Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Avoid the Pitfalls of Public Wi-Fi

How to Avoid the Pitfalls of Public Wi-Fi

Someday, you’re going to encounter a situation where you absolutely need Wi-Fi and the only option will be a public connection. This becomes rather problematic, as a public Wi-Fi connection is far from secure for business purposes. A method to maximize productivity without compromising security is needed for every business that has employees working out of the office, but what’s the best way to do it?

Here are some of the reasons why a public Wi-Fi connection isn’t as secure as you might hope it will be, and what can be done to limit the risk factor.

The Real Dangers of Public Wi-Fi
If you stop into a location just to use their Wi-Fi connection with your smartphone, you’re doing so because you would rather use their connection than your own mobile data plan. You might choose to stop into the local coffee shop with hopes that you can find a connection. There is one, but it’s not protected by a password. This might come off as convenient, but it should also create a red flag in your mind. There is always the chance that your activity is being monitored by nosy onlookers.

Hackers tend to gravitate toward busy public wireless connections for the express purpose of stealing information and looking for sensitive data. There’s nothing keeping a hacker from accessing these networks, as they are practically devoid of any security features. Your business needs to have measures put into place to ensure that this doesn't become a detriment to your organization.

Password Protection is Important
Your in-house network is secure because you require credentials to access it. These passwords should always be implemented. If you don’t, it could mean that your organization’s network is wide open to anyone who wants to use it. We actually recommend setting up multiple wireless networks; one for your in-house employees, and one for your office’s visitors. You can even partition off your network so that specific resources are delegated to both your in-house workers and your visitors.

If you’re accessing a public wireless connection, it’s important that your business has an encryption solution put into place to make sure that any data sent to, and received by, your devices is protected. If there is a wireless access point available, make sure that you don’t connect to it unless it requires a password. Just ask around the establishment if you need one.

Implement a Virtual Private Network
A VPN is the best way to make sure that your company’s data is secure while out of the office and on unprotected networks. VPNs take advantage of encryption by scrambling your data while it’s in transit. Anyone hoping to catch a glimpse of your data will only see a jumbled mess, making a VPN an incredibly valuable solution.

Does your company need a VPN? Excedeo can help. To learn more, reach out to us at 619.398.4100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 19 June 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Management Business Computing Hackers Productivity Google Efficiency Hosted Solutions Backup Managed Service Provider Innovation Business Malware windows Workplace Tips User Tips IT Support Mobile Devices Computer Saving Money Hardware IT Services Miscellaneous Upgrade Email Windows 10 Virtualization Network Security Gadgets Apps Business Continuity Communication Server Data Smartphones Disaster Recovery Information Technology Mobile Computing Network Mobile Device Management Microsoft Office Small Business Smartphone Quick Tips VoIP Productivity Health Social Media Going Green Browser Android Cybersecurity Mobile Office Operating System Holiday Chrome Passwords Cybercrime App Application Office Alert Best Practice Save Money Marketing Ransomware Collaboration Law Enforcement spam Tech Term BYOD Data Backup The Internet of Things communications Office 365 Tablet Search Employer-Employee Relationship Wearable Technology Apple Vendor Management Remote Computing WiFi Data Recovery Phishing Wireless Technology Outsourced IT BDR iPhone Risk Management Facebook Cost Management User Error Remote Monitoring Antivirus Maintenance Unified Threat Management Data Security Avoiding Downtime Managed IT Services History Hacking Router Social Telephone Systems Hard Drives Government Internet of Things Mobility Saving Time Customer Relationship Management Office Tips Password Money IT Solutions Tech Support Big Data Data Management Computers Gmail USB Encryption PowerPoint Analytics OneNote Google Drive Proactive IT Firewall Social Networking Bandwidth Lithium-ion battery Current Events Phone System Automation Wireless VPN Humor Two-factor Authentication Website Users Update Net Neutrality Unsupported Software Printer Cloud Computing Wi-Fi Bring Your Own Device Shortcut Outlook Vulnerability Social Engineering IT COnsultant Streaming Media Computer Repair Trending Artificial Intelligence Audit Managed IT Budget Intranet Recovery Laptop Virus Content Filtering Identity Theft administration Education Disaster Television Work/Life Balance Retail Excel IT Support Windows 10 Politics Biometrics Fraud Google Docs Private Cloud Virtual Reality Data Storage Networking HIPAA Wireless Charging Internet Exlporer DDoS Mobile Security WannaCry Data Breach Instant Messaging Emails Online Currency Cortana Sports Entertainment Samsung Benefits eWaste Battery Computer Accessories Blockchain Augmented Reality Personal Information Automobile Value Sales Hard Drive Cleaning Uninterrupted Power Supply Point of Sale Printer Server HaaS Managed IT Services Save Time Data Protection Programming Managing Stress Twitter Computer Care Storage Google Assistant Paperless Office Devices Legal Windows 8 Hosted Solution Transportation Fax Server Commerce Patch Management End of Support Business Intelligence Meetings Flexibility Telephony Customer Service Computing Travel Sync Buisness Advertising Running Cable Scalability Data Theft iOS Charger Experience Data storage Lifestyle Gamification Near Field Communication Edge Scam PDF How To App store Upgrades Microsoft Excel Computer Fan Music 3D Printing Memory IT consulting Screen Mirroring Ciminal Surge Protector Employer Employee Relationship Adobe Human Resources Text Messaging Consultant File Sharing Books Touchpad Financial Reliable Computing Cast Project Management Applications Distributed Denial of Service Black Market Nokia Compliance Identity Touchscreen Monitors Evernote Electronic Medical Records Bloatware Gift Giving Youtube IT budget Licensing Inbound Marketing Data Privacy Webinar Legislation Microblogging Community Nanotechnology Workers Files Safety Operating Sysytem ISP Training Tablets Branding SaaS Intrantet Mouse Chromebook IT solutions Comparison Root Cause Analysis Updates Chromecast HBO WIndows 7 Blogging Identities Tutorial Company Culture NFL Network Congestion Printing Windows 10s Specifications Webinar Microsoft Word Images Reputation Regulations Language Word Bluetooth Conferencing Worker Commute Administrator junk Solid State Drive Co-managed IT Settings Device Security Keyboard IT Management hacker Cameras User Display Windows Ink SharePoint Video Games Hard Disk Drive Gifts Access Amazon filter Computer Forensics Debate Help Desk Hiring/Firing WIndows Server 2008 Virtual Desktop Presentation OneDrive Best Available Proactive Print Server Google Maps Teamwork Credit Cards Science Management Spyware Smart Technology Ebay Websites Mobile Device Data Loss FAQ Robot Wireless Internet