The Worst Places To Connect To Public Wi-Fi

If you or members of your workforce are travelling for business, you should be particularly cautious of business email compromise (BEC). This involves hackers attempting to access email accounts to carry out fraud, such as transferring funds. Another method cyber criminals may try is identity theft or compromising accounts.

Hackers can intercept data sent over an unsecure network, therefore, any information that you input, such as passwords, could be used to break into your online accounts such as business accounts or even steal your identity via compromised passport information.

Here are some of the worst public places currently used for Wi-Fi connection. 

Restaurants/Coffee shops:   Large restaurants or coffee shops see numerous customers pass through their doors daily, all of whom have access to the public Wi-Fi that the venue offers. This open access can leave users vulnerable to hackers who are able to exploit the lack of security in the Wi-Fi network and utilise this to access user data, otherwise known as a MITM (Man in the Middle) attack.

From this, hackers can access information on websites that users visit, browsing activity, and more personal information such as passwords and financial transactions. This can leave user logins and other personal data vulnerable being stolen by a hacker. 

Hotels:   Hotel Wi-FI can prove useful to your employees whether they are on a business trip or catching up on uncompleted work, however, hotel Wi-Fi often provides full public access, meaning anyone can access and monitor it. 

Router hacking is just one of the ways hackers can take advantage of open access hotel Wi-Fi. This involves hackers or cyber criminals gaining control of a router in order to take advantage of its vulnerabilities, resulting in access to personal and sensitive information. 

This can be a threat to anyone who is on the hotel’s Wi-Fi as their personal cyber information can become available to hackers using this method.

Public Transport:   Despite many employees working in a remote or hybrid capacity, certain roles will still require travel to and from work meetings from time to time, and Wi-Fi on public transport such as trains can be useful if employees have work to complete before getting to their destination. 

Nevertheless, its safety and security can be easily compromised by hackers due to its open access, making it a frequent target for attack.

As such, using Wi-Fi on trains for completing work whilst commuting can leave many employees susceptible to hackers who could gain access to important business data, financial data, or even private and personal information such as logins.

One way hackers may exploit data via transport Wi-Fi is through Malware attacks. This entails cyber criminals interfering with a device in order to gain access to its information. This is common on unsecure networks, as hackers can easily access devices when connected to the same Wi-Fi as their victims.

 Airports:  If on a business trip, you should make your employees aware that they should be vigilant when using airport Wi-Fi, as airports are hotspots for cybercriminals looking to target personal information such as passwords, financial data, or business data.

Commenting on these Wi-Fi dangers Venky Sundar, President of application security firm Indusface said  “Public Wi-Fi is more vulnerable to attacks. If your employees use public Wi-Fi networks, the chances of getting a malware infection is high"  

To minimise the potential damage, Indusface recommend that employers focus on two aspects: 

  •  Endpoint Security. In endpoint security it is all about using good antivirus software and making sure to instal automatic updates
  • Application Security. Application security is the second layer of defence, Iin case your employee’s computer does get compromised, so the chance of malware infecting your company infrastructure is high. "This is where putting your applications behind a WAAP becomes critical. That way, even in case of a compromise, the WAAP blocks attacks and protects the infrastructure and applications.” Veky advises.

It is vital not only for employees, but for businesses, to ensure that they are adequately protected when using public Wi-Fi. There are numerous methods you can use to do so. Additional steps businesses and employees can take to help protect against cyber attacks include:-

  • Turn off the auto-connect Wi-Fi setting, as this can automatically connect you to open access public networks nearby that may not be secure, and can leave you vulnerable to attack.
  • Use a VPN (Virtual Private Network), as this can help ensure your data isn’t visible to hackers as it goes through the network you are on. If it becomes visible, hackers can breach your digital privacy and gain access to your private company or personal data.
  • Ensure you have anti-virus software installed on your device. This can help protect you whilst using public Wi-Fi, as it has the ability to detect malware that may find its way into your system whilst using the public network. The software will issue an alert to you if any viruses are on your device, if there is any suspicious activity, or attack.
  • Perform gray box DAST scans on all your web and mobile applications so that you know the exact risk when the admin or user credentials get compromised. Once you understand the risks, mitigate them on code.
  • Implement a Web application and API Protection (WAAP) solution so that when your employee's endpoint gets compromised, the attacks that originate out of that compromised endpoint get blocked at the WAAP. 

The best protection is to not use these public Wi-Fi networks at all, as you can never be sure about how your remote employees will comply with these guidelines.

Image: Christine Hume

You Might Also Read: 

Cyber Criminals Exploit Lockdown Workers:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Why DNS Protection Should Be A Crucial Part In Building Cyber Defense
Enterprise Cybersecurity Today: A Vast Landscape To Secure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

Edvance

Edvance

Edvance operates a range of cybersecurity businesses including value added cybersecurity solutions distribution, security technology innovation and development, and SaS solution offerings.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

CyberSec Hub

CyberSec Hub

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.