Securing Your Wireless Connections

  This page represents Step Three (of three)
from Mobile Security for Android Devices.

 




Secure your Android wireless connections by performing all of the following procedures:


Wi-Fi

Perform the following procedures to protect your Wi-Fi connections:

  1. Disable auto-join 
  2. Forget unused networks 
  3. Turn off Wi-Fi 

 

To disable auto-join of newly discovered wireless networks

Choose one or more of the following ways to perform this procedure:

See the video.

Search the Settings:  Wi-Fi, Wi-Fi preferences, Connect to open networks

Navigate and disable:  Settings > Network & internet > Wi-Fi > Wi-Fi preferences > Connect to open networks

Recommendations for Wi-Fi

CAUTION:  Connect to campus over Virtual Private Network (VPN). All off-campus students, faculty, and staff must use the NC State VPN when connecting to the non-public campus network. The VPN allows you to protect your data when accessing your computer’s desktop and mapped drives. 2FA is required when using the NC State VPN. Off-campus destinations like NC State Gmail, NC State GSuite, Office 365, general web browsing, and most other destinations are not protected. Make sure off-campus connections are secure by looking for https at the beginning of the link.

 

To forget unused networks

Choose one or more:

See the video.

Search the Settings:  forget, Wi-Fi, networks

Navigate:  Settings > Networks or Connections > Wi-Fi > Networks > Forget 

 

To turn off Wi-Fi

Choose one or more:

See the video.

Search the Settings:  Wi-Fi, networks

Navigate and disable:  Settings > Networks or Connections > Wi-Fi

 


Bluetooth

Perform the following procedures to protect your Bluetooth connections:

  1. Reset PIN or password — When you connect with a Bluetooth device the first time, set a new value for the PIN or password. Otherwise, hackers will take advantage of you for keeping the well-known default values.
  2. Turn off Bluetooth — Turn off Bluetooth as soon as you’re done using it.  Otherwise, the risk of becoming hacked is extremely high.  So, turn it on when you need it and turn it off as soon as you don’t.
  3. Forget old devices — Forget old devices once they are outdated and you no longer have a use for them. Old bluetooth devices have a higher chance of being compromised. 

 

To reset PIN or password

When you connect with a Bluetooth device the first time, set a new value for the PIN or password.  Modern Bluetooth devices generate a random code that you verify on both devices (if they have a screen, that is).  Bluetooth headsets and the like have no screen; so, they have no means to prompt you for a code. In some cases with older devices, it was possible to set your own code.

 

To turn off Bluetooth

Choose one or more of the following ways to perform this procedure:

See the video.

Search the Settings:  Bluetooth  

Navigate and disable:  Settings > Connections > Bluetooth

 

Secure all other wireless communications

Secure any other wireless communications used by your device, such as infrared. For instructions, see your device manufacturer’s website.

 

Forget old devices

Choose one or more of the following ways to perform this procedure:

See the video.

Search the Settings:  device, devices, forget scan, scanning, nearby, previously connected, Wi-Fi, Bluetooth

Navigate and disable:  Settings > Connections > More connection settings > Nearby device scanning

 


Tethering over Wi-Fi or Bluetooth

  • Disable all wireless tethering features (Wi-Fi, Bluetooth, USB, and so forth) not currently in use.
  • Set unique and strong passwords, especially for tethering.

 

 


Near Field Communication

While Near Field Communication (NFC) has many applications such as Google Pay, Samsung Pay, and Android Pay turn this feature off unless needed. NFC transmission takes place over a small distance to transmit data, but these transmissions are not secure. If NFC is left on, your device is potentially exposed to malicious NFC devices.

NOTE:  Some versions of Android OS do not allow NFC to be turned on other than when using functions such as Google Pay, Samsung Pay, and so forth.

 


Next Step

You’ve completed all procedures! Return to the Mobile Security for Android Devices to review the list of all procedures as a checklist.