{"id":3172,"date":"2022-02-03T10:40:32","date_gmt":"2022-02-03T07:40:32","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=3172"},"modified":"2022-02-03T11:02:47","modified_gmt":"2022-02-03T08:02:47","slug":"risks-of-public-wifi-and-how-to-stay-safe","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/","title":{"rendered":"6 Risks of Using Public Wi-Fi and How to Stay Safe"},"content":{"rendered":"\n<p>Public WiFi can pose a significant threat for businesses or individuals using them for work.<\/p>\n\n\n\n<p>It is not uncommon to walk into many coffee shops on a weekday and spot a large number of customers working on their laptops. Today, many entrepreneurs, students and businessmen and women treat these locations like a second office. WiFi in most of these places is usually free, but not always, for patrons.<\/p>\n\n\n\n<p>The same applies to WiFi in hotels, restaurants, airports, bookstores, libraries and some retail outlets. Effectively, you\u2019re never too far off from a public WiFi hotspot to access the internet and your work email or documents for those with access to <a href=\"https:\/\/www.mailsafi.com\/file-sync-and-sharing\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">team collaboration tools<\/mark><\/a>. Most guests, especially those on business meetings or on holiday and therefore sleeping over at the facility, will often access the free WiFi offered in these spaces.<\/p>\n\n\n\n<p>A large number of people who access public WiFi often access sensitive or confidential company or personal information on their devices. Unfortunately, many of these users are unaware of the threat posed by accessing the internet over public WiFi.<\/p>\n\n\n\n<p>In this article, we discuss:<\/p>\n\n\n\n<ul><li>The risks of using public. <\/li><li>8 tips on how to stay safe when accessing WiFi in public areas using public WiFi.<\/li><\/ul>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69edb97134567\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69edb97134567\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#1_The_Risks_of_Using_Public_WiFi\" title=\"1. The Risks of Using Public WiFi\">1. The Risks of Using Public WiFi<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#i_Theft_of_the_Data_Held_Your_Device\" title=\"i. Theft of the Data Held Your Device\">i. Theft of the Data Held Your Device<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#ii_Man-In-The-Middle_Attacks_Impersonation_Attacks\" title=\"ii. Man-In-The-Middle Attacks (Impersonation Attacks)\">ii. Man-In-The-Middle Attacks (Impersonation Attacks)<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#Step_1_%E2%80%93_The_Deceit\" title=\"Step 1 \u2013 The Deceit\">Step 1 \u2013 The Deceit<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#Step_2_%E2%80%93_The_DataCredential_Capture\" title=\"Step 2 \u2013 The Data\/Credential Capture\">Step 2 \u2013 The Data\/Credential Capture<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#Step_3_%E2%80%93_The_Impersonation_Attacks\" title=\"Step 3 \u2013 The Impersonation Attacks\">Step 3 \u2013 The Impersonation Attacks<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#iii_Unencrypted_Connections_%E2%80%93_Packet_SniffingEavesdropping\" title=\"iii. Unencrypted Connections \u2013 Packet Sniffing\/Eavesdropping\">iii. Unencrypted Connections \u2013 Packet Sniffing\/Eavesdropping<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#iv_Distribution_of_Malware\" title=\"iv. Distribution of Malware\">iv. Distribution of Malware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#v_Your_Session_Can_be_Hijacked\" title=\"v. Your Session Can be Hijacked\">v. Your Session Can be Hijacked<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#vi_Your_Data_May_Be_Captured_and_Sold_to_Advertisers\" title=\"vi. Your Data May Be Captured and Sold to Advertisers\">vi. Your Data May Be Captured and Sold to Advertisers<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#3_How_to_Protect_Yourself_From_the_Risks_of_Public_WiFi\" title=\"3. How to Protect Yourself From the Risks of Public WiFi\">3. How to Protect Yourself From the Risks of Public WiFi<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#i_Use_Cellular_Data_or_a_Mobile_Hotspot_in_public_spaces\" title=\"i. Use Cellular Data or a Mobile Hotspot in public spaces\">i. Use Cellular Data or a Mobile Hotspot in public spaces<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#ii_Don%E2%80%99t_Access_Sensitive_Sites_or_Email\" title=\"ii. Don&#8217;t Access Sensitive Sites or Email\">ii. Don&#8217;t Access Sensitive Sites or Email<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#iii_Keep_your_browsing_to_a_minimum\" title=\"iii. Keep your browsing to a minimum\">iii. Keep your browsing to a minimum<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#iv_Use_a_Virtual_Private_Network_VPN_Service\" title=\"iv. Use a Virtual Private Network (VPN) Service\">iv. Use a Virtual Private Network (VPN) Service<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#v_Use_SSL\" title=\"v. Use