Laptop wireless security refresher

Critical laptops need careful connections

Let's recap: during my first Laptop Safety Seminar in Indianapolis on April 23, I was surprised at how many questions from the audience concerned basic laptop wireless security. People love laptops and love wireless connections, but don't love the extra security steps required so too often just avoid them. Not a good plan.

Now that 65 per cent of new computers bought are laptops, and almost all of them include wireless networking right out of the box, those extra security steps are critical.

Microsoft built peer-to-peer networking into all versions of Windows as far back as Windows 3.1 for Networks (my copy dredged up from the Gaskin Lab archives is dated 1992). Many small businesses and home networks rely on this peer-to-peer network protocol to exchange files between systems quickly and easily. Right click on a folder, click Properties at the bottom of the context menu that appears, and Sharing is the second tab on the page that opens. Two clicks later, or a couple more if you have to poke holes in your firewall, and the folder can be accessed by anyone. Every folder icon with a little hand under it is shared in this manner, even over wireless networks.

Windows 2000 allowed access to these files using the Guest login with no password by default. Windows XP makes it a little more difficult, but users routinely set up the Guest account with an easy password. I bet half of them use the password "guest." Username "guest" with password "guest" violates every security policy every written by a security expert.

People don't understand that a public Wi-Fi network is just one local network, where every device is visible to every other device. This works the same way as a small business network with all computers plugged into the same router. While this arrangement makes sharing resources like network printers and shared PC drives simple, an advantage in a safe office environment, the same arrangement is completely insecure on a public Wi-Fi network.

Consider wireless hackers waiting for unwary prey in areas offering free Wi-Fi just like any other criminal: there aren't that many, but if you get unlucky you stand to lose quite a bit. Muggers may only take your wallet and watch, but wireless hackers can empty your bank account before you know you've been wirelessly mugged.

Exercise caution on two fronts. First, find the official Wi-Fi connection offered by the host location, whether it's a local coffee shop or a remote airport. Second, be smart about your online activities.

When you open your wireless utility and scan for networks, you may see one or a dozen. First, and most important, rule is to notice whether those networks are labeled "ad-hoc" or "infrastructure" or maybe "access point." Never connect to an ad-hoc network, because those are usually other laptops run by hackers trying to gain access to your system.

Second, look for the Service Set Identifier (SSID) for the company providing your free Wi-Fi connection. They may hand you a card with the details, like at hotels, or they may assume you'll know "Coffee By Bob" is the network name to pick when you're sitting inside Coffee By Bob the coffeehouse. Choosing other names will only lead you to trouble.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

James E. Gaskin

Network World
Show Comments

Cool Tech

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Breitling Superocean Heritage Chronographe 44

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?