The dangers of using unsecured Wi-Fi
In 2020, there has been an explosion of remote working. According to research, the amount of people who work remotely at least once per week has grown by 400% since 2010. However, while remote working has many fans, there are significant risks associated with it too. If your team members work from cafes, in airports or on trains, then they probably connect to unsecured (public) Wi-Fi.
Connecting to public Wi-Fi may seem convenient, but that convenience can come at the cost of security. Few truly know the hidden dangers – and, when you are dealing with sensitive company information, these risks can be vast. Both employers and employees should be aware of the hidden dangers and learn how to protect themselves when working remotely so they can keep their information safe.
What are the risks of using unsecured Wi-Fi?
An unsecured Wi-Fi most often refers to a free public Wi-Fi network. Identifying unsecured Wi-Fi is easy as it does not require a password to be accessed. As there is no special login or screening process, you and anyone else can use it.
The primary danger when using unsecured Wi-Fi is that of a criminal intercepting your web traffic. In this blog, we will discuss some of the risks you expose yourself to when you surf unprotected.
Login information interception
When you connect to an unsecured Wi-Fi connection, one major risk comes from using services which require login information, think email and online banking. Third parties can intercept data being transmitted over unsecured Wi-Fi as it is in an unencrypted form. They can then extract your login information and passwords from this intercepted data.
Cyber criminals can use the captured login information fraudulently for serval reasons. For example, directly, such as to gain access to personal or business accounts, or indirectly, to sell credentials to third parties.
Sensitive data interception
This same interception risk for login information applies to any other sensitive data transmitted over an unsecured Wi-Fi connection. For example, any sensitive data sent as an instant message, email and other data-transmission tool can be intercepted and used illegally. For obvious reasons, this risk can be especially dangerous for businesses when sensitive corporate information is transmitted.
Spreading malicious software
Cybercriminals can also use an unsecured Wi-Fi connection to distribute malicious software such as malware and other viruses to multiple users. For instance, if you file-share across a network, the hacker will be able to plant infected software on your device. More sophisticated cybercriminals have in the past managed to hack unsecured Wi-Fi connection points so that a pop-up window occurs during the connection process. If users click on the window, malicious software installs.
Not only can malicious software delete important business data, but it can steal or hold it to ransom. Therefore, having infected software on devices that are connected to company networks or with business data on them can be financial crippling to an organisation.
Bandwidth theft
Bandwidth theft is a real threat whereby others sign onto your network, and the tasks they perform consume a sizeable portion of the available bandwidth.
At a basic level, your users / employees may experience lag which can result in frustration and hurt productivity. In more serious cases, multiple sign-ons from unauthorised users can result in an overload of the capabilities of your network hardware, in the form of a DoS attack, or your system overloading.
Network data theft
If you host unsecured Wi-Fi, you are also endangering your business and the data stored on any computers connected to the network. Unauthorised users can access unsecured resources on your computer network, including data on connected computers. Failing to put proper intrusion safeguards in place when hosting Wi-Fi will result in sensitive corporate data being stolen. The same goes for malicious software, which can easily be introduced onto the network in this way.
Illegal usage
In some cases, intruders of unsecured Wi-Fi networks may use it for illegal purposes. For example, illegal file transfers and downloads, the use of your network to distribute viruses, and transmissions of hate speech and other illicit materials could all be going on without your knowledge by an unauthorised user on your unsecured Wi-Fi network. As you are the person hosting the network, any investigation would lead back to you. This includes any fines these crimes incur even if none of your legitimate users did the crime.
How can you protect yourself?
As working remotely becomes increasingly common, you can expect for cyber security issues surrounding public Wi-Fi to grow over time. But that doesn’t mean you have to stay away from it completely and tie yourself to your desk again. Many hackers go after easy targets who haven’t put proper precautions in place. Fortunately, there are some simple steps you can take as an individual or business to help keep your information safe.
Use a VPN or Remote Desktop Service (RDS)
Both a VPN and RDS allow secure access to data and company networks when using unsecured Wi-Fi. However, choosing which to use in a business sense will depend largely on how long employees are working remotely for, how often and where they are going to be working.
