{"id":5654,"date":"2016-09-13T16:57:33","date_gmt":"2016-09-13T19:57:33","guid":{"rendered":"https:\/\/ostec.blog\/generico\/hotspot-seguro-para-empresas"},"modified":"2020-08-27T15:48:12","modified_gmt":"2020-08-27T18:48:12","slug":"secure-hotspot-for-businesses","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/","title":{"rendered":"Secure hotspot for small and medium-sized businesses"},"content":{"rendered":"<p>The internet has transformed people&#8217;s daily life, both professionally and personally. The average connection time of people per day increases each year. This is due to the convergence of environments and businesses to the internet, as well as the increase of access points, in private or public means, or by mobile operators.<\/p>\n<p>Years ago, the internet access was done during their working day, which is because it did not make much sense to have internet at home, or it was still expensive for many citizens. The scenario has changed as more and more people are connected.<\/p>\n<p>One aspect that greatly contributed to the growth of interconnections outside work environments was the Internet being offered, initially as a competitive advantage, in places with greater circulation, such as malls, hospitals, restaurants and others.<\/p>\n<p>The availability of the internet resource in public and private places ceases to be a competitive differential and becomes a standard practice, which brings comfort to visitors and customers and helps in the process of retention and discovery of new opportunities.<\/p>\n<p>The technical term used for Internet access, generally free, offered in public or private places of great circulation is <strong>hotspot<\/strong>. Through these access points, people can take advantage of the internet, using local infrastructure, through wireless connections, for the most part.<\/p>\n<p>Although this movement is a path without a return, and more and more the internet will be offered free of charge in all places, by projects of city halls and the like, one must be very careful, from the perspective of users and suppliers.<\/p>\n<h2>Security for hotspot users<\/h2>\n<p>Public places that offer internet access can be targets of malicious people. Although technology has evolved considerably to the isolation of devices within a wireless network, one must be very cautious when offering the service to users.<\/p>\n<p>The first point to consider is never to use connections that involve great privacy, or even value (monetary or otherwise). That is, do not use this type of access to do banking, or if for you a social network is very important, avoid using these networks. The perception of value here is a very private point, so be careful of what is precious to you.<\/p>\n<p>Another item to consider is that once devices are sharing the same environment (the network, hotspot), care must be taken to not expose them, preventing unauthorized access or exploiting a vulnerability, compromising the device. In this case, not only a certain internet access is intercepted, but also access to every device, taking full control of the equipment.<\/p>\n<p>These items are not necessarily applicable to all hotspot environments, as there are security measures that can be deployed by those who offer this type of service, precisely to minimize potential attacks within these networks. Regardless, since it is not possible to guarantee the technologies employed, it is best to limit the use to items that do not offer users and passwords, such as access to news, entertainment and other websites.<\/p>\n<h2>Security for establishments that offer a hotspot<\/h2>\n<p>From the perspective of the business that offers the <strong>hotspot<\/strong>, there are also items to be checked on the security optics; otherwise, one can have implications over time with inappropriate use of some network user.<\/p>\n<p>It is common that a hotspot does not offer any type of restriction of access to content, and therefore there may be problems associated with consumption of illegal content, illegal actions such as pedophilia, copyright infringement with music and\/or movie downloads, among others.<\/p>\n<p>As the access is offered by the establishment, it is co-responsible, and the identification of the access will indicate that it was done through a given establishment. In case of any need for notification, extra or judicial, the company that made Internet access available, that is, your company, will be notified for the necessary clarifications.<\/p>\n<p>Companies that offer Internet to users, without having mechanisms that guarantee their identification, can receive fines if they are mentioned in lawsuits. Therefore, it is important to have the minimum of control, and know who accesses your network, register these accesses and store them for a certain period, so that they can be retrieved, if necessary.<\/p>\n<p>If your company offers internet access in some way, totally unrestricted to unknown users, without any type of control, no access records, rethink this model.<\/p>\n<p>Since there is possibility of identification users in the network, it brings security to suppliers and people who make use of the resource for legal purposes. Therefore, before offering this type of access, ensure that there is sufficient technology available to ensure the safety of the environment.<\/p>\n<p>Align with your legal staff, or some trusted lawyer, how the accesses will be offered, what kind of terms should be informed to the user, establish the rights and duties of the people who make use of the resource.