The Associated Press
updated 12/1/2004 7:28:49 PM ET 2004-12-02T00:28:49

The wireless world is spreading rapidly, offering business travelers equipped with laptops or other devices the chance to connect everywhere from coffee shops to hotel lobbies.

  1. Don't miss these Travel stories
    1. Lords of the gourd compete for Punkin Chunkin honors

      With teams using more than 100 unique apparatuses to launch globular projectiles a half-mile or more, the 27th annual World Championship Punkin Chunkin event is our pick as November’s Weird Festival of the Month.

    2. Airports, airlines work hard to return your lost items
    3. Expert: Tourist hordes threaten Sistine Chapel's art
    4. MGM Grand wants Las Vegas guests to Stay Well
    5. Report: Airlines collecting $36.1B in fees this year

HEADED FOR Boise, Idaho? Wayport, a leader in wireless Internet access, recently announced that several McDonald’s restaurants in that area were now equipped with “Wi-Fi” environments — local networks where a radio signal allows high-speed access.

McDonald’s previously announced plans to provide wireless environments in several hundred of its restaurants by the end of 2003. Wayport ( says it now provides high-speed Internet access in parts of 12 airports and 675 hotels.

Bangalore, India, recently became that country’s first Wi-Fi enabled city with 120 wireless spots, according to “” (, which traces developments in that and related fields. It also reports that while Wi-Fi is growing most Internet access is still done by standard dial-up.


But for those who are entering the wireless world, is there a security or theft concern with all that data and information out there zipping through the air?

Richard Isaacs, senior vice president of the LUBRINCO Group, an international vulnerability management firm that specializes in protecting intellectual assets, says: “The real issue is do you have anything important (worth stealing) and do you have a firewall?”

“If the second is all right you don’t have to worry about the first,” he said.”

He rates the risk of data theft in wireless environments as “very low” for properly protected devices. The bigger problem, he says, is theft of the devices themselves.

“We recommend that everyone use a virtual private network,” Dan Lowden, vice president for marketing at Wayport, says. “A VPN will give you a much more secure connection and putting that extra level of security at the device level is what we feel is critical today.”

Virtual Private Networks such as the one operated by iPass Inc. , ( automatically add new wireless and other access points each time the user connects.

Lowden says Wi-Fi connections handled by his company have increased 30 percent each quarter during the past year, and more than 600,000 people made connections through Wayport in the last quarter.

Brian Grimm, spokesman for the WI-FI Alliance, an industry group that developed the broadcast standard, says that since many individual users may not have access to company-provided VPNs, they may want to acquire “VPN-like services.”

The alliance carries detailed information on that at its Web site — He also recommends checking out their site, which lists Wi-Fi locations in more than 50 countries —


The hardware theft issue mentioned earlier has been covered in a recent report from Brigadoon Software, whose products include a program called PhoneHome ( It enables stolen personal computers to send out secret messages showing where they are being used, allowing them to be traced.

The company says its survey of 676 individuals or companies around the globe is the first to provide a definitive look at the scope of the theft problem. Nearly 45 percent of those polled said they had suffered a computer theft and of those losses the bulk were mobile devices — 48 percent laptops and 13 percent personal digital assistants.

Of all computers stolen more than 16 percent were taken in transit — taken from cars, trade show exhibits, airports and hotel rooms, the survey found.

© 2005 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.


Discussion comments


Most active discussions

  1. votes comments
  2. votes comments
  3. votes comments
  4. votes comments