Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Avoid the Pitfalls of Public Wi-Fi

How to Avoid the Pitfalls of Public Wi-Fi

Someday, you’re going to encounter a situation where you absolutely need Wi-Fi and the only option will be a public connection. This becomes rather problematic, as a public Wi-Fi connection is far from secure for business purposes. A method to maximize productivity without compromising security is needed for every business that has employees working out of the office, but what’s the best way to do it?

Here are some of the reasons why a public Wi-Fi connection isn’t as secure as you might hope it will be, and what can be done to limit the risk factor.

The Real Dangers of Public Wi-Fi
If you stop into a location just to use their Wi-Fi connection with your smartphone, you’re doing so because you would rather use their connection than your own mobile data plan. You might choose to stop into the local coffee shop with hopes that you can find a connection. There is one, but it’s not protected by a password. This might come off as convenient, but it should also create a red flag in your mind. There is always the chance that your activity is being monitored by nosy onlookers.

Hackers tend to gravitate toward busy public wireless connections for the express purpose of stealing information and looking for sensitive data. There’s nothing keeping a hacker from accessing these networks, as they are practically devoid of any security features. Your business needs to have measures put into place to ensure that this doesn't become a detriment to your organization.

Password Protection is Important
Your in-house network is secure because you require credentials to access it. These passwords should always be implemented. If you don’t, it could mean that your organization’s network is wide open to anyone who wants to use it. We actually recommend setting up multiple wireless networks; one for your in-house employees, and one for your office’s visitors. You can even partition off your network so that specific resources are delegated to both your in-house workers and your visitors.

If you’re accessing a public wireless connection, it’s important that your business has an encryption solution put into place to make sure that any data sent to, and received by, your devices is protected. If there is a wireless access point available, make sure that you don’t connect to it unless it requires a password. Just ask around the establishment if you need one.

Implement a Virtual Private Network
A VPN is the best way to make sure that your company’s data is secure while out of the office and on unprotected networks. VPNs take advantage of encryption by scrambling your data while it’s in transit. Anyone hoping to catch a glimpse of your data will only see a jumbled mess, making a VPN an incredibly valuable solution.

Does your company need a VPN? Excedeo can help. To learn more, reach out to us at 619.398.4100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 22 March 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Business Management Productivity Hackers Google Efficiency Hosted Solutions Backup Managed Service Provider Innovation Business windows Workplace Tips Malware User Tips IT Support Hardware IT Services Computer Mobile Devices Upgrade Miscellaneous Windows 10 Saving Money Email Virtualization Gadgets Apps Disaster Recovery Business Continuity Communication Server Mobile Computing Mobile Device Management Microsoft Office Information Technology Data Small Business Smartphones Quick Tips VoIP Smartphone Network Security Productivity Network Social Media Health Mobile Office Going Green Browser Holiday Chrome Android Passwords Save Money Cybercrime Operating System Office App Alert Best Practice Collaboration Application BYOD Marketing spam Wearable Technology Cybersecurity Remote Computing Apple WiFi Ransomware The Internet of Things Tablet Search Unified Threat Management Antivirus Maintenance Avoiding Downtime Hacking History Vendor Management communications Wireless Technology Law Enforcement Employer-Employee Relationship iPhone Managed IT Services Facebook User Error Risk Management Office Tips Saving Time Password Data Management Computers Office 365 Customer Relationship Management Phishing Data Security IT Solutions Social Telephone Systems Mobility Big Data Internet of Things Data Backup BDR Government Hard Drives Money Remote Monitoring Vulnerability Wi-Fi Bandwidth Lithium-ion battery Social Networking Data Recovery Current Events Outsourced IT VPN Humor Google Drive Shortcut Website Net Neutrality Users Printer Tech Support Outlook Bring Your Own Device Router USB Encryption Wireless Analytics OneNote Unsupported Software Phone System Proactive IT Firewall Automation Cost Management Two-factor Authentication Intranet Update Politics Laptop Content Filtering Excel Virus administration Television Education Retail Disaster Managed IT Social Engineering Gmail Identity Theft PowerPoint Budget Recovery IT Support Streaming Media IT COnsultant Cloud Computing Trending Windows 10 Work/Life Balance Audit Computer Repair Transportation Blockchain Managing Stress End of Support Flexibility Storage Augmented Reality Data Storage Point of Sale Printer Server Uninterrupted Power Supply Sales Hosted Solution Twitter WannaCry Programming Tech Term Business Intelligence Meetings Telephony Customer Service Travel Biometrics Samsung Artificial Intelligence Private Cloud Virtual Reality Paperless Office Networking HIPAA Battery Internet Exlporer Windows 8 Fax Server Fraud Google Docs Cleaning Personal Information DDoS Automobile Instant Messaging Emails Managed IT Services Save Time Computer Care Sports Entertainment Benefits eWaste Computer Accessories Cortana Online Currency Commerce Legal HaaS Tablets Nokia Regulations Comparison Bluetooth Gift Giving Youtube Community Updates junk HBO NFL iOS ISP Robot Identities Cameras User Microblogging Specifications Scam Intrantet Advertising SharePoint Scalability Microsoft Word filter Data Protection Upgrades Tutorial Word Computer Fan Experience Data storage Virtual Desktop Blogging Language Presentation Best Available Conferencing Screen Mirroring Hard Drive Employer Employee Relationship PDF Teamwork How To Science Device Security IT Management Consultant Windows Ink Music Webinar Gifts Cast Images Text Messaging Co-managed IT Devices WIndows Server 2008 Touchscreen Google Maps Monitors Books Touchpad Buisness Display Proactive Running Cable Amazon Credit Cards Black Market Spyware Patch Management Webinar Near Field Communication Print Server Data Loss Nanotechnology Electronic Medical Records OneDrive Websites Debate FAQ Help Desk Training IT solutions Sync IT consulting Root Cause Analysis Operating Sysytem Human Resources Ebay Computing Charger Company Culture Windows 10s Edge Reliable Computing Microsoft Excel Distributed Denial of Service Wireless Charging Compliance Adobe Solid State Drive Bloatware Ciminal File Sharing Settings Keyboard Reputation Lifestyle 3D Printing Data Breach Inbound Marketing Applications Hard Disk Drive Worker Commute Files Administrator Project Management Surge Protector Hiring/Firing hacker Branding Video Games SaaS Mouse Evernote Value Licensing Chromecast Access IT budget WIndows 7 Legislation Smart Technology Network Congestion Workers Mobile Device