you bank online. 
  • Browsing Habits – When browsing or entering information on sensitive sites, do your best to visit websites that start with “Https”. Check your URL to make sure the secure site is being used especially if you are entering personal information. Secure your browser before you go online.  
  • Turn off File Sharing, Network Discovery, and Public Folder Sharing, in case they aren’t already OFF. Usually, by simply choosing that you are connecting on a Public network, these options are automatically turned off but you can check your settings in your Windows Control Panel>Network and Sharing Center>Change Advanced Sharing Settings>Public. Public wireless networks are not subjects to high levels of security and are favorite places for hackers and malicious software.


-Online Security-

If you travel alot there are alternatives when using an unsecure public Wi-Fi

  • Regular travelers often find themselves at coffee shops surfing the internet, we recommend a personal Wi-Fi hotspot. A personal portable router not only transforms a public Wi-Fi into your own personal Wi-Fi hotspot, but you add the bonus of setting  up WPA encryption just as you would any other router.  
  • Why would you want your own router in a local coffee shop?  Two Words: FIREWALL FEATURES! With a firewall you do not have to worry as much about your information being compromised while browing the internet.  If you are a frequent traveler, this maybe a good investment.  There are several personal routers you can buy.  Here is a link to 'portable router wifi google search' to help you shop for one.  We make no warranties or recommendations on what to buy.  You will need to do some research with your mobile service provider and see what your device can handle.  

Information is provided herein to assist you with security awareness.  Standards and recommendations included may change and information provided may not always reflect the most current recommendations or standards.  Please consult with service providers and conduct your own research to become aware of current best practices and products to use.  No warranties, promises, or guarantees are intended or may be implied.

If you have questions please contact: