Use Trusted Networks

Updated: 2026-02-24

Plain English Translation

Public Wi-Fi networks are often unencrypted and susceptible to interception by malicious actors. Organizations must train employees to use secure, trusted connections such as corporate Wi-Fi or cellular data networks instead of public hotspots. Educating users on remote work security policy and implementing technical controls helps prevent unauthorized access to sensitive information.

Executive Takeaway

Mandating the use of trusted networks mitigates the risk of data interception and unauthorized access when employees work remotely.

ImpactMedium
ComplexityLow

Why This Matters

  • Protects sensitive business data from eavesdropping on open public Wi-Fi networks.
  • Reduces the likelihood of man-in-the-middle attacks targeting remote workers.

What “Good” Looks Like

  • Employees are educated on the dangers of public Wi-Fi and the benefits of cellular data; tools like WatchDog Security's Security Awareness Training can help track completion and demonstrate ongoing reinforcement.
  • Mobile devices are configured to prevent automatic connections to untrusted networks; tools like WatchDog Security's Posture Management can help document device hardening expectations and remediation guidance as supporting evidence for this control.
  • Always-on VPNs are deployed for situations where public Wi-Fi use is unavoidable.

Public Wi-Fi networks typically lack strong encryption, making them prime targets for man-in-the-middle attacks and packet sniffing. When employees connect to these networks without protection, sensitive corporate data can be easily intercepted by malicious actors on the same network.

CyberSecure Canada requirements for public Wi-Fi use mandate that organizations educate users to prioritize trusted networks. Specifically, employees must be trained to use corporate Wi-Fi or cellular data network connectivity rather than public Wi-Fi.

Yes, if an employee must connect to an untrusted network, using a VPN for public Wi-Fi is essential. A virtual private network encrypts the connection, protecting data from local interception, which is a key component of a remote work security policy.

Organizations can enforce no public Wi-Fi on company devices by using Mobile Device Management (MDM) solutions. MDM administrators can deploy configuration profiles that disable automatic connections to open networks and restrict users from manually joining unapproved SSIDs.

Corporate Wi-Fi uses strong encryption like WPA or WPA Enterprise, and cellular data relies on encrypted telecommunication networks, making both trusted. Public Wi-Fi is often open and unencrypted, making it an untrusted network in cybersecurity where data is exposed to anyone listening.

Employee training on public Wi-Fi risks should teach staff to verify network names with venue staff and avoid networks lacking password requirements. Training should emphasize that attackers often create spoofed hotspots with legitimate-sounding names to trick users into connecting.

A strong mobile hotspot security policy for employees should dictate the use of cellular tethering over café Wi-Fi. Additionally, implementing an always-on VPN requirement for remote access ensures that all traffic remains encrypted regardless of the underlying connection.

MDM Wi-Fi restrictions block unknown SSIDs by pushing a predefined list of approved corporate and home networks to the device. Any network not on the allowlist is automatically blocked, preventing employees from connecting to potentially dangerous public hotspots.

Auditors will look for documented corporate Wi-Fi vs public Wi-Fi policy guidelines within your information security policy. You should also maintain awareness training logs and policy acknowledgement records showing that employees have been educated on these specific wireless risks. Tools like WatchDog Security's Policy Management can help centralize version-controlled policies and maintain acceptance tracking, while WatchDog Security's Compliance Center can link those records to this control for faster audits.

While the standard emphasizes using cellular or corporate networks, practically, organizations can allow public Wi-Fi if strict compensating controls are in place. This includes enforcing an always-on VPN, requiring multi-factor authentication, and ensuring users are trained on how to secure employees using public Wi-Fi safely.

Educating users to avoid public Wi-Fi only works if the expectation is documented and training completion can be demonstrated. Tools like WatchDog Security's Compliance Center can map this control to required artifacts (policies, training records) and track evidence status over time, making it easier to show auditors that user education and enforcement activities are in place.

Organizations often struggle to prove who received guidance and when it was reinforced, especially as teams grow and roles change. Tools like WatchDog Security's Security Awareness Training can track completion of role-based learning on public Wi-Fi risks, and WatchDog Security's Policy Management can record policy acceptance and maintain version history so training and acknowledgement evidence stays audit-ready.

CYBERSECURE-CANADA Section 6.1.2.1(d)

"use corporate Wi-Fi or cellular data network connectivity rather than public Wi-Fi;"

VersionDateAuthorDescription
1.0.02026-02-24WatchDog Security GRC TeamInitial publication