Public WiFi refers to any wireless network freely accessible in public places—hotels, airports, cafes, train stations—without secure authentication or data encryption. Unlike corporate networks, these networks expose professional devices to data interception, unauthorized access to business systems, and malware infections. According to the Cybersecurity Threat Landscape report from the OFCS (Federal Office for Cybersecurity, 2024), incidents related to unsecured connections represent a growing share of reports from Swiss SMEs. A simple connection to an open network can be enough to compromise an entire information system.
Key takeaway: 68% of professionals connect to public WiFi networks on the go without using a VPN, according to a Cybersecurity Insiders study (2023). For SMEs, each unsecured connection is a potential entry point for attackers.
Cybercriminals exploit well-documented vulnerabilities in open networks using largely automated methods, accessible without advanced expertise:
These attacks require no sophisticated equipment and can be carried out with a simple laptop and tools available for free online.
It is possible to protect yourself effectively on the move without deploying complex infrastructure. Here are the five priority measures, ranked by level of impact:
Prioritize mobile tethering (4G/5G) rather than public WiFi networks. Cellular networks are encrypted end-to-end and are not accessible to other users in the same physical space.
Use a professional VPN to encrypt all network traffic. A corporate VPN (e.g., Cisco AnyConnect, NordLayer, Zscaler) makes your data unreadable to any interceptor, even on a compromised network.
Keep protection devices up to date: antivirus, firewall, and operating system. Security patches fill vulnerabilities exploited by automated attacks. According to Microsoft, 85% of successful cyberattacks exploit vulnerabilities for which a patch already existed.
Disable file and resource sharing as soon as a device is connected to an external network. This measure prevents unauthorized access to shared folders or network printers.
Avoid accessing critical services (banks, ERP, internal tools, HR messaging) from unverified connections. If absolutely necessary, use exclusively the VPN and two-factor authentication (2FA).
| Criterion | Unsecured Public WiFi | Secure Connection (VPN + 4G) |
|---|---|---|
| Data encryption | Absent or partial | Complete (AES-256) |
| Risk of interception | High | Very low |
| Access to business systems | Not recommended | Secure |
| Implementation cost | None | Low (10–30 CHF/month/user) |
| Recommended for SMEs | ❌ | ✅ |
A mobile security policy is an internal document that defines the connection rules, mandatory tools, and expected behaviors for any employee working outside the company's premises. It reduces the risks associated with individual decisions and ensures a consistent level of protection, regardless of the workplace.
An effective policy includes:
SMEs with a formalized policy reduce their exposure to security incidents related to mobility by an average of 40%, according to the Ponemon Institute (2023).
No. Free VPNs have critical limitations for professional use: data logging, reduced bandwidth, insufficient encryption, and lack of support. For SMEs, a professional VPN with AES-256 encryption, verified no-logging policy, and technical assistance is essential. The average cost is 10 to 30 CHF per user per month.
An Evil Twin network exactly mimics the name of a legitimate network. To identify it: verify the exact name of the network with the establishment's staff, beware of password-free networks in places where a password is usually required, and systematically use a VPN that encrypts your data even when connected to a fraudulent network.
Yes. 4G and 5G cellular networks use built-in encryption between the device and the operator's antenna, and are not accessible to other users present in the same physical space. They are the safest connection solution on the go, even before using a VPN.
Apply the following protocol immediately: (1) disconnect the device from the network, (2) change all passwords used during the session, (3) report the incident to the IT manager, (4) perform a complete antivirus scan of the device, (5) check the access logs to critical systems to detect any abnormal activity.
Bexxo supports Swiss SMEs in their cyber maturity with a concrete approach tailored to their size. Our Free Cybersecurity Analysis allows you to assess your current weaknesses—including risks related to mobility—, formulate prioritized recommendations, and co-build a realistic roadmap according to your resources and business priorities. Securing your connections on the go means protecting the continuity of your business, strengthening the trust of your customers, and ensuring the peace of mind of your mobile teams.