<\/p>\n<p>To continue reading about the topic, we recommend other associated articles available on the blog: <a href=\"https:\/\/blog.ostec.com.br\/seguranca-perimetro\/o-que-e-hotspot\">What is hotspot, concept and terminology<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet has transformed people&#8217;s daily life, both professionally and personally. The average connection time of people per day increases each year. This is due to the convergence of environments and businesses to the internet, as well as the increase of access points, in private or public means, or by mobile operators. Years ago, the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12831,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984,992,411,1002],"tags":[1560,1561],"class_list":["post-5654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-learning-and-discovery","category-perimeter","category-wifi-access-management","tag-hotspot-en","tag-hotspot-seguro-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Secure hotspot for small and medium-sized businesses - OSTEC Blog<\/title>\n<meta name=\"description\" content=\"Know the main security items that should be taken into consideration before offering internet to visitors and customers through hotspot.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure hotspot for small and medium-sized businesses - OSTEC Blog\" \/>\n<meta property=\"og:description\" content=\"Know the main security items that should be taken into consideration before offering internet to visitors and customers through hotspot.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-13T19:57:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-27T18:48:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/09\/M\u00e3os-femininas.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Labbo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/\"},\"author\":{\"name\":\"Labbo\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\"},\"headline\":\"Secure hotspot for small and medium-sized businesses\",\"datePublished\":\"2016-09-13T19:57:33+00:00\",\"dateModified\":\"2020-08-27T18:48:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/\"},\"wordCount\":827,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/09\/M\u00e3os-femininas.jpg\",\"keywords\":[\"hotspot\",\"hotspot seguro\"],\"articleSection\":[\"General\",\"Learning and discovery\",\"Perimeter\",\"Wifi access management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/\",\"url\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/\",\"name\":\"Secure hotspot for small and medium-sized businesses - OSTEC Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/09\/M\u00e3os-femininas.jpg\",\"datePublished\":\"2016-09-13T19:57:33+00:00\",\"dateModified\":\"2020-08-27T18:48:12+00:00\",\"description\":\"Know the main security items that should be taken into consideration before offering internet to visitors and customers through hotspot.\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/09\/M\u00e3os-femininas.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/09\/M\u00e3os-femininas.jpg\",\"width\":928,\"height\":534,\"caption\":\"M\u00e3os femininas usando rel\u00f3gio no pulso e grande anel na m\u00e3o direita, digitando em notebook\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure hotspot for small and medium-sized businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\",\"name\":\"Labbo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"caption\":\"Labbo\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/labbo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure hotspot for small and medium-sized businesses - OSTEC Blog","description":"Know the main security items that should be taken into consideration before offering internet to visitors and customers through hotspot.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/","og_locale":"en_US","og_type":"article","og_title":"Secure hotspot for small and medium-sized businesses - OSTEC Blog","og_description":"Know the main security items that should be taken into consideration before offering internet to visitors and customers through hotspot.","og_url":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2016-09-13T19:57:33+00:00","article_modified_time":"2020-08-27T18:48:12+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/09\/M\u00e3os-femininas.jpg","type":"image\/jpeg"}],"author":"Labbo","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/"},"author":{"name":"Labbo","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f"},"headline":"Secure hotspot for small and medium-sized businesses","datePublished":"2016-09-13T19:57:33+00:00","dateModified":"2020-08-27T18:48:12+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/"},"wordCount":827,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/09\/M\u00e3os-femininas.jpg","keywords":["hotspot","hotspot seguro"],"articleSection":["General","Learning and discovery","Perimeter","Wifi access management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/","url":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/","name":"Secure hotspot for small and medium-sized businesses - OSTEC Blog","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/09\/M\u00e3os-femininas.jpg","datePublished":"2016-09-13T19:57:33+00:00","dateModified":"2020-08-27T18:48:12+00:00","description":"Know the main security items that should be taken into consideration before offering internet to visitors and customers through hotspot.","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/09\/M\u00e3os-femininas.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/09\/M\u00e3os-femininas.jpg","width":928,"height":534,"caption":"M\u00e3os femininas usando rel\u00f3gio no pulso e grande anel na m\u00e3o direita, digitando em notebook"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/perimeter\/secure-hotspot-for-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Secure hotspot for small and medium-sized businesses"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f","name":"Labbo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","caption":"Labbo"},"url":"https:\/\/ostec.blog\/en\/author\/labbo\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=5654"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5654\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/12831"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=5654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=5654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=5654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}