Use Trusted Networks
Plain English Translation
Public Wi-Fi networks are often unencrypted and susceptible to interception by malicious actors. Organizations must train employees to use secure, trusted connections such as corporate Wi-Fi or cellular data networks instead of public hotspots. Educating users on remote work security policy and implementing technical controls helps prevent unauthorized access to sensitive information.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Incorporate public Wi-Fi security guidelines into the acceptable use policy.
- Train staff to use cellular hotspots instead of coffee shop Wi-Fi.
Required Actions (scaleup)
- Deploy Mobile Device Management (MDM) profiles that prevent devices from automatically joining known open networks.
- Require VPN for public Wi-Fi connections via client software.
Required Actions (enterprise)
- Enforce an always-on VPN requirement for remote access.
- Use MDM Wi-Fi restrictions to block unknown SSIDs or enforce a strict allowlist of corporate networks.
Public Wi-Fi networks typically lack strong encryption, making them prime targets for man-in-the-middle attacks and packet sniffing. When employees connect to these networks without protection, sensitive corporate data can be easily intercepted by malicious actors on the same network.
CyberSecure Canada requirements for public Wi-Fi use mandate that organizations educate users to prioritize trusted networks. Specifically, employees must be trained to use corporate Wi-Fi or cellular data network connectivity rather than public Wi-Fi.
Yes, if an employee must connect to an untrusted network, using a VPN for public Wi-Fi is essential. A virtual private network encrypts the connection, protecting data from local interception, which is a key component of a remote work security policy.
Organizations can enforce no public Wi-Fi on company devices by using Mobile Device Management (MDM) solutions. MDM administrators can deploy configuration profiles that disable automatic connections to open networks and restrict users from manually joining unapproved SSIDs.
Corporate Wi-Fi uses strong encryption like WPA or WPA Enterprise, and cellular data relies on encrypted telecommunication networks, making both trusted. Public Wi-Fi is often open and unencrypted, making it an untrusted network in cybersecurity where data is exposed to anyone listening.
Employee training on public Wi-Fi risks should teach staff to verify network names with venue staff and avoid networks lacking password requirements. Training should emphasize that attackers often create spoofed hotspots with legitimate-sounding names to trick users into connecting.
A strong mobile hotspot security policy for employees should dictate the use of cellular tethering over café Wi-Fi. Additionally, implementing an always-on VPN requirement for remote access ensures that all traffic remains encrypted regardless of the underlying connection.
MDM Wi-Fi restrictions block unknown SSIDs by pushing a predefined list of approved corporate and home networks to the device. Any network not on the allowlist is automatically blocked, preventing employees from connecting to potentially dangerous public hotspots.
Auditors will look for documented corporate Wi-Fi vs public Wi-Fi policy guidelines within your information security policy. You should also maintain awareness training logs and policy acknowledgement records showing that employees have been educated on these specific wireless risks. Tools like WatchDog Security's Policy Management can help centralize version-controlled policies and maintain acceptance tracking, while WatchDog Security's Compliance Center can link those records to this control for faster audits.
While the standard emphasizes using cellular or corporate networks, practically, organizations can allow public Wi-Fi if strict compensating controls are in place. This includes enforcing an always-on VPN, requiring multi-factor authentication, and ensuring users are trained on how to secure employees using public Wi-Fi safely.
Educating users to avoid public Wi-Fi only works if the expectation is documented and training completion can be demonstrated. Tools like WatchDog Security's Compliance Center can map this control to required artifacts (policies, training records) and track evidence status over time, making it easier to show auditors that user education and enforcement activities are in place.
Organizations often struggle to prove who received guidance and when it was reinforced, especially as teams grow and roles change. Tools like WatchDog Security's Security Awareness Training can track completion of role-based learning on public Wi-Fi risks, and WatchDog Security's Policy Management can record policy acceptance and maintain version history so training and acknowledgement evidence stays audit-ready.
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-24 | WatchDog Security GRC Team | Initial publication |