The PRIVATE WiFi Blog

Search By Topic:

Popular Topics:



PRIVATE WiFi

The PRIVATE WiFi Blog

Thought Leadership | Feb 2nd, 2011

Information Security: Who’s Looking Over Your Shoulder?

Karen Barney

Have you been in an airport lately and noticed the large number of travelers using their laptops, tablets or mobile phones? While some people travel for leisure to escape always being “connected”, there are others who find it necessary to stay in touch. We’ve all encountered them: the businessman with the laptop, the real estate agent updating her contacts, and the self-centered individual that’s making reservations with a credit card over the phone.

computer privacy

Unfortunately, this kind of behavior leaves the traveler vulnerable to “shoulder surfing” techniques frequently used by identity thieves in this kind of overcrowded, and often-times chaotic, environment. Our friends at Wikipedia define shoulder surfing as: using direct observation techniques, such as looking over someone's shoulder, to get information. Shoulder surfing is particularly effective in crowded places because it is relatively easy to observe someone as they:

  • fill out a form
  • enter their PIN at an automated teller machine or a POS terminal
  • use a calling card at a public pay phone
  • enter passwords at a cybercafe, public and university libraries, or airport kiosks
  • enter a code for a rented locker in a public place such as a swimming pool or airport.

Let’s add to that the following opportunities which can also be easily exploited by a “shoulder surfer”:

  • Entering personal information on your laptop while sitting next to a stranger. Are you aware of where that stranger’s attention is being focused?
  • Entering credit card information on your hand-held tablet while the person in line next to you shoots video from his phone. Is that camera aimed in your direction?
  • Confirming your hotel reservation with credit card information while talking on your cell phone. Can your conversation be overheard?

OK, so what is a traveler to do when they find themselves in this kind of frenzied environment?

  • Find a quiet spot along the outer fringes of the waiting area.
  • Locate an area where you can sit or stand with your back to the wall.
  • Be aware of your surroundings at all times, not just people but also video cameras that might be taking video of your actions.
  • Invest in some type of security screen or filter to obscure the visibility of your monitor.
  • Never verbalize passwords or security codes.

The best tip, however, is to not engage in personal, business or financial matters while in this type of situation.

Associated Topics:

Associated Topics:

Comments

Related Posts

Cyber Security Training Just As Important at C-Level

Thought Leadership
Eva Velasquez | Mar 24th, 2015

The need for better online safety training to prevent data breaches is a hot topic right now. Coupled with stronger computer and network policies, companies want to prevent the hacking events that leave businesses susceptible to a data breach. While it’s no secret that employees in both the private sector and government service can unintentionally expose organizations to hackers, what is surprising is a report by Wombat Security that shows that 33% of CEOs fell for phishing attacks that led to network access. Why are they falling for this kind of internet activity? Read More

E-filing: The Fastest and Safest Way to File Taxes?

Thought Leadership
Eva Velasquez | Mar 9th, 2015

E-filing your annual return to the IRS offers speed and convenience and when coupled with industry-approved software that can plug in the values for you, a lot of the headaches traditionally associated with doing your taxes are eliminated. However, there are some potential dangers that you should be aware of, such as insecure public WiFi networks and online tax fraud. Read More

FTC Says Hotel WiFi is Dangerous

Thought Leadership
Kent Lawson | Feb 23rd, 2015

Recently, the FTC posted an article on their website stating that hotel WiFi is dangerous and that users should not assume that just because they pay for Internet access that their connection is secure.

We couldn’t agree more. In fact, I have been stating this fact since we launched PRIVATE WiFi nearly five years ago.  This is an important topic because hotel traveler’s rank WiFi access at hotels as the number one amenity that they look for when booking hotel rooms. Read More

Managing BYOD Security Threats: VPNs Mitigate The Risks

Thought Leadership
Kent Lawson | Jan 28th, 2015

It’s clear that the era of BYOD is here to stay. Workers are no longer confined to an office desk and computer, and instead are able to do work from anywhere: home, their local coffee shop, and while taking public transportation. The proliferation of public wireless networks has made this possible, and while this has freed employees up to do work from nearly everywhere, it also has introduced many security challenges. Read More

X

Thank you for subscribing to our newsletters

Your email has been added to our system. You will be e-mailed shortly with a request to confirm your membership. Please make sure to click the link in that message to confirm your subscription.