Skip to main content
GCU Logo Mobile
Apply NowRequest Info
  • GCU Login
GCU LoginRequest Info
Grand Canyon University logo in bold purple uppercase text on a white background
  • Degree Programs
    • Areas of Study
      • Business
      • Teaching
      • Language
      • Counseling
      • Psychology
      • Healthcare
      • Nursing
      • Criminal Justice
      • Legal Studies
      • Engineering
      • Science
      • Technology
      • Theology
      • Ministry
      • Digital Arts
      • Digital Media
      • Fine Arts
    • Locations
      • Campus
      • Online
      • Evening
    • Degree Level
      • Bachelor's
      • Master's
      • Doctoral
      • Certificates
      • Bridge
      • Post-Master's
    • Other Course Options
      • Minors
      • Individual Courses
      • High School Dual Enrollment
      • Current Teacher Continuing Education
      All Majors & Programs
      All Majors & Programs
  • Academics
    • Colleges
      • Doctoral
      • Arts & Media
      • Business
      • Education
      • Engineering & Technology
      • Humanities & Social Sciences
      • Natural Sciences
      • Nursing & Health Care
      • Theology
      • Honors
    • More About GCU
      • Academic Catalog & Policies
      • University Accreditation & Regulation
      • Educational Alliances
      • Faculty Directory
      • Office of Assessment
      • Provost Message
      Academics
      Academics
  • Admissions
    • Admissions
      • Admission Requirements
      • Visit Campus
      • Undergraduate Admissions
      • College Transfer Center
      • Graduate & Doctoral Admissions
      • Campus Resources
      Admissions
      Admissions
  • Tuition & Financial Aid
    • Tuition
      • Online & Evening
      • On-Campus
      • Housing & Meal Costs
      • Other Fees
      • Cost of Attendance
    • Financial Aid
      • FAFSA
      • Scholarships & Grants
      • Student Loans
      Tuition & Financial Aid
      Tuition & Financial Aid
  • Why GCU
    • Student Journey
      • Online Learning
      • Campus Life
      • Evening Classes
      • Hybrid Learning
      • Military & Veteran
      • ROTC
      • International Students
      • Native American
    • Our Story
      • University Spirit & Traditions
      • Christian Identity & Mission
      • History & Campus Growth
      • Community Outreach
    • About
      • Leadership Team
      • Campus Locations
      • Blog
      • Offices
      • Contact
      • Media & Branding
      Why GCU
      Why GCU
Apply NowRequest Info

Read time 5 minutes

Published on Jul 14, 2017


In This Article
  • Overview
In This Article
Overview
Tags
STEM in Focus
Related Resources

Online Degrees
Admission
Scholarships & Grants
Transfer Center
Unlock Your Potential

Speak with a University Counselor today.

Apply Now
Related Articles In
Engineering & Technology
Instructor observes two students wearing headsets and working on computers in a dark room, focusing on game design and game development projects.

Game Designer vs. Game Developer: Which Path Is Right for You?

Learn the key differences in game designer vs. game developer roles — from creativity to coding — and find out which career path best fits your skills and goals.

10/28/2025

|

4 min read

Student operates drill press in workshop while others work with machinery, illustrating hands-on learning in mechanical engineering technology.

Mechanical Engineering vs. Mechanical Engineering Technology

Explore the key differences between mechanical engineering vs. mechanical engineering technology degrees. Discover which program may be right for you at GCU.

10/27/2025

|

5 min read

Professional working on AI code at dual-monitor setup in modern office, highlighting tech skills and career opportunities in artificial intelligence.

Exploring AI Careers: Turning Advanced Skills Into Practical Impact

Discover how to equip yourself to lead the AI-driven future with technical skills and practical impact across industries like healthcare, finance, law, retail and cybersecurity.

10/20/2025

|

7 min read

The views and opinions expressed in this article are those of the author’s and do not necessarily reflect the official policy or position of Grand Canyon University. Any sources cited were accurate as of the publish date.

We're here to help.

