Let’s say you need to send an urgent email to a client while you’re at the store. Or, you’re traveling and need to take a Zoom call at your hotel. Maybe you need to access sensitive client data or employee information while on public Wi-Fi. You wonder how you should connect to the internet to do your task. The easiest and simplest thing to do is just pull out your phone and get the job done. But what about Wi-Fi security concerns?

We’ve all heard the warnings that we should never use public Wi-Fi for business. So many things have changed since the pandemic. It’s important to revisit the old rules to see if they apply in our post-COVID-19 world. And Wi-Fi security is a prime example. So I decided to delve into the question to see whether there are safer ways to access an unsecured network. Should some things never be accessed over public wireless?

Remote Working Is Different Today

It used to be much easier to connect over secure wireless. After all, the boundaries between work and home were much clearer. At the time, we thought the boundaries were fuzzy. Then, the pandemic happened. The boundaries completely disappeared. Expectations for always being on reached new levels we didn’t think were possible.

Employees began using their flexibility for working wherever. For some, that meant working for months at a rental home somewhere across the country. For others, it meant taking advantage of the flexibility to go to the store during lunch. Most of us now find ourselves in more situations where we need to handle a work task outside the reaches of our secure internet.

It’s unrealistic for companies to expect employees to never do work over unsecured Wi-Fi. After all, many of them demand, even subtly, that employees be available all the time, no matter what. The right approach is instead to figure out a realistic and practical way to balance security with today’s business needs. And also be willing to accept that being always on isn’t the right answer for the company or employee.

Public Wi-Fi Security Concerns for Business

The next time you find yourself looking to log on to public wireless for work, stop and ask yourself if it can wait. If the answer is yes, then hit the pause button. Add the task to your to-do list for when you are at your office or in range of your secure home internet.

Browsers and sites have HTTPS and traffic encryption that safeguard them when using public Wi-Fi. Therefore, it’s pretty safe for consumers. Business data may be another matter, though, depending on the type of work you do.

If it can’t wait, one option is to connect using cellular data. You can do this by using your phone for the connection, such as using the Zoom app on your phone for your next video call. The other option is to tether another device to your mobile device and then access the internet. Your phone automatically encrypts all data sent over the cellular network. That protects you from many of the common schemes, such as accidentally connecting to fake public wireless or another person nearby using eavesdropping tools to see the data you transmit.

If there is no way to use cellular, such as when you lack a cell signal, another option is to connect over public wireless but use a browser with built-in encryption. This makes it much harder for a threat actor to intercept your data and then gain credentials to access your account.

Are Some Types of Data or Tasks Safer Than Others?

Yes. Maybe. Sort of. Not really. Some types of data are always unsafe to access over public internet because their value to the company is too high to take any risks, such as financial, customer and employee data. This is especially true for data protected by regulations and privacy laws. If you find yourself about to access these types of data over public Wi-Fi, just don’t do it. Sure, it’s very possible that nothing will happen if you do. But the value of the data to the company and the risk to the company if something happens to the data are too high.

But that doesn’t mean that the flip side is true – that it’s safe to access nonsensitive information over public wireless. While you’re connected over public wireless, cyber criminals can cause many types of harm, regardless of what you access. Your device could become infected with ransomware, which you then unknowingly spread to the network. A cyber criminal could also intercept your credentials and then use your access to log in to the network and cause harm. Or you might find yourself in one of many other scenarios that cause other parts of the network and data to be infected.

Do VPNs Improve Public Wi-Fi Security?

Most people assume the answer is to use a virtual private network (VPN). And that’s neither entirely wrong nor completely right. Even though the VPN industry has done a fabulous job of making you think the mere act of connecting through a VPN solves all problems, it’s not that simple. And as you might expect, not all VPNs are created equal. Does your niece in middle school use a free VPN to get around her school’s site blocker to access TikTok while in science class? That VPN is probably not the best choice to use when accessing sensitive information.

Many organizations are increasingly turning to use VPNs that are integrated into their cloud service provider. In addition to following the latest security protocols and protecting your data from current threats, this type of VPN typically does not require extra steps for the user. Importantly, this type of VPN also typically does not cause the internet to run too slowly, as is the case with many VPNs. An integrated solution also makes it much less likely that an employee will forget to log in to the VPN. That happens quite often when it’s a separate step, such as when using a third-party VPN.

As we emerge from our pandemic habits and routines, we can’t and won’t simply go back to the way things worked before. Take the time to create a solution for employees that works for today’s world, not the one before March 2020. That way, organizations can balance the need for safety and productivity when it comes to Wi-Fi security.

More from Data Protection

Defense in depth: Layering your security coverage

2 min read - The more valuable a possession, the more steps you take to protect it. A home, for example, is protected by the lock systems on doors and windows, but the valuable or sensitive items that a criminal might steal are stored with even more security — in a locked filing cabinet or a safe. This provides layers of protection for the things you really don’t want a thief to get their hands on. You tailor each item’s protection accordingly, depending on…

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Cost of a data breach: The evolving role of law enforcement

4 min read - If someone broke into your company’s office to steal your valuable assets, your first step would be to contact law enforcement. But would your reaction be the same if someone broke into your company’s network and accessed your most valuable assets through a data breach? A decade ago, when smartphones were still relatively new and most people were still coming to understand the value of data both corporate-wide and personally, there was little incentive to report cyber crime. It was…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today