Protect Your Computer While Using Public WiFi
Meraki Banner

Protect Your Computer While Using Public WiFi

Using free public WiFi at a coffee shop or an airport may be convenient, but it can also be dangerous. Most public places that offer free WiFi don’t use encryption to secure their WiFi networks. It’s important to remember that when you connect to public WiFi networks, you will be sharing the networks with other people.

Some technology allows you to view the wireless computer communications that are within range of your device. Unfortunately, cybercriminals can use this technology to see what you do on your devices, as well as the data you share with websites.

However, there are a couple of precautions you can take to help protect your devices while connecting to public WiFi networks:

  • Look for website URLs that include HTTPS at the beginning of the URL. The “S” at the end of HTTPS means “secure.” These types of websites are encrypted, which helps protect your information.
  • If your organization offers a virtual private network (VPN), use it! VPNs encrypt all your wireless communications on the device that you’re using. Even if you are accessing a website without HTTPS, your communication will be secured through your VPN. 
  • You can use a wireless device from your cell phone provider instead. 3G and 4G network access are different from WiFi, and this network access is not subject to WiFi security policies. 

Before working in a public place, ask your IT department about your organization’s data security policies, how to set up your VPN connection, or how to obtain a 3G or 4G cellular network card.



Knowbe4 Logo

Stop, Look, and Think. Don’t be fooled.

Like this article?

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

More Posts

Zero Trust Image 2
Cybersecurity

Understanding the Basics of Zero Trust

Why It’s Essential for Modern Cybersecurity In today’s digitally-driven world, the traditional perimeter-based security model is no longer sufficient. With the rise of remote work,

Cloud Security Services Image
Cybersecurity

The Five Biggest Cloud Security Threats

(And how to deal with them) Cloud computing has transformed business operations by enabling remote storage of data and applications, boosting agility and efficiency. However,

5 Signs Social Engineering
Cybersecurity

5 Signs of Social Engineering

Legitimate emails can exhibit these traits, but messages with three or more of them are at a higher risk of being part of a social

Digital Toad Image
Cybersecurity

TOAD Attack

What is a TOAD Attack? A TOAD attack, which stands for Telephone-Oriented Attack Delivery, is a relatively new type of phishing attack that combines voice

SuperPod with WiFi 6E

Plume SuperPod WiFi 6E Specs

SuperPod with WiFi 6

Plume SuperPod WiFi 6 Specs

SuperPod

Plume SuperPod Secs