The two big threats of doing business on public Wi-Fi
June 8, 2022
|
4
min read

Highlights
With public Wi-Fi available almost everywhere we go, we’re able to keep ourselves and our businesses more connected than ever. But before you join that new network, make sure you consider the risks…
Public Wi-Fi is everywhere these days – cafés, airports, hotels, trains. It’s super convenient, especially for business travellers or anyone working remotely.
But what if I told you that hopping on that free Wi-Fi could expose your business data to cyber criminals? That’s the reality of using unsecured public networks.
When you connect to public Wi-Fi, you’re opening the door to scammers who know exactly how to exploit these networks. The two biggest threats you need to know about are called Man-in-the-Middle (MITM) attacks and Evil Twin attacks.
Yes, they sound like something out of a spy movie… but they’re very real and can have serious consequences for your business.
Let’s start with Man-in-the-Middle (MITM) attacks. You’re sitting in a café, sending an email or logging in to your business bank account. You think your device is communicating directly with the Wi-Fi network, but in reality, a cyber criminal has inserted themself between you and the network.
This “man in the middle” can see everything you’re doing – your passwords, your emails, even your credit card details. And the worst part? You probably won’t even notice it’s happening.
Criminals use this stolen information in all sorts of ways. They might sell it to advertisers, use it to impersonate you in phishing scams (where they trick people into sharing sensitive information, like passwords or credit card details). Or even steal money from your accounts. For businesses, this could mean sensitive financial information or customer data ending up in the wrong hands.
Now let’s talk about Evil Twin attacks. Imagine you’re in an airport and see two Wi-Fi networks: One called “Airport Free Wi-Fi” and another called “Airport Wi-Fi Secure”. They both sound legit, but one of them could be a fake network set up by cyber criminals.
When you connect to the fake network, scammers can monitor everything you do online, just like in a MITM attack – but they can go even further. They can steal your cookies (little bits of data that websites use to remember you) and gain access to things like your login details or personal information.
In some cases, they can even install malware (malicious software) on your device without you clicking a single thing. Scary, right? All it takes is connecting to the wrong Wi-Fi network, then your data – and your business’s security – could be compromised.
Using public Wi-Fi doesn’t have to be a security nightmare, but you do need to be cautious. Here are some steps you can take to help keep your business protected:
- Avoid accessing sensitive information while connected to public Wi-Fi. This includes anything involving passwords, personal data, or financial accounts. If you wouldn’t want a stranger looking over your shoulder, it’s best to save it for when you’re on a secure network.
- Stick to websites that use HTTPS, which encrypts your data. You’ll know a site is secure if you see a padlock icon in the address bar or "https://" at the beginning of the web address. Most websites use this today.
- Consider using trusted browser extensions designed to boost your online safety. Many can block cookies, ads, and even malicious websites, reducing the risk of your information being exposed.
- Turn off auto-join on your business devices. This stops your work phone, tablet, or laptop from automatically connecting to any available network, including potentially dangerous ones.
- Be wary of suspicious pop-ups. Scammers often use these to trick you into clicking something malicious. If a pop-up feels wrong, don’t interact with it – just close the window.
- Enable two-factor authentication (2FA) on your business accounts whenever possible. This requires a second form of identification (like a code sent to your phone) to log you in, which makes it harder for anyone to break in even if they get hold of your password.
- Finally, keep your software up to date. Updates often include security patches that protect your device from the latest threats. Ignoring them could leave your business devices vulnerable.
A little caution goes a long way when it comes to keeping your business protected online. Ask yourself: Is the convenience of free Wi-Fi worth the risk of exposing my data?
If you’d like help keeping your business data protected no matter where you are, get in touch.
Tell us about yourself so we can serve you best.
Got a question?
More articles
.png)
This special edition of our Leading London series brings together the partners behind the rollout of the City of London Corporation’s new unified network, a major upgrade designed to strengthen public services and improve connectivity across the Square Mile and beyond.
The panel included:
- Sam Collins, Assistant Director of Digital and Data, City of London Corporation
- Chelsea Chamberlin, Chief Technology Officer, Roc Technologies
- Scott McKinnon, Chief Security Officer, Palo Alto Networks
- Rhod Morgan, Chief Operations Officer, Vorboss
- Elliot Townsend, Senior Director, Juniper Networks
- Christa Elizabeth Norton, Marketing Director, Roc Technologies
Together, they explored how the new network will improve public services, strengthen cyber resilience and support a more connected, future-ready City.

For many landlords and building managers, the word “wayleave” feels like the responsible route whenever a fibre circuit is being installed on their property. It sounds formal and safe – a neat legal box to tick.
In many cases, however, a wayleave adds unnecessary complexity and delays, frustrates tenants, and can expose landlords to long-term legal risks.
At Vorboss, we’ve connected thousands of office spaces across London without a wayleave, keeping landlords in full control and getting tenants online faster.

What is a wayleave?
A wayleave is a written agreement between a landowner and a telecoms operator. It gives the operator permission to install and keep equipment on private property.
What many people don’t realise is that signing a wayleave also activates “Code rights” under the Electronic Communications Code. These rights go beyond simple permission, they give the operator legal powers to stay on the property indefinitely, access it when needed, and even refuse removal of their equipment in certain situations.
For a typical connection into a commercial building in London, a wayleave can make the fibre installation process slower, more expensive, and limit the landlord’s flexibility long term.
Why a wayleave isn’t required for standard in-building fibre connections
For a standard in-building fibre connection serving a tenant, a wayleave isn’t a legal requirement. Important protections, like building access, fire safety, repairing any damage, and removing equipment, are already covered by the tenant’s lease and usual building rules.
If no wayleave is signed, no Code rights are triggered, meaning the landlord retains full control and the installation exists under a simple, fully revocable licence.
In practice, this gives landlords far more protection and flexibility:
- No legal lock-in – the telecoms operator has no long-term rights to stay or refuse removal.
- Landlords keep full control – equipment can be moved or removed when the building changes.
- Faster fibre installation – no time lost in drafting contracts or solicitor reviews.
- Happier tenants – connections go live quicker; tenants get to move in faster.
By contrast, signing a wayleave and granting Code rights introduces a complex and expensive legal process for any fibre removal or relocation. This can take at least 18 months, plus potential court or tribunal proceedings, making it slower, and far less flexible for the landlord.
.avif)

.avif)

