Using Public Wi-Fi with Virtual Private Networking

Whether you’re leisurely browsing the headlines at your local coffee shop or catching up on emails while you wait for your flight to board, just about everybody likes taking advantage of public Wi-Fi hotspots. But did you know that if you don’t take precautions, just about everything you do on a public network is visible to snoopers? This includes viewing webpages over an unencrypted connection, sending emails in plain text, and maybe even your passwords. Traffic between your computer and websites that use secure connections (look for “https” instead of “http” in the URL) is much more difficult for prying eyes to view. Many popular sites such as Facebook, Gmail, Yahoo!, and Microsoft Live use this method to keep your login credentials secure.

global networkBut what if you need to access your work computer or server remotely? This is where virtual private networking (VPN) comes into play. VPN creates a secure “tunnel” that connects your laptop to your company’s private network. All information that passes through this connection is encrypted, meaning that even if someone were to capture the data as it travels, it would appear to them as gibberish.

VPN treats your portable device as a physical node on your company’s in-house network, even though it’s in a different geographic location (hence the “virtual” in VPN). This gives you access to files on the server, company databases, and possibly even printers. If your VPN service includes remote desktop capabilities, you’re able to run applications on your work computer just as if you’re physically sitting at your desk. VPN technology is quite user-friendly and provides a relatively high level of security. It’s a “Must Have” if you ever access your company’s network remotely, even from home.

Back to Blog


Related Posts

15 Quick Keyboard Shortcuts to Supercharge Your Use of Microsoft Office

In late 2013 and early 2014, CMIT Solutions covered 10 tricks, tips,…

Read More

Personal Data at Risk if You Don’t Wipe Your Old Mobile Device

Over the last 12 months, the four largest mobile carriers in the…

Read More

Who Can You Trust with Your Information? Recent Poll Says Not Many Institutions

No technology trend has been more ubiquitous lately than online security (or…

Read More