SSL\">v. Use SSL<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#vi_Use_Two-factor_Authentication_2FA\" title=\"vi. Use Two-factor Authentication (2FA)\">vi. Use Two-factor Authentication (2FA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#vii_Turn_Wi-Fi_off_When_You_Aren%E2%80%99t_Using_It\" title=\"vii. Turn Wi-Fi off When You Aren\u2019t Using It\">vii. Turn Wi-Fi off When You Aren\u2019t Using It<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#viii_Use_endpoint_protection_on_your_devices\" title=\"viii. Use endpoint protection on your devices\">viii. Use endpoint protection on your devices<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#4_Summary\" title=\"4. Summary\">4. Summary<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"1-the-risks-of-using-public-wifi\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"1_The_Risks_of_Using_Public_WiFi\"><\/span>1. <strong>The Risks of Using Public WiFi<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It is important to understand the risks of using public WiFi to keep you situation-aware. A study carried out by the Kaspersky Security Network showed that nearly a quarter of the world&#8217;s public WiFi hotspots do not use any kind of <a href=\"https:\/\/www.mailsafi.com\/glossary\/encryption\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">encryption<\/mark><\/a>.&nbsp;It is critical to ensure that the WiFi network you are connecting to is encrypted. Nevertheless, there are still other threats posed in the use of public WiFi even if a hotspot uses encryption.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/hacker-man-laptop_144627-25530.jpg\" alt=\"Hacker man on laptop Free Photo\"\/><figcaption>Risks of using public WiFi<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"i-theft-of-the-data-held-your-device\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"i_Theft_of_the_Data_Held_Your_Device\"><\/span><strong>i. Theft of the Data Held Your Device<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>One of the most serious and typical threats of accessing public WiFi is the theft of personal information. Personal information includes:<\/p>\n\n\n\n<ul><li>Login credentials (username, password, passcodes)<\/li><li>Financial information (credit or debit card details)<\/li><li>Personal data (full names, photos, Identity card or social security number)<\/li><\/ul>\n\n\n\n<p>If a cyber-attacker gets access to your laptop or other smart devices through an insecure public WiFi connection, the hacker can have access to all the data held in the device and even beyond. For example, they can:<\/p>\n\n\n\n<ul><li>Use your credit card or debit card details to transact online<\/li><li>Note your email login credentials to impersonate you with the aim of committing fraud<\/li><li>Use your personal data (full names, identity numbers, photos) to perpetrate fraud such as creating new accounts, perpetrating <a href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">SIM-SWAP fraud<\/mark><\/a><\/li><\/ul>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"ii-man-in-the-middle-attacks-impersonation-attacks\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"ii_Man-In-The-Middle_Attacks_Impersonation_Attacks\"><\/span><strong>ii. Man-In-The-Middle Attacks (Impersonation Attacks)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Even where a cybercriminal fails to gain access to the data on your device, they can still intercept the information you are sending over the internet. This is how they can capture usernames and passwords, credit card details, and other confidential information.<\/p>\n\n\n\n<p>You can think of a man-in-the-middle attack simply as eavesdropping. Two parties may be connecting to each other (via email, video calls, browsing, etc) but a third party intercepts their communication\/connection. &nbsp;<\/p>\n\n\n\n<p>Where public WiFi is concerned, this is typically how a man-in-the-middle attack works.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"step-1-the-deceit\" style=\"font-size:16px\"><span class=\"ez-toc-section\" id=\"Step_1_%E2%80%93_The_Deceit\"><\/span><strong>Step 1 \u2013 The Deceit<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>You may be accessing WiFi at a coffee shop or hotel. The facility gives you the WiFi network name and password. You settle in and select the WiFi network \u2013 without paying close attention to the network name. There may be two with similar names, e.g., CafeR and CaffeR. While CafeR may be the legitimate connection, you may select CaffeR without giving it much thought. You log in and start working.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"step-2-the-data-credential-capture\" style=\"font-size:16px\"><span class=\"ez-toc-section\" id=\"Step_2_%E2%80%93_The_DataCredential_Capture\"><\/span><strong>Step 2 \u2013 The Data\/Credential Capture<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>What you didn\u2019t know is that CaffeR has in fact been set up by a hacker who\u2019s sitting not too far away from where you are. The hacker has set up a hotspot with a name similar to that of the facility to trick you and other unsuspecting patrons.