Surfing on the Go

(sing song) “Everybody loves surfin’, surfin world wide web. . . “(nod to Surfin USA) and again,(to the tune of “its a small world after all, verse only”) “From a netbook small to a laptop tall, from an ipod Touch to a Nexus phone, just one thing is for sure, that they all let you surf. It’s the Internet for all”

How you surf on these and other mobile devices greatly depends on where you are and what you’re doing when you go online!

For starters, its a good idea NOT to log into any secure sites while using an unprotected wifi connection at your local coffee bar.

Secondly, assuming the connection is secured, always be sure to log out of your secure site before closing your session, no matter which mobile device you are using.

Third, turn off your wifi antennae when finished, so that you aren’t tracked like the person in the last posting.

Fourth, always ensure when on secure sites, that they are using HTTPS. This isn’t fool-proof, but it makes life harder for the casual cyber-snoop to eavesdrop on your banking or facebook information.

If you’re surfing at home, make sure your own wifi is protected behind a SSID, encryption mechanism, and network key! WEP is no longer the best wifi protection. Most wireless network cards can now talk to WPA(2)-Personal or Enterprise using either TKIP or AES encryption. Failure to lock this down could have disastrous affects on not just your surfing habits, but potentially the safety of your entire home network!

Key things to remember with mobile devices, is that
A) You’re out in public, don’t do anything that you don’t want others to know about!
B) Not everyone around you is what they seem. A cybercriminal may be eavesdropping on your connection as we speak.
C) There are steps you can take to stay safe. Just make good and sure you take them!
D) Do NOT leave your mobile device laying around in public or even semi-public places.

A few simple precautions, and you’re off to the races!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.