I'm Ready to ApplyI Need More Information
GCU Logo White
1-855-GCU-LOPELive Chat
3300 West Camelback Road  - 
Phoenix, AZ 85017
Grand Canyon University © 2025
All Rights Reserved
  • Majors & Programs
  • Admission
  • Financial Resources
  • Academic Calendar
  • Academic Catalog & Policies
  • Online Learning
  • Why GCU
  • Contact Us
  • Careers
  • Title IX
  • Media & Licensing
  • Consumer Information
  • Financial Disclosures
  • Privacy Policy
  • Cost of Attendance
Find Your Purpose Logo
Video from GCU
FacebookTwitter/XLinkedInInstagramYouTube
  • Current Students
    |
  • Alumni
    |
  • Athletics
    |
  • Arena
    |
  • GCU News
    |
  • Lope Shops
    |
  • GCBC
    |
  • Canyon Promotions
    |
  • Lope House
    |
  • GCU Golf

Privacy / Cookie Disclaimer: Our site uses cookies to personalize content, to provide social media features/ads and to analyze site traffic. We share information about your use of this site with our social media, advertising and analytics teams who may combine it with other information that you’ve provided to them. By continuing to navigate this site you are consenting to the collection of information via our use of cookies. For more information on our cookie collection and use please visit our Privacy Policy.

Share This Story
FacebookTwitter/XLinkedInShare via Email

  1. Home/
  2. Blog/
  3. Engineering & Technology/
  4. Free Wireless Networks: How To Protect Yourself

Free Wireless Networks: How to Protect Yourself

free wifi sign on door
Start your GCU
journey today.
Step 1: Educational Interests
This helps us connect you with the right enrollment counselor to help you through the process.
Make a selection
Select One
Bachelor's
Master's
Doctoral
Bridge
Make a selection
First select a degree level
Make a selection
First select a degree level and how you would like to attend
Make a selection
First select degree level, modality, and area of interest
Make a selection
Select One
Yes
No
Make a selection
Select One
Yes
No
Make a selection
Select One
Yes
No
West Valley (Phoenix, AZ) ABSN
Select One
Albuquerque, NM ABSN
Boise (Meridian, ID) ABSN
Denver (Englewood, CO) ABSN
East Valley (Chandler, AZ) ABSN
Las Vegas (Henderson, NV) ABSN
Miramar (Miami, FL) ABSN
Orlando (Lake Mary, FL) ABSN
Salt Lake (Sandy, UT) ABSN
St. Louis, MO ABSN
Sun City, AZ ABSN
Tucson, AZ ABSN
West Valley (Phoenix, AZ) ABSN
Make a selection
Select One
Still in High School
High School Diploma or GED
Some College
Associate Degree or over 60 credits
Bachelor's Degree
Master's Degree or Higher
Bachelor's with Cert. & Experience
BS in Nursing
Make a selection
Select One
2029
2028
2027
2026
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
1959
1958
1957
1956
1955
1954
1953
1952
1951
1950
1949
1948
1947
1946
1945
1944
1943
1942
1941
1940
1939
1938
1937
1936
1935
U.S. Citizen
U.S. Citizen
Non-U.S. Citizen
No military affiliation
Make a selection
No military affiliation
Active
Spouse
Retired
Veteran
United States
United States
Afghanistan
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua And Barbuda
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Canada
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (keeling) Islands
Colombia
Comoros
Congo
Congo, The Democratic Republic Of The
Cook Islands
Costa Rica
Cote D'ivoire
Croatia
Cuba
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guinea
Guinea-bissau
Guyana
Haiti
Heard Island And Mcdonald Islands
Holy See (vatican City State)
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran, Islamic Republic Of
Iraq
Ireland
Israel
Italy
Jamaica
Japan
Jordan
Kazakstan
Kenya
Kiribati
Korea, Democratic People's Republic Of
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libyan Arab Jamahiriya
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia, The Former Yugoslav Republic Of
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestinian Territory, Occupied
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Helena
Saint Kitts And Nevis
Saint Lucia
Saint Pierre And Miquelon
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia And The South Sandwich Islands
Spain
Sri Lanka
Sudan
Suriname
Svalbard And Jan Mayen
Swaziland
Sweden
Switzerland
Syrian Arab Republic
Taiwan, Province Of China
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United Kingdom
United States
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands, British
Virgin Islands, U.s.
Wallis And Futuna
Western Sahara
Yemen
Zambia
Zimbabwe

By clicking submit, you give GCU consent to use automated technology to call and text you regarding educational services. Your consent is not required to receive educational services. GCU will never sell your information. By submitting this form, you agree to GCU's privacy policy.

Free WiFi networks have seen an explosive growth in recent years. You can find them at your local coffee shop, restaurants and even college campuses. All your personal electronic devices have built-in wireless interfaces and they are eager to make the connection. But, is free really free? Ask the question: Who is sharing the network with you?

