Hotel Guests Surfing Unsafe Networks
Computers & Technology → Site Security
- Author Tino Bruno
- Published December 21, 2008
- Word count 597
Hotel guests travel for various reasons, ranging from business trips to weekend getaways. With the modern tech-era upon us, one of the most requested hotel amenities is an active Internet connection. As guests settle in they use the hotel’s Internet connection to surf the web. What most people fail to notice is that Internet privacy and security offered by a hotel is quite minimal. Guests expect the hotel to be a home away from home and Internet access allows them to be more productive or stay in touch with people back home. While this is a common amenity, most guests fail to realize how unsafe the network connection actually is.
According to researchers many of the Internet connections hotels offer are quite unsafe. Most of the Internet connections offered are not properly secured and leave guests open to many privacy risks. Researchers gathered written information from various hotels and personally visited other properties and the findings were astounding. Roughly 20% of all hotels use simple network hubs to connect guests to the Internet. This means about a fifth of the hotels you have ever stayed at are allowing you to connect to an unsecured network. This means all the packets of data being sent over the network can be seen by other users, allowing them to access your personal data. Ideally, hotels should have security features implemented so only the packets associated with your session should be seen. No other users should have access to the data. This would stop an "interloper" from using a program that saves all packets being sent over the network.
Of the hotels that do offer Internet access, 90% of them offer wireless connections. This adds an extra layer of protection since the router used to get the signal out has built-in security features. Even though a router does offer advanced security features, it still does not mean the user’s personal information is being protected. Man-in-the-middle attacks are still possible, and more than one of every five hotels have reported attacks and malicious activity on their network. Man-in-the-middle attacks allow an attacker’s computer to act as an Internet gateway and intercept all network traffic. Very few hotels using wireless Internet have encryption enabled on their network and researchers found only about 15% of the studied properties thought of going above and beyond their standard router and securing their network! Anyone using a hotel's Internet connection should assume the worst and hope for the best.
Hotel guests should take the responsibility of securing the Internet connection upon themselves. This will take away the mystery of wondering whether the hotel has a secured connection. An anonymous proxy server is arguably the best way to maintain Internet privacy and online safety. Surfing via private proxy servers will secure the Internet connection by encrypting the data being transmitted over the network. The encrypted information remains that way until it reaches its destination, which holds the code to decrypt the message. Aside from packet sniffing, it is possible for someone to track web surfing habits and gain personal information, even on a secured connection. A proxy will prevent this by masking the IP address allowing the user to safely surf from any connection and maintain complete anonymity. A hotel guest has the ability to stay connected with friends, family, and coworkers, even from thousands of miles away, but many fail to see that Internet security should be dealt with preemptively. It is not a matter of being protected by some other entity, but going above and beyond the bare minimum on your own accord to stay safe.
Tino Bruno is the Internet Marketing Specialist for award-winning software developer Privacy Partners. He is an avid proponent of private proxy surfing and anonymous proxy servers, working hard to ensure Privacy Partners is protecting your Internet privacy. Check out Privacy Partners for more information on staying safe and protecting your online activities.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- A Brief Guide: The A-Z of Tailgating Attacks
- Essential Tips for Proofreading and Editing University Assignments
- Stop the Bleeding
- Top 10 Digital Forensics Tools: An In-Depth Exploration
- All You Need To Know To Secure Your Data From Phishing
- Crypto Security Guide: Everything You Need to Know to Protect Your Crypto
- Advancing Email Validation in Laravel
- Fortifying the Digital Fortress: Understanding the Foundations of Cybersecurity Architecture
- How is GenAI Changing Cybersecurity?
- AI-Enhanced Cybersecurity Trends for 2024
- The Game of Trust: A Guide to the Future of KYC in Gaming
- AI in Cybersecurity: The New Frontier in Digital Protection
- Metadata: The Attorney’s Secret Weapon in Civil Litigation
- The importance of cyber security
- 5 Reasons to Comply with CMMC
- Payless CCTV Security Camera
- How Bitdefender Protect From Pegasus Spyware
- Printer Security? Here Are 6 Tips To Keep Your Business Safe
- Why it is important to install Access control system at your business
- Powerful Keyloggers for Windows
- Website security check: Tips on how to protect your website from hackers
- How will cyber threats evolve in 2020?
- When to choose red teaming over penetration testing: A guide to a robust cybersecurity program
- Protect your files with drive image backup software
- How Cloud Management Values Change Your Business
- The U.S. Government and Zero Day Vulnerabilities
- Spyware – Yet Another Cyber Menace
- Reset lost passwords in Windows with Active@ Password Changer
- Antivirus measures you should know when your PC is infected with a virus
- Security Fit For Royalty!