Mobile Wi-Fi Security Report

People tend to favor Wi-Fi over cellular for obvious reasons – it’s usually faster, it doesn’t tax your data plan and it’s widely available. However, there are a number of inherent risks in allowing your devices to connect to Wi-Fi networks.

Wi-Fi networks expose mobile devices to malicious threats, such as man-in-the-middle attacks and sensitive data loss on public hotspots.

This report is designed to inform you of the many and varied risks of Wi-Fi and practical steps on how to manage that risk.


Modern organizations that are enabling mobility for their workforce are achieving powerful productivity benefits. With this new reality of mobile working also comes the need for countless wireless networks that can support an increasing number of devices and the data they access.

According to Statcounter, mobile traffic surpassed desktop for the first time in November 2016, representing a marked shift in how people access the web. Similarly, the number of mobile devices in the workplace has also exploded in recent years. As a result, it is vital for organizations to provide mobile-friendly connectivity, both for employees and partners who need remote access to corporate facilities. That means setting up a robust broadband connection to handle the significant increase in data consumption, and multiple Wi-Fi access points for those users or situations where cellular is not appropriate.

Although it is less relevant for businesses today, the primary advantage of having a wired infrastructure is the control it provides. Unauthorized visitors can be kept out of your corporate network and it won’t be overloaded with non-work related traffic.

Conversely, as a mobile enterprise, your network extends beyond the physical walls of the office giving attackers a potential route into the business, without ever having to compromise a single part of the corporate infrastructure.

Once those work-assigned devices leave the confines of the office walls, it’s harder to see and control how they are connecting to the internet. Many businesses, especially those in the service industries, are also offering wireless connectivity for customers, passengers, guests and general public. But how is a user to know whether these hotspots use encryption? And how can they ensure no one around them can see their data in transit?

In this report, we will provide an overview of Wi-Fi network growth and the variety of hotspots available. We’ll then introduce you to Wi-Fi threats in the context of the wider mobile threat landscape. And finally, we will work our way through the layers of Wi-Fi risks ranging from incidental privacy exposures to motivated attacks before providing you with advice for managing these risks.

To continue reading the report please fill in the form.