A VPN works by encrypting your data through a tunnel, acting as a gateway to safeguard the information employees send and receive when working remotely online, and protects their broadband connection from unauthorised intrusion. This service is perhaps better for organisations as a short-term fix, who don’t have staff moving between a variety of site often, as when configured properly, users only have access to set up files and folders, and not all applications and tools they have when in the office.
An RDS is much different in the way that it creates a remote connection so that users can access that same desktop they have when in the office, but securely. To the end users, there is no difference to what they are used to. However, the difference lies in where data and applications are stored – rather than being stored on an on-site server, they are hosted in the cloud from a secure data. This service is best as a long-term solution and if employees are working remotely regularly in multiple locations.
Secure connections
If you don’t have access to a VPN or RDS, you should make sure you are only visiting encrypted sites to help protect from some of the threats listed in the blog. To do this, look for ‘HTTPS’ at the beginning of website addresses. HTTPS means that the connection between web server and browser is encrypted, thus meaning any data submitted on the website will be safe from those intruding on an unsecure Wi-Fi network. Most of the commonly used browsers use the padlock symbol at the begging of the address to illustrate if a website uses encryption (HTTPS).
If you’re concerned about access websites which don’t use encryption, you can often set your browsing preferences to only access websites that use these secure transmission protocols.
Managed privacy
As identity theft is one of the main risks of Wi-Fi hacking, you should take steps to ensure when using unsecured Wi-Fi, that you broadcast as little information as possible. For instance, turn off any file-sharing features on your devices in the privacy settings on a mobile or from the system preference or control panel.
Beyond this, it is also beneficial to turn off any ‘network discovery’ settings on your devices. Settings like this allow any devices on the network to locate yours – and that includes those of hackers!
Security barriers
Typical security barrier solutions such as firewalls and antivirus software can also help protect while using unsecured Wi-Fi and should always be enabled. Firstly, firewalls because they can help prevent hackers from unauthorised external access to your system and will act as a barrier from malware threats which are data-based. Secondly, antivirus software because it will detect any malware that might get into your system when unsecured Wi-Fi networks are used. You should always make sure the latest version of antivirus is installed on all devices.
Safe use of unsecured Wi-Fi
Our online security is important wherever we may be working, but those risks associated with public Wi-Fi are ones we all need to be acutely aware of. Login information and sensitive data inceptions are very real threats, as is network and bandwidth theft, and the illegal usage of your network. With free public (unsecured) Wi-Fi now a common feature at many gathering places and remote work becoming more commonplace, these dangers of unsecured Wi-Fi will continue to be a concern.
Luckily, by educating yourself on the risks and knowing the steps you can take to eliminate them, you will be able to establish the safe use of such Wi-Fi connections. Implementation of a VPN or RDS will be the centrepiece of a defence against the dangers, while ensuring the right security barriers, managed privacy settings and encrypted connections will be great additions to your defence as well.
The entrust IT Group have worked with many companies on their cyber security over the years and have implemented solutions which can help staff work from anywhere, completely securely. For example, our flagship product, the entrustIT Hosted Workspace is an example of a Remote Desktop Service. It is a solution based on a menu of private and public cloud services chosen by the customer on what is critical to their business. The workspace can be accessed on any device and is encrypted so is consequently secure, so there are no security or compatibility issues even if the user is working in a remote location connected to public Wi-Fi.
We have seen first-hand the devasting impacts using unsecured Wi-Fi wrongly can have on a business and individual if successful. Making changes now will mean you don’t experience these now or down the line. Please get in touch if you need help on protecting your business from these dangers as one of our experienced consultants will be happy to offer some advice.
Subscribe here!
