
Discussion on Information Security Awareness During Cybersecurity Week
Wi-Fi Security
01
Phishing Wi-Fi
Risk Analysis
In public places such as restaurants, shopping malls, train stations, and airports, free Wi-Fi hotspots are often deployed. However, attackers may create deceptive Wi-Fi hotspots. Once connected to these malicious hotspots, users may face risks such as information leakage and traffic hijacking.
Security Recommendations
Before connecting to Wi-Fi in public places, pay attention to surrounding prompts and connect to networks provided by official sources. Avoid using public networks when handling sensitive information or making mobile payments; it is best to use the built-in 4G/5G network.
02
Unauthorized Wi-Fi Hotspots
Risk Analysis
Wi-Fi signals have a certain coverage range, allowing connections not only within the workplace but also nearby. Employees often set up unauthorized Wi-Fi networks with weak encryption methods. If compromised, this poses a risk of attackers directly accessing the office network.
Security Recommendations
In the workplace, use the network access methods provided by the organization. Do not set up personal hotspots or use devices like “Wi-Fi routers” without approval. If necessary, ensure that the router setup is approved by the organization and undergoes a security check. Wi-Fi should use secure algorithms, complex passwords, and ensure passwords are changed regularly.
03
Wi-Fi Password Sharing
Risk Analysis
Some Wi-Fi password sharing apps automatically upload all previously connected Wi-Fi passwords upon installation, which may include passwords for home and workplace networks. If attackers use such tools, they can easily connect to home or office networks.
Security Recommendations
Avoid using Wi-Fi password sharing apps; if necessary, it is recommended to disable the automatic password upload feature first.
04
Wi-Fi Information Collection
Risk Analysis
Currently, some advertising companies deploy “Wi-Fi probes” in public places. When users enable Wi-Fi on their phones, the probe can automatically detect the phone’s MAC address, RSSI value, and other information, thus tracking user behavior. If this information is matched with the company’s own data or third-party data, it may be linked to the user’s device ID and phone number, leading to targeted marketing promotions.
Security Recommendations
When Wi-Fi and Bluetooth are not needed, turn off the Wi-Fi and Bluetooth functions on your phone; use mobile security software to intercept potential marketing calls based on records stored in the database.

Source: National Confidentiality Bureau website, Shandong CDC
【Disclaimer: We are committed to public welfare promotion with no commercial purpose. We respect originality and emphasize sharing. Copyright belongs to the original author. If your rights are infringed upon while using this information, please contact us promptly, and we will delete it within 24 hours.】
Looking forward to your
sharing
likes
views