<\/p>\n\n\n\n<p>When you connect to CaffeR, everything appears to work as it should, and therefore there is no cause for alarm. However, in reality, what is happening is that everything you\u2019re doing on that internet connection is being tracked on the hacker&#8217;s device. The hacker in this case is the man-in-the-middle. He or she can easily capture your login credentials and everything else you do on that \u201cpublic WiFi\u201d connection.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"step-3-the-impersonation-attacks\" style=\"font-size:16px\"><span class=\"ez-toc-section\" id=\"Step_3_%E2%80%93_The_Impersonation_Attacks\"><\/span><strong>Step 3 \u2013 The Impersonation Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Armed with this information, the \u201cman-in-the-middle\u201d can then proceed to use information captured for further attacks. For instance, they may:<\/p>\n\n\n\n<ul><li>Use any confidential personal or client data captured to demand ransom from you<\/li><li>Access your email to impersonate you with an aim of committing <a href=\"https:\/\/www.mailsafi.com\/business-email-compromise-bec-or-eac\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Business Email Compromise\/CEO Fraud Attacks<\/mark><\/a><\/li><li>Login to your business email account to send malicious files (malware, viruses, spam) or links to people you know<\/li><li>Access your bank accounts and transact<\/li><li>Use your credit card details for online purchases<\/li><\/ul>\n\n\n\n<p>It takes longer to detect an impersonation attack. Oftentimes, the damage has already been done, resulting in a financial or reputational loss.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-pullquote is-style-default\"><blockquote><p><strong><em>Fun fact: Common abbreviations for a man-in-the-middle attack include MITM, MitM, MiM, and MIM<\/em><\/strong>.<\/p><\/blockquote><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"iii-unencrypted-connections-packet-sniffing-eavesdropping\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"iii_Unencrypted_Connections_%E2%80%93_Packet_SniffingEavesdropping\"><\/span><strong>iii. Unencrypted Connections \u2013 Packet Sniffing\/Eavesdropping<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>When you connect to a website that supports encryption, the data that goes back and forth is encoded using a secure key. If anyone was to intercept that data without the possession of the secure key, they would not be able to read it. The data would appear unreadable like computer code. This is in fact the ideal setup.<\/p>\n\n\n\n<p>Unfortunately, not all websites offer encryption. If you have come across a website address prefixed with just HTTP, this is a sure way to know it is not encrypted. If it starts with HTTPS, then the website is encrypted.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote is-style-default\"><blockquote><p><strong>When you are connected to a public WiFi network, anyone within range of your device can intercept everything you send or receive.<\/strong><\/p><\/blockquote><\/figure>\n\n\n\n<p>Therefore, if you access an unencrypted website, it will all be fully readable by the other party who has intercepted your connection. To eavesdrop on your connection, a hacker will use a tool called a packet analyzer or packet sniffer. Packet analyzers or packet sniffers allow viewing of everything transmitted over the unencrypted connection<\/p>\n\n\n\n<p><strong>Note<\/strong>: Packet sniffers and packet analyzers are not bad tools. They, in fact, have positive use cases. For instance, network administrators can use them to troubleshoot network connection problems with their wireless networks.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"iv-distribution-of-malware\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"iv_Distribution_of_Malware\"><\/span><strong>iv. Distribution of Malware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Another risk of using Public WiFi is that a cyber attacker can install malware on your device. Malware includes:<\/p>\n\n\n\n<ul><li>Viruses<\/li><li>Worms<\/li><li>Trojan horses<\/li><li>Ransomware<\/li><li>Adware<\/li><\/ul>\n\n\n\n<p>A malicious actor on the same public WiFi as you can install malware on your device if it is not properly secured. Such malware may cause your device to malfunction or steal data from it.<\/p>\n\n\n\n<p>A malicious WiFi service provider may also use the opportunity to overlay every website you visit with ads. In this case, the ads would normally disappear as soon as you disconnect from the free WiFi.