Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Avoid the Pitfalls of Public Wi-Fi

How to Avoid the Pitfalls of Public Wi-Fi

Someday, you’re going to encounter a situation where you absolutely need Wi-Fi and the only option will be a public connection. This becomes rather problematic, as a public Wi-Fi connection is far from secure for business purposes. A method to maximize productivity without compromising security is needed for every business that has employees working out of the office, but what’s the best way to do it?

Here are some of the reasons why a public Wi-Fi connection isn’t as secure as you might hope it will be, and what can be done to limit the risk factor.

The Real Dangers of Public Wi-Fi
If you stop into a location just to use their Wi-Fi connection with your smartphone, you’re doing so because you would rather use their connection than your own mobile data plan. You might choose to stop into the local coffee shop with hopes that you can find a connection. There is one, but it’s not protected by a password. This might come off as convenient, but it should also create a red flag in your mind. There is always the chance that your activity is being monitored by nosy onlookers.

Hackers tend to gravitate toward busy public wireless connections for the express purpose of stealing information and looking for sensitive data. There’s nothing keeping a hacker from accessing these networks, as they are practically devoid of any security features. Your business needs to have measures put into place to ensure that this doesn't become a detriment to your organization.

Password Protection is Important
Your in-house network is secure because you require credentials to access it. These passwords should always be implemented. If you don’t, it could mean that your organization’s network is wide open to anyone who wants to use it. We actually recommend setting up multiple wireless networks; one for your in-house employees, and one for your office’s visitors. You can even partition off your network so that specific resources are delegated to both your in-house workers and your visitors.

If you’re accessing a public wireless connection, it’s important that your business has an encryption solution put into place to make sure that any data sent to, and received by, your devices is protected. If there is a wireless access point available, make sure that you don’t connect to it unless it requires a password. Just ask around the establishment if you need one.

Implement a Virtual Private Network
A VPN is the best way to make sure that your company’s data is secure while out of the office and on unprotected networks. VPNs take advantage of encryption by scrambling your data while it’s in transit. Anyone hoping to catch a glimpse of your data will only see a jumbled mess, making a VPN an incredibly valuable solution.

Does your company need a VPN? Excedeo can help. To learn more, reach out to us at 619.398.4100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 19 December 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today


Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingHackersBusiness ManagementEfficiencyGoogleProductivityHosted SolutionsBackupManaged Service ProviderWorkplace TipsMalwareBusinessInnovationUser TipsHardwareIT ServicesComputerwindowsMobile DevicesUpgradeNetwork SecurityIT SupportMiscellaneousSaving MoneyEmailWindows 10VirtualizationDataGadgetsBusiness ContinuitySmartphonesCommunicationAppsDisaster RecoverySmartphoneProductivityNetworkBrowserVoIPMicrosoft OfficeServerMobile Device ManagementInformation TechnologyMobile ComputingTech TermSmall BusinessQuick TipsHealthSocial MediaPasswordsAndroidOperating SystemMobile OfficeGoing GreenHolidayCybersecurityChromeData BackupApplicationOfficeAppspamAlertBest PracticeCollaborationSave MoneyCybercrimeOffice 365RansomwareEmployer-Employee RelationshipLaw EnforcementManaged IT ServicesBYODMarketingcommunicationsInternet of ThingsAppleVendor ManagementData SecurityWiFiThe Internet of ThingsTabletSearchData RecoveryOutsourced ITWearable TechnologyRemote ComputingHistoryUsersRouterWireless TechnologyBDRBring Your Own DeviceFacebookUser ErrorRemote MonitoringMoneyiPhoneIT SupportUnified Threat ManagementAntivirusWindows 10Risk ManagementAvoiding DowntimeCost ManagementHackingPhishingMaintenanceSaving TimeTech SupportMobilityBig DataCustomer Relationship ManagementEncryptionOneNoteGovernmentBandwidthOffice TipsPasswordHard DrivesData ManagementComputersSocialTelephone SystemsIT SolutionsOutlookGmailUSBBudgetPowerPointWirelessPhone SystemAnalyticsProactive ITAutomationFirewallUnsupported SoftwareTwo-factor AuthenticationUpdateLithium-ion batteryCloud ComputingCurrent EventsWi-FiVulnerabilityVPNShortcutHumorWebsiteSocial NetworkingNet NeutralityGoogle DriveNetworkingPrinterManaged ITadministrationApplicationsDisasterBlockchainRecoveryIdentity TheftStreaming MediaInformationTrendingAuditWork/Life BalanceIntranetAugmented RealityExcelLaptopMobile DeviceContent FilteringIT COnsultantPoliticsComputer RepairTravelTelevisionEducationRetailSocial EngineeringVirusArtificial IntelligenceData BreachTouchscreenHuman ResourcesDDoSProject ManagementFax ServerSamsungInstant MessagingCortanaEmailsEvernoteComputingBatteryPersonal InformationSportsEntertainmentAutomobileBenefitseWasteComputer AccessoriesCleaningWindows 8SaaSValueManaged IT ServicesSave TimeComputer CareData ProtectionHaaSWordOnline CurrencyGoogle AssistantManaging StressStorageLegalDevicesTransportationManaged ServiceEnd of SupportCommerceFlexibilityPatch ManagementPoint of SaleHosted SolutionPrinter ServerBusiness IntelligenceMeetingsFraudTwitterTelephonyCustomer ServiceGoogle DocsData StorageProgrammingScamBiometricsBusiness TechnologyDisplayPrivate CloudVirtual RealityWireless ChargingAmazonHIPAAWannaCryPaperless OfficeInternet ExlporerUninterrupted Power SupplyMobile SecuritySalesHard DriveIT consultingBlack MarketFinancialCameraMonitorsElectronic Medical RecordsEbayIdentityWebinarImagesReliable ComputingWebinarHybrid CloudOperating SysytemProjectsDistributed Denial of ServiceIT budgetLicensingComplianceNanotechnologySafetyTrainingData PrivacyBloatwareLegislationWorkersIT solutionsVirtual AssistantWindows 7TabletsInbound MarketingRoot Cause AnalysisCompany CultureFilesChromebookDebateComparisonHelp DeskUpdatesHBOWindows 10s3D PrintingAlexa for BusinessBrandingReputationCo-Managed ServicesSurge ProtectorIdentitiesMouseNFLChromecastPrintingSpecificationsMicrosoft WordWIndows 7Solid State DriveWorker CommuteAdministratorhackerTelephoneLanguageNetwork CongestionSettingsKeyboardVideo GamesConferencingRegulationsDevice SecurityIT ManagementHard Disk DriveAccessSoftware as a ServiceBluetoothHyperlinkLifestyleWindows InkjunkAccess ControlHiring/FiringComputer ForensicsGiftsCamerasUserWIndows Server 2008CommunitySharePointWasting TimeProactiveGoogle MapsfilterAdminISPSmart TechnologyManagementVirtual DesktopCredit CardsPresentationIntrantetSpywareBest AvailableRobotVendorTeamworkAdvertisingAccessoryTutorialWebsitesScienceData LossKeyboard ShortcutsBloggingScalabilityWireless InternetFAQNokiaSynciOSExperienceData storageEmployee-Employer RelationshipPDFPeripheralGift GivingData TheftPayrollUpgradesHow ToGamificationBuisnessYoutubeChargerRunning CableEdgeComputer FanMusicCo-managed ITEmployer Employee RelationshipText MessagingApp storeMicrobloggingMicrosoft ExcelScreen MirroringNear Field CommunicationConsultantMemoryTouchpadTestingCiminalAdobeBooksPrint ServerFile SharingCastOneDrive