Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Avoid the Pitfalls of Public Wi-Fi

How to Avoid the Pitfalls of Public Wi-Fi

Someday, you’re going to encounter a situation where you absolutely need Wi-Fi and the only option will be a public connection. This becomes rather problematic, as a public Wi-Fi connection is far from secure for business purposes. A method to maximize productivity without compromising security is needed for every business that has employees working out of the office, but what’s the best way to do it?

Here are some of the reasons why a public Wi-Fi connection isn’t as secure as you might hope it will be, and what can be done to limit the risk factor.

The Real Dangers of Public Wi-Fi
If you stop into a location just to use their Wi-Fi connection with your smartphone, you’re doing so because you would rather use their connection than your own mobile data plan. You might choose to stop into the local coffee shop with hopes that you can find a connection. There is one, but it’s not protected by a password. This might come off as convenient, but it should also create a red flag in your mind. There is always the chance that your activity is being monitored by nosy onlookers.

Hackers tend to gravitate toward busy public wireless connections for the express purpose of stealing information and looking for sensitive data. There’s nothing keeping a hacker from accessing these networks, as they are practically devoid of any security features. Your business needs to have measures put into place to ensure that this doesn't become a detriment to your organization.

Password Protection is Important
Your in-house network is secure because you require credentials to access it. These passwords should always be implemented. If you don’t, it could mean that your organization’s network is wide open to anyone who wants to use it. We actually recommend setting up multiple wireless networks; one for your in-house employees, and one for your office’s visitors. You can even partition off your network so that specific resources are delegated to both your in-house workers and your visitors.

If you’re accessing a public wireless connection, it’s important that your business has an encryption solution put into place to make sure that any data sent to, and received by, your devices is protected. If there is a wireless access point available, make sure that you don’t connect to it unless it requires a password. Just ask around the establishment if you need one.

Implement a Virtual Private Network
A VPN is the best way to make sure that your company’s data is secure while out of the office and on unprotected networks. VPNs take advantage of encryption by scrambling your data while it’s in transit. Anyone hoping to catch a glimpse of your data will only see a jumbled mess, making a VPN an incredibly valuable solution.

Does your company need a VPN? Excedeo can help. To learn more, reach out to us at 619.398.4100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 26 September 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Management Hackers Business Computing Efficiency Google Productivity Hosted Solutions Backup Managed Service Provider Business Innovation Malware User Tips windows Workplace Tips Mobile Devices Computer Hardware IT Services Network Security IT Support Saving Money Upgrade Miscellaneous Email Virtualization Windows 10 Apps Data Gadgets Smartphones Communication Business Continuity Disaster Recovery Network Microsoft Office Server Mobile Device Management Smartphone VoIP Mobile Computing Information Technology Small Business Productivity Browser Quick Tips Tech Term Health Social Media Passwords Operating System Mobile Office Android Cybersecurity Going Green Holiday Chrome Save Money Cybercrime App Alert Best Practice Application Office Collaboration Managed IT Services spam Data Backup BYOD Ransomware Marketing Law Enforcement Tablet Search Remote Computing Wearable Technology Apple The Internet of Things Vendor Management WiFi communications Office 365 Employer-Employee Relationship Risk Management Cost Management Maintenance Money Hacking Router Wireless Technology BDR Data Security Data Recovery Outsourced IT History Users Phishing Facebook User Error Bring Your Own Device Remote Monitoring Internet of Things Unified Threat Management Antivirus iPhone Avoiding Downtime IT Solutions Office Tips Saving Time Tech Support Password Big Data Data Management Computers Customer Relationship Management Government Social Telephone Systems Bandwidth Mobility Hard Drives Wireless Humor Automation Website Net Neutrality Two-factor Authentication Social Networking Update Unsupported Software Printer IT Support Cloud Computing Outlook Windows 10 Wi-Fi Gmail Encryption Vulnerability Shortcut USB PowerPoint Analytics OneNote Google Drive Proactive IT Firewall Lithium-ion battery Current Events Budget Phone System VPN IT COnsultant Identity Theft Computer Repair Television Education Retail Work/Life Balance Excel Virus Mobile Device administration Politics Blockchain Travel Disaster Networking Streaming Media Information Social Engineering Trending Audit Artificial Intelligence Managed IT Intranet Augmented Reality Laptop Content Filtering Recovery SaaS Fraud Value Google Docs Twitter Programming Managed IT Services Save Time HaaS Computer Care Managing Stress Amazon Wireless Charging Storage Paperless Office Mobile Security Data Breach Legal Fax Server Applications Cortana Transportation End of Support Uninterrupted Power Supply Computing Sales Commerce Hard Drive Hosted Solution Flexibility Business Intelligence Meetings Telephony Customer Service Biometrics Data Storage Private Cloud Virtual Reality HIPAA Data Protection Internet Exlporer Windows 8 Online Currency WannaCry Google Assistant DDoS Instant Messaging Emails Samsung Managed Service Devices Sports Battery Entertainment Benefits eWaste Computer Accessories Personal Information Point of Sale Patch Management Automobile Printer Server Cleaning Company Culture Employee-Employer Relationship Mouse Sync Chromecast Windows 10s Data Theft Gamification WIndows 7 Reputation Charger Business Technology Network Congestion Edge Co-managed IT Display Microsoft Excel Solid State Drive Worker Commute App store Regulations Administrator Nokia Memory hacker Gift Giving Settings Bluetooth Keyboard Testing Video Games Ciminal junk Youtube Adobe File Sharing Print Server Hard Disk Drive OneDrive Cameras Access Financial User Microblogging SharePoint Hiring/Firing Camera Project Management filter Ebay Virtual Desktop Identity Presentation Hybrid Cloud Best Available Evernote Teamwork Smart Technology Projects Science IT budget Licensing Legislation Data Privacy Robot Virtual Assistant Advertising Workers Webinar Images Scalability Tablets Comparison iOS Buisness Experience Chromebook Data storage Scam Alexa for Business PDF 3D Printing Updates HBO Running Cable Surge Protector Upgrades How To Identities NFL Specifications Computer Fan Music Printing Near Field Communication Employer Employee Relationship Text Messaging Microsoft Word Debate Screen Mirroring Help Desk Consultant Language Word IT consulting Touchpad Conferencing Human Resources Books Software as a Service Device Security IT Management Cast Touchscreen Black Market Windows Ink Computer Forensics Reliable Computing Gifts Monitors Electronic Medical Records Distributed Denial of Service Compliance Community WIndows Server 2008 Google Maps Webinar Bloatware ISP Proactive Management Operating Sysytem Lifestyle Credit Cards Nanotechnology Safety Intrantet Training Vendor Spyware Inbound Marketing Data Loss Tutorial Files IT solutions Websites Blogging Wireless Internet FAQ Root Cause Analysis Branding