Business travel can expose individuals to serious cyber threats when connecting to hotel or airport Wi?Fi. This guide explains how to stay safe on public wi-fi, using practical precautions such as VPNs and mobile tethering.

Why Public Wi-Fi Is a Hidden Risk for Travellers
Public Wi?Fi is one of the most widely used digital conveniences for UK business travellers. Whether in airports, hotels, cafés, or train stations, free internet access is often seen as a quick and easy way to stay productive on the move. However, cybersecurity experts warn that many of these networks are poorly protected—or actively targeted—by attackers seeking to intercept data or install malware.
Studies and industry reports consistently show that many travellers connect to unsecured networks to check work emails or log into sensitive accounts. With remote access now standard and business travel rebounding across Europe, insecure public networks can be exploited to steal credentials, compromise cloud accounts, or gain backdoor access to business systems.
How Criminals Target Public Wi-Fi Users
Lack of Encryption
Public Wi?Fi often lacks proper encryption. This makes it easy for attackers to intercept data with techniques like man?in?the?middle (MitM) attacks, where a hacker stands between your device and the network to capture sensitive information.
Rogue Wi-Fi Hotspots
Attackers may deploy “evil twin” networks—fake Wi?Fi hotspots impersonating legitimate ones (e.g. “Hotel_WiFi_Guest”) to steal credentials or traffic. Even authentic networks such as those in hotels or airports can pose risks if poorly maintained or inadequately segmented.
What Experts Recommend for Safer Connections
Use a VPN
A virtual private network (VPN) encrypts your internet traffic, protecting it from interception. As Paul?Bischoff from Comparitech puts it:
“A VPN creates a secure tunnel that protects your traffic from snoopers on unsecured networks. For travellers, it’s an essential layer of defence.”
Business-grade VPNs offer reliable encryption across devices. Paid services generally outperform free ones, which may have weak encryption or track user activity (possibly monetising your activity history too).
Use Mobile Tethering
Using your smartphone’s 4G/5G connection as a hotspot is typically safer than public Wi?Fi, thanks to mobile networks’ encryption. Check data allowances before relying on this method, especially when travelling internationally.
Good Practices on Any Public Network
When using public Wi?Fi:
- Avoid online banking, file sharing, or accessing sensitive logins.
- Use HTTPS (look for the padlock in the browser).
- Disable auto-connect and file-sharing features.
- Mark the network as “Public” on your device.
- Keep all apps, browsers, and antivirus software current.
Mobile Habits That Can Increase Risk
The UK’s National Cyber Security Centre (NCSC) offers advice on securing Wi?Fi connections and emphasizes the importance of secure configuration and safe behaviour when using Wi?Fi networks (e.g. setting networks to “Public” and disabling auto-join) NCSC. Organizations should brief travelling staff on digital hygiene, encourage managed VPN solutions, and offer mobile data allowances for safer tethering.
The Cloud and Regulatory Risk
With reliance on cloud platforms like Microsoft?365, Slack, and CRMs growing, a compromised login via insecure Wi?Fi can lead to serious breaches. Under UK GDPR, data incidents involving personal or client data—regardless of how they occur—can trigger ICO investigations and penalties.
Reputational Risk
Public Wi?Fi–related incidents can cause major reputational damage. Advanced threat actors have targeted hotel or conference Wi?Fi networks to gather credentials. Even without malware, stolen credentials have been used for remote access to corporate systems, eroding client trust and prompting stricter security policies.
ESET’s Guidance on Public Wi-Fi Safety
ESET underscores several important practices:
- Their blog illustrates how Android devices can automatically connect to malicious Wi?Fi networks, enabling attacks like evil?twin or MitM scenarios ESET. Disabling auto?connect is vital to prevent this.
- A classic—but still useful—post from ESET Ireland outlines “10 steps to staying secure on public Wi?Fi,” including checking hotspot authenticity, looking for HTTPS, patching software, using VPNs, enabling 2FA, and logging out after use blog.eset.ie.
Simple precautions help you stay safe on public wi-fi
To mitigate exposure:
- Require VPN usage on all business devices.
- Provide mobile data allowances for tethering.
- Enforce multi-factor authentication (MFA).
- Deploy reliable endpoint security tools.
- Educate staff on identifying suspicious networks and reporting issues promptly.
What This Means for Your Business
Cybersecurity during travel is no longer optional. Every employee connecting to Wi-Fi from hotels, airports, or conferences could pose a risk. Convenience must not trump security.
By embedding secure connectivity policies, investing in protective infrastructure, and reinforcing safe habits, companies can protect sensitive data, preserve reputation, and meet regulatory standards.
With threats evolving each year, smart preparation—not travel avoidance—is essential. A bit of foresight before connecting can make all the difference. Make sure your business’s Information Security Policy reflects this.
And if your business doesn’t have an Information Security Policy yet (or the policy you do have is massively outdated) give us a call now. We are here to help! More info on our Consultancy services is here