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"v-your-session-can-be-hijacked\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"v_Your_Session_Can_be_Hijacked\"><\/span><strong>v. Your Session Can be Hijacked<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Session takeover is another public WiFi security threat. In this case, an attacker intercepts information about your computer and its connection to websites or other services. Once the attacker has that information, he can configure his own computer to match yours and hijack the connection.<\/p>\n\n\n\n<p>For instance, a hacker can hijack your connection to your bank&#8217;s online portal after you log in. From the bank&#8217;s end of the connection, it appears as though this is still your device, and since you are already logged in, the cyber attacker would have access to all your bank details on the portal.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"vi-your-data-may-be-captured-and-sold-to-advertisers\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"vi_Your_Data_May_Be_Captured_and_Sold_to_Advertisers\"><\/span><strong>vi. Your Data May Be Captured and Sold to Advertisers<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You may be working remotely such as when on a road trip, away on holiday or even stuck in traffic. You may find yourself connecting to public WiFi to check your email, view or download files, review clients\u2019 details and so on.<\/p>\n\n\n\n<p>As earlier mentioned, many of these public WiFi services are often offered free of charge. However, as you\u2019ve probably already come to realize that \u201cfree\u201d is not always free. There must be some benefit derived by the service provider to offer this for free. In this case, some WiFi service providers may be tracking everything you\u2019re doing on the WiFi connection and sell your data to advertisers for a fee.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"3-how-to-protect-yourself-from-the-risks-of-public-wifi\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"3_How_to_Protect_Yourself_From_the_Risks_of_Public_WiFi\"><\/span>3. How to Protect Yourself From the Risks of Public WiFi<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Learning how to protect yourself when accessing the internet and other internet resources in public spaces will go a long way in ensuring your business and personal data remains safe.<\/p>\n\n\n\n<p>If you must use public WiFi, here are some tips on how to protect yourself from the threats discussed above. While some are more effective than others, keep in mind that <strong>hackers tend to aim for the path of least resistance<\/strong>. If you have taken some steps to protect yourself, they will more likely abandon their attempt to attack you and move on to an easier target.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"i-use-cellular-data-or-a-mobile-hotspot-in-public-spaces\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"i_Use_Cellular_Data_or_a_Mobile_Hotspot_in_public_spaces\"><\/span>i. Use Cellular Data or a Mobile Hotspot in public spaces<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The safest way to avoid the threats of public WiFi is to simply avoid it. Even if you must browse in that caf\u00e9, on holiday, etc., consider investing a little more to ensure you\u2019re browsing on a secure network. Consider using your smartphone or tablet for example, as a mobile WiFi hotspot \u2013 using your known cellular data \u2013 from your trusted service provider\u2019s network. Today, some of the latest smartphones and tablets support <a href=\"https:\/\/goodspeed.io\/blog\/beginner-guide-everything-you-need-to-know-about-eSIM.html\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">digital eSIM<\/mark><\/a> There is growing adoption of eSIMs as well as <a href=\"https:\/\/goodspeed.io\/goodspeed.html\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">mobile hotspots for international travelers<\/mark><\/a> as they make it less cumbersome for people who travel across borders to set up mobile hotspots without having to constantly acquire new SIM cards in every country. Mobile hotspots can also be shared between multiple devices and therefore shared between different users working away from the office.<\/p>\n\n\n\n<p>Using your own private connection is not only more secure than a public WiFi connection. It is also faster as it\u2019s not being shared with multiple users at the facility you\u2019re at.<\/p>\n\n\n\n<p>However, we understand that sometimes you have no alternatives and may need to access public WiFi \u2013 such as stuck in a new country or in transit in an airport or simply run out of funds to pay for your cellular data! As mentioned earlier, most hackers will look for easy targets. Here are a few precautions you can take when you must access public WiFi.