Recent Posts
Posts by tag
- technology (124)
- Security (97)
- cyber security (85)
- IT Security (81)
- Cloud (65)
- Microsoft 365 (63)
- modern technology (62)
- Managed Service (60)
- business (60)
- cloud computing (59)
- cyber attack (54)
- workplace (54)
- IT support (53)
- cloud it (53)
- Microsoft Teams (52)
- microsoft (51)
- Working from home (50)
- productivity (47)
- office (46)
- cybersecurity (44)
- office 365 (44)
- IT (41)
- Uncategorised (38)
- employees (38)
- entrustit (38)
- flexible work (36)
- Password Security (34)
- Remote (33)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- school ict (27)
- collaboration (26)
- 2023 (25)
- Cyber (24)
- cyber privacy (22)
- public cloud (22)
- computing (21)
- email security (20)
- password (20)
- it support bournemouth (19)
- passwords (19)
- entrust (18)
- hosted applications (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- data (16)
- it support dorset (16)
- teamwork (16)
- Coronavirus (15)
- GDPR (14)
- hackers (14)
- office 365 support (14)
- ransomware (14)
- IT audit (13)
- Protection (13)
- cloud cctv (13)
- covid-19 (13)
- hack (13)
- it support hampshire (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- cctv (12)
- hardware (12)
- internet (12)
- it consultancy (12)
- 2020 (11)
- 2022 (11)
- hybrid cloud (11)
- internet safety (11)
- IT costs (10)
- Microsoft Planner (10)
- data breach (10)
- it consultancy bournemouth (10)
- it support southampton (10)
- it support winchester (10)
- phishing (10)
- vulnerabilities (10)
- windows (10)
- windows 10 (10)
- Backup (9)
- bitwarden (9)
- digital (9)
- it consultancy hampshire (9)
- telephony (9)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- it consultancy dorset (8)
- it consultancy southampton (8)
- msp (8)
- planning (8)
- software (8)
- staff (8)
- uk (8)
- Google (7)
- OneDrive (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- partnership (7)
- 2019 (6)
- Apple (6)
- Hampshire (6)
- IT Director (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- cloud storage (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- usecure (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Bournemouth (5)
- Desktop (5)
- ISO (5)
- News (5)
- Risk assessment (5)
- Windows 7 (5)
- awards (5)
- brexit (5)
- designer (5)
- personal data (5)
- resources (5)
- smartphone (5)
- website (5)
- Access Management (4)
- BYOD (4)
- Dorset (4)
- Facebook (4)
- Government (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- 2021 (3)
- 2024 (3)
- Attacks (3)
- Case Studies (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Microsoft Forms (3)
- NHS (3)
- New Forest (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- ddos (3)
- digital hub (3)
- disaster recovery (3)
- guide (3)
- instagram (3)
- internet of things (3)
- meetings (3)
- sme (3)
- storage (3)
- surrey (3)
- teaching (3)
- trump (3)
- twitter (3)
- 2016 (2)
- 2018 (2)
- CAD (2)
- DR (2)
- DR planning (2)
- Environment (2)
- Firewall (2)
- Gen Z (2)
- ISBA (2)
- Local (2)
- Macs (2)
- Microsoft Copilot (2)
- PaaS (2)
- Tiva (2)
- android (2)
- artificial intelligence (2)
- award winning (2)
- bcs (2)
- broadband (2)
- camcloud (2)
- computer performance (2)
- digital transformation (2)
- downtime (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- innovation (2)
- legalex (2)
- london (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- strategy (2)
- united kingdom (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- 5G (1)
- AI (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burhill (1)
- Burhill Group (1)
- Burnout (1)
- CEO (1)
- ChatGPT (1)
- Cloudtango (1)
- GPT-4 (1)
- Go Integrator (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Leaders (1)
- Loop (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Mr Mulligans (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Privacy Shield (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Surrey Business Awards (1)
- Sydenhams (1)
- Tech Company of the Year (1)
- The Business Magazine (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- acquisition (1)
- afc bournemouth (1)
- afcb (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- builders merchant (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- copilot (1)
- copilot pro (1)
- copyright (1)
- cryptocurrency (1)
- dark web (1)
- dns (1)
- donald (1)
- dyn (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- meltdown (1)
- millennials (1)
- mirai (1)
- no-deal (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- procrastination (1)
- recruitment (1)
- research (1)
- serval systems (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet bournemouth (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)