Avoid Untrusted Wi-Fi
Plain English Translation
Public Wi-Fi networks at coffee shops, airports, and hotels are often unencrypted and poorly secured, making them a prime hunting ground for cybercriminals. CyberSecure Canada requires organizations to train their employees on the dangers of untrusted Wi-Fi. By educating staff to avoid open networks, use cellular hotspots instead, and always connect through a secure VPN when public Wi-Fi is the only option, organizations can protect sensitive corporate data from being intercepted by attackers.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Include guidelines on avoiding public Wi-Fi in the employee handbook.
- Ensure all employees complete basic security awareness training covering Wi-Fi risks.
- Advise employees to use their smartphone's cellular data hotspot for work tasks when traveling.
Required Actions (scaleup)
- Deploy a corporate VPN solution and require its use whenever employees are outside the trusted office network.
- Require formal acknowledgment of a mobile device security policy.
- Implement endpoint protections that alert users when joining an unencrypted Wi-Fi network.
Required Actions (enterprise)
- Utilize Enterprise Mobility Management (EMM) or MDM tools to technically prevent corporate devices from joining open Wi-Fi networks.
- Deploy Always-On VPN configurations that automatically encrypt traffic the moment a device connects to any untrusted network.
- Provide dedicated cellular hotspots to all frequent travelers to eliminate the need for public Wi-Fi entirely.
Generally, no. Public WiFi security is inherently weak because these networks are often unencrypted and open to anyone. For secure remote work on public Wi-Fi, employees must always use a corporate VPN or alternative secure connections to prevent interception of sensitive corporate email and data.
The CyberSecure Canada public Wi-Fi requirement under Section 6.1.2.1(b) mandates that organizations must educate their users to actively avoid connecting to untrusted Wi-Fi networks on their mobile devices. This forms a core part of the organization's security awareness training.
To learn how to spot a fake Wi-Fi hotspot, employees should verify the exact network name (SSID) with the venue staff. Attackers often create evil twin networks with names slightly misspelled or identical to legitimate ones. If a network doesn't require a password or asks for unusual personal information to connect, it is likely an untrusted Wi-Fi network.
Yes, using a VPN for public WiFi is an essential security measure. It creates an encrypted tunnel for data, ensuring public Wi-Fi man-in-the-middle attack prevention. A company policy public Wi-Fi VPN should require its use whenever an employee must connect to any network outside the trusted corporate office.
To disable auto connect to open Wi-Fi, employees should check their device's Wi-Fi settings and turn off Auto-Join or Connect to public networks. Organizations should include avoid untrusted Wi-Fi networks training that shows users exactly how to disable these settings on iOS, Android, and laptops.
The biggest risks include packet sniffing, man-in-the-middle attacks, and malware distribution. When users connect to an untrusted Wi-Fi network, attackers on the same network can potentially intercept unencrypted data, steal login credentials, or inject malicious code into the traffic.
While HTTPS encrypts the content of the traffic, attackers can still see which websites are being visited. Furthermore, advanced attackers can attempt SSL stripping attacks or exploit misconfigurations to downgrade the connection to HTTP, allowing them to intercept passwords if work laptop public Wi-Fi best practices are not followed.
Using a cellular mobile hotspot instead of public Wi-Fi is significantly safer. Cellular networks use strong encryption that is much harder for local attackers to intercept. Educating employees to use their corporate smartphone's tethering feature is a highly recommended practice for avoiding untrusted Wi-Fi.
A strong company policy public Wi-Fi VPN should explicitly prohibit accessing sensitive corporate data over open networks, mandate the use of a corporate VPN if public access is unavoidable, require devices to disable automatic connections, and define exactly what is an untrusted Wi-Fi network.
Security awareness training should cover avoid untrusted Wi-Fi networks training at least annually. For employees who travel frequently, it is a best practice to provide a brief refresher on mobile device security and public Wi-Fi risks before major business trips.
Auditors typically expect evidence that users were trained and that key policies were acknowledged. Tools like WatchDog Security's Compliance Center can map this control to required evidence (e.g., training completion records and policy attestations), highlight gaps by team or role, and keep an audit-ready history of who completed training and when.
Training programs often fail when completion tracking and follow-ups are manual. Tools like WatchDog Security's Security Awareness Training can assign role-based micro-courses on public Wi-Fi risks, track completion and overdue training, and generate reports that support compliance reviews and internal governance.
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-24 | WatchDog Security GRC Team | Initial publication |