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"ii-don-t-access-sensitive-sites-or-email\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"ii_Don%E2%80%99t_Access_Sensitive_Sites_or_Email\"><\/span>ii. <strong>Don&#8217;t Access Sensitive Sites or Email<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>First, if you must connect to a public WiFi network with no protection measurements in place, make sure not to share anything private or log into any sensitive websites. This includes:<\/p>\n\n\n\n<ul><li>Online shopping checkout (which would require you to key in your payment details)<\/li><li>Internet banking<\/li><li>Accessing medical or insurance (health, life) records<\/li><li>Checking office<\/li><\/ul>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"iii-keep-your-browsing-to-a-minimum\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"iii_Keep_your_browsing_to_a_minimum\"><\/span><strong>iii. Keep your browsing to a minimum<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Disconnect from public WiFi as soon as you find the information you need.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"iv-use-a-virtual-private-network-vpn-service\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"iv_Use_a_Virtual_Private_Network_VPN_Service\"><\/span><strong>iv. Use a Virtual Private Network (VPN) Service<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Where possible, use a virtual private network (VPN) when connecting to your business through a suspect connection like a public WiFi hotspot. With a virtual private network (VPN) service, everything you send and receive over a WiFi network is encrypted, regardless of whether the WiFi network or website you are accessing supports encryption.<\/p>\n\n\n\n<p>With a VPN, you connect to the VPN server over an encrypted connection and everything you do gets routed through that server. This means that anyone trying to eavesdrop or intercept your data will not be able to read it anyway. Since most hackers are after an easy target, they\u2019ll most likely discard any stolen data that is encrypted rather than going through the lengthy process of trying to decrypt it.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"v-use-ssl\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"v_Use_SSL\"><\/span>v. <strong>Use SSL<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You may not have access to a VPN for general internet browsing. However, if you enable the \u201cAlways Use HTTPS\u201d option on websites that require some kind of authentication (username and password), this will add an extra layer of protection. Most websites that need the user to log in support SSL.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"503\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/image.png\" alt=\"\" class=\"wp-image-3176\" srcset=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/image.png 975w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/image-300x155.png 300w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/image-768x396.png 768w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><figcaption>Set to use HTTPS not HTTP to minimize risks in public WiFi use<\/figcaption><\/figure>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"vi-use-two-factor-authentication-2fa\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"vi_Use_Two-factor_Authentication_2FA\"><\/span>vi. <strong>Use Two-factor Authentication (2FA)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Activate two-factor authentication wherever possible &#8211; especially for sensitive services such as your business email, online banking, and websites where purchases are done. Two-factor or multi-factor authentication adds an extra layer of security to your account beyond the password. This may be a security code sent to your smartphone via a specialized app such as <a href=\"https:\/\/support.google.com\/accounts\/answer\/1066447?hl=en&amp;co=GENIE.Platform%3DAndroid\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Google Authenticator<\/mark><\/a>. It may also be a biometric mode of authentication such as fingerprint scanning, retina scanning, face recognition. It can also be through a physical device such as a key fob. If a hacker manages to capture your login credentials such as username and password, they will still not be able to access your account without providing this second mode of authentication. Read more on the <a href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">benefits of two-factor authentication and why you should use it<\/mark><\/a><\/p>\n\n\n\n<p>Read also <a href=\"https:\/\/mailsafi.com\/blog\/problems-with-sms-for-2fa\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">why we do not recommend text messaging (SMS) for two-factor or multi-factor authentication<\/mark><\/a> and <a href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">how SIM-SWAP fraud affects your SMS-based 2FA<\/mark><\/a>.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"vii-turn-wi-fi-off-when-you-aren-t-using-it\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"vii_Turn_Wi-Fi_off_When_You_Aren%E2%80%99t_Using_It\"><\/span>vii. Turn Wi-Fi off When You Aren\u2019t Using It<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Even if you haven&#8217;t actively connected to a network, the Wi-Fi hardware on your laptop or device is still transmitting data between any WiFi network within range. There are security measures in place that may minimize the risk of this minor communication causing a compromise. However, it may not work on all wireless routers, and some hackers can also find a way around it. Therefore, we recommend that if you only need to work on, say, a Word or Excel document, keep your Wi-Fi turned off.