Securing Your Wireless Connections

This page represents Step Three (of three) from Mobile Security for Windows 10 Devices.




Secure your connections by performing all of the following procedures:


Wi-Fi

CAUTION:  Connect to campus over Virtual Private Network (VPN). All off-campus students, faculty, and staff must use the NC State VPN when connecting to the non-public campus network. The VPN allows you to protect your data when accessing your computer’s desktop and mapped drives. 2FA is required when using the NC State VPN.  Off-campus destinations like NC State Gmail, NC State GSuite, Office 365, general web browsing, and most other destinations are not protected.  Make sure off-campus connections are secure by looking for https at the beginning of the link.   

To turn off Wi-Fi

Choose one or more of the following ways to perform this procedure:

See the video.

Search the Settings:  Network

Navigate:  Wi-Fi Menu > Turn Off Wi-Fi


Bluetooth

Perform the following procedures to protect your Bluetooth connections:

  1. Forget old devices — Remove old Bluetooth devices once you are no longer using them. This will protect you from being compromised by older devices. 
  2. Turn off Bluetooth — Turn off Bluetooth as soon as you’re done using it.  Otherwise, the risk of becoming hacked is high. So, turn it on when you need it and turn it off as soon as you don’t.

To forget old Bluetooth devices

Choose one or more of the following ways to perform this procedure:

See the video.

Search the Settings:  Bluetooth

Navigate: Start > Settings > Devices > Remove Device

To turn off Bluetooth

Choose one or more of the following ways to perform this procedure:

See the video.

Search the Settings:  Bluetooth

Navigate: Start > Settings > Devices > Turn Bluetooth Off


Tethering Internet Connections over Wi-Fi or Bluetooth

  • Disable all wireless tethering features (Wi-Fi, Bluetooth, USB, and so forth) not currently in use. 
  • Set unique and strong passwords, especially for tethering.

Next Step

You’ve completed all procedures! Return to the Mobile Security for Windows 10 Devices to review the list of all procedures as a checklist.