Skip to main content

Editor's pick: Originally published June 3.

Business travelers who want steady, secure WiFi connections while they are attending conferences or staying at hotels should utilize a mobile hotspot.

As more employees and even consumers are connected around the clock to their laptops and smartphones, the WiFi connections at conferences and hotels are often clogged, as the existing bandwidth is maxed out. Many employees are faced with either being denied access or a very slow connection, making the process to connect to email or a company's network cumbersome.

Depending on the number of people attending a conference, the WiFi signals can "collide with each other and essentially make it so no one can use WiFi even if it is from your mobile hotspot," said Janice Ting, a product marketing manager at Netgear, a San Jose, Calif.-based networking products manufacturer.

Advantages of Mobile Hotspots

Another option is to purchase a portable, independent device that will allow individuals to connect to multiple devices and to a secure network where hackers are less prone to attack, said Murshed Choudhury, a lead technician at the Microsoft flagship store in New York.

"They are designed to have a more solid signal and antenna to provide stronger bandwidth," he said. "You can buy a mobile hotspot from any mobile provider."

A portable mobile hotspot device can be a good alternative, because once you connect to it, all of your devices will remain connected and you can avoid logging in again during the conference.

"A mobile hotspot is also ideal because of the powerful battery," she said. "I can keep working on the Internet and save the battery life of my phone for more phone calls and texts."

Mobile hotspots offer more protection from cyber criminals, because they are owned by the user and are password protected unlike public WiFi which easily be hacked, allowing attackers to infect your device with malware, spy on you and steal your sensitive data. One drawback is that tethering only allows you to connect to one device and since the antenna is smaller, the Internet connection is likely to be slower.

Utilizing a cell phone provider's network is a much safer option for business travelers since the mobile phone is authenticated to their network, said Oscar Marquez, chief technology officer at iSheriff, a Redwood City, Calif.-based provider of enterprise cloud security solutions.

"With your cell provider, less can happen than if you choose to use an open Wi-Fi where you can be spoofed and have all your data stolen in real time," he said. "I was recently at a United Airlines lounge, and I could see a ghost WiFi network under the same name as the lounge. Unassuming users would simply pick the trusted name brand, thinking that it was fine without knowing they were being spoofed."

Hotel Connections

Hotel WiFis are also susceptible to being hacked like other public spaces. One strategy is to opt for the premium connection options which are more secure because they require credentials to access a network that is password protected, said Choudhury. Another more outdated option to ensure a more protected network is to use a personal Ethernet cable.

"Unlike public WiFi, others will not be able to easily tap into the network if you are using a physical cable connection," he said.

Using a VPN

Wireless connections are susceptible to being hacked, so choosing a virtual private network or VPN prevents sensitive information from being exposed.

"When you are using a WiFi network that you are not familiar with, VPNs play an important role in helping to ensure the security and safety of financial and other transactions," said Joram Borenstein, a vice president of marketing of NICE Actimize, a New York-based financial crimes software solutions provider.

Creating a VPN is simple, and there are free options for travelers such as the one offered by Tinfoil Security, a Mountain Valley, Calif.-based cybersecurity firm or Bucharest, Romania-based CyberGhost.

"Tinfoil actually makes it trivial to build your own private VPN in a matter of minutes and with just two to three clicks of a button," said Michael Borohovski, co-founder of Tinfoil Security. " We originally provided it as a public service to reporters during the Sochi Olympics since there were reports of traffic being snooped, but have kept it around since so many people used it."

While tethering your device to a cellular 4G hotspot is the best option because cellular connections are difficult to intercept and require expensive equipment, the next best option is to use a VPN, said Michael Gregg, COO of Superior Solutions, a Houston-based cybersecurity firm.

"Virtual private connections act to encrypt your traffic and make it very difficult for the attacker," he said.

Using a VPN will keep users "relatively safe, although it's important to realize that shenanigans are possible," said Alex McGeorge, head of threat intelligence at Immunity, a Miami Beach, Fla.-based offensive security firm. "There's no way to be 100% safe using a laptop on a business trip."

Another option is to bring your LTE-based router since cellular data is not as commonly attacked as WiFi and secure the connection with a VPN, he said. McGeorge recommends a third, more technical option to bring a Raspberry Pi/Arduino/ODROID device which will connect to the WiFi and only allows outbound traffic via the VPN.

"Then you physically connect your laptop to this device," he said. "This prevents your laptop from leaking non-encrypted data onto the WiFi network, but is going to be cumbersome when dealing with things live captive login portals."

As CEO of Comunicano, a Del Mar, Calif.-based marketing communications company, Andy Abramson has traveled an average of 200 days a year for the past 12 years and recommends obtaining a Boingo or iPass account. Another option is called FON and consists of a network of users who have FON WiFi routers and allow other FON users to log on for free with the heaviest concentration in Europe.

"For those who travel internationally, buying an unlocked and global frequency travel router is a very cost efficient way to stay connected," Abramson said.

While free public WiFi is now ubiquitous among retailers who offer the service to vie with their competitors, it is nt a secure platform, said Johnson Wu, vice president of products at Acalvio Technologies, a Santa Clara, Calif.- based provider of advanced threat detection and defense solutions.

"There is also the problem with rogue Wi-Fi hotspots equipped with all sorts of man-in-the-middle means of siphoning credentials," he said. "They are often found in sports venues and shopping malls, so whenever possible, use your phone as a hotspot."

Be wary of unsecured Bluetooth connections, since attackers like to "lurk on these networks or create bogus networks to entice victims to connect," said Thomas Fischer, principal security researcher at Digital Guardian, a Waltham, Mass.-based data protection firm.

"Make sure your mobile device is not set to automatically connect to wireless and Bluetooth networks to prevent your device from connecting and transmitting your information without your knowledge," Fischer said. "Install a personal firewall that typically comes with products like F-Secure, Kaspersky Lab or other anti-malware solutions."