<\/p>\n\n\n\n<p>As a bonus, your laptop or battery life will also last longer.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"313\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/image-1.png\" alt=\"\" class=\"wp-image-3178\" srcset=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/image-1.png 975w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/image-1-300x96.png 300w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/image-1-768x247.png 768w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><figcaption>Turning off file sharing in Windows 10 to stay safe in public spaces<\/figcaption><\/figure>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"viii-use-endpoint-protection-on-your-devices\" style=\"font-size:22px\"><span class=\"ez-toc-section\" id=\"viii_Use_endpoint_protection_on_your_devices\"><\/span>viii. <strong>Use endpoint protection on your devices<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Where possible, use endpoint protection (antivirus, antimalware, firewalls) on all your machines and devices. These can help to automatically scan files downloaded on your machine.<\/p>\n\n\n\n<p>Even individuals who take all the possible public Wi-Fi security precautions are going to run across issues from time to time. It&#8217;s just a fact of life in this interconnected age.<\/p>\n\n\n\n<p>Get in touch with <a href=\"https:\/\/www.kaluari.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Kaluari<\/mark><\/a> for <a href=\"https:\/\/www.kaluari.com\/gateway-security-and-endpoint-protection\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">best-in-class gateway and endpoint security solutions<\/mark><\/a>. We partner with providers including but not limited to BitDefender, Sophos, Kaspersky and Barracuda Networks to offer security solutions tailored for your business environment.<\/p>\n\n\n\n<p>We also offer <a href=\"https:\/\/www.mailsafi.com\/email-security\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">advanced email security<\/mark><\/a> (spam filtering) services for businesses including <a href=\"https:\/\/www.mailsafi.com\/microsoft-office-365-total-protection-with-mailSafi\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">email security for Microsoft 365<\/mark><\/a>. Our solutions are compatible with Exchange, Zimbra, MDaemon, shared hosting Cpanel, Linux MTAs, Office 365 and all other email platforms.<\/p>\n\n\n\n<p>Our MailSafi email and collaboration service comes with our full suite of MailSafi Email Security for advanced protection.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"4-summary\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"4_Summary\"><\/span>4. <strong>Summary<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Public WiFi can pose a significant threat to businesses and individuals using them for work.<\/p>\n\n\n\n<p>However, throughout any business traveler\u2019s life, a time comes when an unsecured, free, public Wi-Fi hotspot is the only option you have to get your urgent work done. Additionally, we also understand that the convenience of connecting to a free public WiFi can also be tempting and difficult to pass on. Understanding public Wi-Fi risks will ensure your important business data stays secure. Therefore, if you must use public WiFi, be alert and take measures to minimize the risk of theft of your data and personal information on public WiFi connections.<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_3172\" class=\"pvc_stats all  \" data-element-id=\"3172\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Public WiFi can pose a significant threat for businesses or individuals using them for work. It is not uncommon to walk into many coffee shops on a weekday and spot a large number of customers working on their laptops. Today, many entrepreneurs, students and businessmen and women treat these locations like a second office. WiFi [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_3172\" class=\"pvc_stats all  \" data-element-id=\"3172\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":3193,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[222,2,3,175],"tags":[282],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>6 Risks of Public WiFi and How to Stay Safe<\/title>\n<meta name=\"description\" content=\"If you must use public WiFi, understand 6 threats you&#039;re exposed to and 8 measures you can to minimize the risks on these connections.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Risks of Public WiFi and How to Stay Safe\" \/>\n<meta property=\"og:description\" content=\"If you must use public WiFi, understand 6 threats you&#039;re exposed to and 8 measures you can to minimize the risks on these connections.