As a consumer of these networks, what has this explosive growth meant to you? Well in the good old days, I would secure the information on my computer or network by isolation, not allowing outside access. As free wireless networks become more popular, we extended our networks and, of course, add additional risks. You can see where I am going with this: New technologies are expanding the boundaries of our networks, introducing new threats. Wireless devices open our networks to anyone within its range. If a cyber bad guy wanted to access your network, using wireless, all they would need to do is sit in the parking lot and connect to the same free WiFi that you are. They don’t need to be next to you sipping a latte or look like a creepy hacker person lurking in the corner.

So, what do I have to lose? You might think your information is not worth anything to the cyber bad guy. The fastest growing crime in America today is identity theft. “The 2017 Identity Fraud Study, released by Javelin Strategy & Research, found that $16 billion was stolen from 15.4 million U.S. consumers in 2016, compared with $15.3 billion and 13.1 million victims a year earlier. In the past six years, identity thieves have stolen over $107 billion.” (Javelin, 2017)

Most computer users keep a wealth of personal information on their systems, from bank accounts and credit card information to resumes and social media accounts. Each one of these makes your computer a target to would be thieves. You are also giving away your username and passwords, bank account information, browsing habits – the list of personal information goes on.

Wireless security depends heavily on securing the access point using authentication and encryption. For example, using WiFi Protected Access (WPA2), this standard is used by a majority of access points and wireless clients. Free wireless access points are open so this protective measure is not utilized. Everything that you transmit from your wireless device to the access point is in the open. You can rely on server side security such as Transport Layer Security (TLS) that is used on most websites that utilizes HTTPS. You can tell if the site supports HTTPS by looking for the green lock in the upper left corner of your web browser’s address bar.

When you connect to a free access point or any access point for that matter, you discover it by using the access point’s Service Set Identifier (SSID). This is the name of the access point that your operating system displays. Here at Grand Canyon University, our open WiFi network is called “LOPES.”

But, what happens when the cyber bad guy impersonates a normal access point by deploying a rogue access point? Rogue access points are frequently used by attackers to activate what is known as a ‘man in the middle’ attack and to begin eavesdropping on or “sniffing” traffic. You have no way of knowing if the access point is official or rogue. The cyber bad guy is going to use an SSID that makes sense for the location such as “StarCups” at the coffee shop. They will not use an SSID of “Hacker Net” for obvious reasons.

At the Rio Olympics in 2016, security experts discovered rogue access points not only at the Olympics, but also at the airport and major resort hotels. Each of these rogue wireless networks was prime real estate for stealing tourist personal information that can be used for identity theft. More recently, the 2017 RSA Security Conference attendees fell victim to rogue access points with common names like Starbucks. You cannot easily tell that you have fallen victim to a rogue access point, so it is always better to assume that someone is eavesdropping on your wireless communication.

I think I have made my point – free WiFi is convenient but risky! It’s not all bad. You can practice safe computing. If you need to use public WiFi networks, avoid logging into your private accounts. Your best bet is to only access public info such as news sites and Google. For more sensitive information, use your smartphone’s 4G cellular network.

Another solution is to encrypt your wireless communication using a Virtual Private Network (VPN) service. There are many that are freely available, but I prefer a paid VPN service. The one that I use is Private Internet Access (PIA) – they offer anonymous high-speed VPN service at a low cost. VPNs can secure your data and ensure your privacy at all times, not when just using free WiFi.

While I focused on only one wireless attack and a typical solution to reduce risk, there are other attacks the cyber bad guy can use when you share a network with them. Follow standard security practices at all times: Patch often, use anti-malware, turn on the firewall and use strong passwords on everything. The next time you connect to a free (public) access point, ask yourself, “What am I giving to the cyber bad guy?”

The College of Science, Engineering and Technology helps students prepare for dynamic careers in high-demand fields. Visit our website or click the Request More Information button on this page to learn more.

References:

  • Javelin, (2017, February) Identity Fraud Hits Record High, retrieved from javelinstrategy.com/press-release/identity-fraud-hits-record-high-154-million-us-victims-2016-16-percent-according-new
  • Private Internet Access (PIA), VPN Service, retrieved from privateinternetaccess.com

More About Al:

Al Kelly is proud of a distinguished 20-year career in the U.S. Air Force, where he worked as a jet engine mechanic on various aircraft, in field training as a master aircraft trainer and as a security officer. After retirement, Al worked for a privately owned computer training company in Las Vegas and moved on to head the IT office of the largest title escrow company in Nevada. Afterward, he returned to the aircraft training field, working for McDonnell Douglas Aircraft Company and later Boeing in the Middle East. In 2001, Al spent over 13 years in Arizona teaching IT and security programs as a professor at UAT. His education includes a BS from Embry Riddle University, an AS from the Community College of the Air Force and an MCIS from the University of Phoenix.