Let’s say you need to send an urgent email to a client while you’re at the store. Or, you’re traveling and need to take a Zoom call at your hotel. Maybe you need to access sensitive client data or employee information while on public Wi-Fi. You wonder how you should connect to the internet to do your task. The easiest and simplest thing to do is just pull out your phone and get the job done. But what about Wi-Fi security concerns?

We’ve all heard the warnings that we should never use public Wi-Fi for business. So many things have changed since the pandemic. It’s important to revisit the old rules to see if they apply in our post-COVID-19 world. And Wi-Fi security is a prime example. So I decided to delve into the question to see whether there are safer ways to access an unsecured network. Should some things never be accessed over public wireless?

Remote Working Is Different Today

It used to be much easier to connect over secure wireless. After all, the boundaries between work and home were much clearer. At the time, we thought the boundaries were fuzzy. Then, the pandemic happened. The boundaries completely disappeared. Expectations for always being on reached new levels we didn’t think were possible.

Employees began using their flexibility for working wherever. For some, that meant working for months at a rental home somewhere across the country. For others, it meant taking advantage of the flexibility to go to the store during lunch. Most of us now find ourselves in more situations where we need to handle a work task outside the reaches of our secure internet.

It’s unrealistic for companies to expect employees to never do work over unsecured Wi-Fi. After all, many of them demand, even subtly, that employees be available all the time, no matter what. The right approach is instead to figure out a realistic and practical way to balance security with today’s business needs. And also be willing to accept that being always on isn’t the right answer for the company or employee.

Public Wi-Fi Security Concerns for Business

The next time you find yourself looking to log on to public wireless for work, stop and ask yourself if it can wait. If the answer is yes, then hit the pause button. Add the task to your to-do list for when you are at your office or in range of your secure home internet.

Browsers and sites have HTTPS and traffic encryption that safeguard them when using public Wi-Fi. Therefore, it’s pretty safe for consumers. Business data may be another matter, though, depending on the type of work you do.

If it can’t wait, one option is to connect using cellular data. You can do this by using your phone for the connection, such as using the Zoom app on your phone for your next video call. The other option is to tether another device to your mobile device and then access the internet. Your phone automatically encrypts all data sent over the cellular network. That protects you from many of the common schemes, such as accidentally connecting to fake public wireless or another person nearby using eavesdropping tools to see the data you transmit.

If there is no way to use cellular, such as when you lack a cell signal, another option is to connect over public wireless but use a browser with built-in encryption. This makes it much harder for a threat actor to intercept your data and then gain credentials to access your account.

Are Some Types of Data or Tasks Safer Than Others?

Yes. Maybe. Sort of. Not really. Some types of data are always unsafe to access over public internet because their value to the company is too high to take any risks, such as financial, customer and employee data. This is especially true for data protected by regulations and privacy laws. If you find yourself about to access these types of data over public Wi-Fi, just don’t do it. Sure, it’s very possible that nothing will happen if you do. But the value of the data to the company and the risk to the company if something happens to the data are too high.

But that doesn’t mean that the flip side is true – that it’s safe to access nonsensitive information over public wireless. While you’re connected over public wireless, cyber criminals can cause many types of harm, regardless of what you access. Your device could become infected with ransomware, which you then unknowingly spread to the network. A cyber criminal could also intercept your credentials and then use your access to log in to the network and cause harm. Or you might find yourself in one of many other scenarios that cause other parts of the network and data to be infected.

Do VPNs Improve Public Wi-Fi Security?

Most people assume the answer is to use a virtual private network (VPN). And that’s neither entirely wrong nor completely right. Even though the VPN industry has done a fabulous job of making you think the mere act of connecting through a VPN solves all problems, it’s not that simple. And as you might expect, not all VPNs are created equal. Does your niece in middle school use a free VPN to get around her school’s site blocker to access TikTok while in science class? That VPN is probably not the best choice to use when accessing sensitive information.

Many organizations are increasingly turning to use VPNs that are integrated into their cloud service provider. In addition to following the latest security protocols and protecting your data from current threats, this type of VPN typically does not require extra steps for the user. Importantly, this type of VPN also typically does not cause the internet to run too slowly, as is the case with many VPNs. An integrated solution also makes it much less likely that an employee will forget to log in to the VPN. That happens quite often when it’s a separate step, such as when using a third-party VPN.

As we emerge from our pandemic habits and routines, we can’t and won’t simply go back to the way things worked before. Take the time to create a solution for employees that works for today’s world, not the one before March 2020. That way, organizations can balance the need for safety and productivity when it comes to Wi-Fi security.

More from Data Protection

Heads Up CEO! Cyber Risk Influences Company Credit Ratings

4 min read - More than ever, cybersecurity strategy is a core part of business strategy. For example, a company’s cyber risk can directly impact its credit rating. Credit rating agencies continuously strive to gain a better understanding of the risks that companies face. Today, those agencies increasingly incorporate cybersecurity into their credit assessments. This allows agencies to evaluate a company’s capacity to repay borrowed funds by factoring in the risk of cyberattacks. Getting Hacked Impacts Credit Scoring As per the Wall Street Journal…

4 min read

IBM Security Guardium Ranked as a Leader in the Data Security Platforms Market

3 min read - KuppingerCole named IBM Security Guardium as an overall leader in their Leadership Compass on Data Security Platforms. IBM was ranked as a leader in all three major categories: Product, Innovation, and Market. With this in mind, let’s examine how KuppingerCole measures today’s solutions and why it’s important for you to have a data security platform that you trust. The Transformation of the Data Security Industry As digital transformation continues to expand, the impact it has had on enterprises is very apparent when…

3 min read

SaaS vs. On-Prem Data Security: Which is Right for You?

2 min read - As businesses increasingly rely on digital data storage and communication, the need for effective data security solutions has become apparent. These solutions can help prevent unauthorized access to sensitive data, detect and respond to security threats and ensure compliance with relevant regulations and standards. However, not all data security solutions are created equal. Are you choosing the right solution for your organization? That answer depends on various factors, such as your industry, size and specific security needs. SaaS vs. On-Premises…

2 min read

Understanding the Backdoor Debate in Cybersecurity

3 min read - The debate over whether backdoor encryption should be implemented to aid law enforcement has been contentious for years. On one side of the fence, the proponents of backdoors argue that they could provide valuable intelligence and help law enforcement investigate criminals or prevent terrorist attacks. On the other side, opponents contend they would weaken overall security and create opportunities for malicious actors to exploit. So which side of the argument is correct? As with most debates, the answer isn't so…

3 min read