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-03T07:40:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-03T08:02:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/Free-WiFi-Zone.png\" \/>\n\t<meta property=\"og:image:width\" content=\"691\" \/>\n\t<meta property=\"og:image:height\" content=\"459\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"the_leaders\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"the_leaders\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/\"},\"author\":{\"name\":\"the_leaders\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\"},\"headline\":\"6 Risks of Using Public Wi-Fi and How to Stay Safe\",\"datePublished\":\"2022-02-03T07:40:32+00:00\",\"dateModified\":\"2022-02-03T08:02:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/\"},\"wordCount\":2571,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/Free-WiFi-Zone.png\",\"keywords\":[\"public wi-fi\"],\"articleSection\":[\"Digital Collaboration\",\"Email Hosting\",\"Email Security\",\"Resources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/\",\"name\":\"6 Risks of Public WiFi and How to Stay Safe\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/Free-WiFi-Zone.png\",\"datePublished\":\"2022-02-03T07:40:32+00:00\",\"dateModified\":\"2022-02-03T08:02:47+00:00\",\"description\":\"If you must use public WiFi, understand 6 threats you're exposed to and 8 measures you can to minimize the risks on these connections.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/Free-WiFi-Zone.png\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/Free-WiFi-Zone.png\",\"width\":691,\"height\":459,\"caption\":\"Public WiFi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Risks of Using Public Wi-Fi and How to Stay Safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\",\"name\":\"the_leaders\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"caption\":\"the_leaders\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Risks of Public WiFi and How to Stay Safe","description":"If you must use public WiFi, understand 6 threats you're exposed to and 8 measures you can to minimize the risks on these connections.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/","og_locale":"en_US","og_type":"article","og_title":"6 Risks of Public WiFi and How to Stay Safe","og_description":"If you must use public WiFi, understand 6 threats you're exposed to and 8 measures you can to minimize the risks on these connections.","og_url":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2022-02-03T07:40:32+00:00","article_modified_time":"2022-02-03T08:02:47+00:00","og_image":[{"width":691,"height":459,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/Free-WiFi-Zone.png","type":"image\/png"}],"author":"the_leaders","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"the_leaders","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/"},"author":{"name":"the_leaders","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14"},"headline":"6 Risks of Using Public Wi-Fi and How to Stay Safe","datePublished":"2022-02-03T07:40:32+00:00","dateModified":"2022-02-03T08:02:47+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/"},"wordCount":2571,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/Free-WiFi-Zone.png","keywords":["public wi-fi"],"articleSection":["Digital Collaboration","Email Hosting","Email Security","Resources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/","url":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/","name":"6 Risks of Public WiFi and How to Stay Safe","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/Free-WiFi-Zone.png","datePublished":"2022-02-03T07:40:32+00:00","dateModified":"2022-02-03T08:02:47+00:00","description":"If you must use public WiFi, understand 6 threats you're exposed to and 8 measures you can to minimize the risks on these connections.","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/Free-WiFi-Zone.png","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/02\/Free-WiFi-Zone.png","width":691,"height":459,"caption":"Public WiFi"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"6 Risks of Using Public Wi-Fi and How to Stay Safe"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14","name":"the_leaders","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","caption":"the_leaders"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3172"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=3172"}],"version-history":[{"count":15,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3172\/revisions"}],"predecessor-version":[{"id":3194,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3172\/revisions\/3194"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/3193"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=3172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=3172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=3172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}