• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Mobility, Network Security, News

FBI: Be Wary of Using Hotel Wi-Fi for Remote Work

Hotels are offering daytime room reservations to offer some peace and quiet for remote workers, but hotel Wi-Fi networks aren't very secure, FBI warns.

October 7, 2020 Zachary Comeau Leave a Comment

FBI Hotel Wi-FI

For many, working from home has been a welcome break from their long commute and noisy office. However, depending on pets and family members, the home can be just as distracting.

Remote workers might be tempted to rent a hotel room for some peace and quiet to get some critical work done, but the FBI is warning that hotel Wi-Fi networks pose a security risk to you and your organization.

According to the agency’s advisory, hotels – especially in major cities – are advertising daytime room reservations for remote workers that need a quiet, distraction-free work environment.

“While this option may be appealing, accessing sensitive information from hotel Wi-Fi poses an increased security risk over home Wi-Fi networks,” the agency’s advisory says.

“Malicious actors can exploit inconsistent or lax hotel Wi-Fi security and guests’ security complacency to compromise the work and personal data of hotel guests. Following good cyber security practices can minimize some of the risks associated with using hotel Wi-Fi for telework.”

Read Next: Microsoft’s Digital Defense Report Details Increasing Cyber Threats

According to the agency, hotels are regular targets of cyberattacks because they hold records of guest names, their personal information and credit card numbers. Possibly hundreds of unaffiliated people all using the same network in a confined area poses a security risk in itself.

An attacker could easily monitor internet activity and redirect victims to fake login pages or create a phony hotel network designed to appear like the original to give attacker direct access to the guest’s computer.

Because hotel networks are built for customer convenience, they aren’t always the most secure networks.

In the advisory, the FBI detailed how users can tell if they’ve been hacked and what they should do, as well as steps to take to reduce risk while working from a hotel.

Those steps include:

  • Using a VPN
  • Use a mobile phone’s wireless hotspot instead of the hotel Wi-Fi
  • Confirm the name of the hotel’s Wi-Fi network before connecting and only connect to official hotel networks
  • Do not enable auto-reconnect while on a hotel network
  • Confirm an HTTPS connection when browsing
  • Avoid transmitting any personal data like banking information or social security numbers
  • Ensure devices that connect to hotel Wi-Fi networks aren’t discoverable and Bluetooth is disabled
  • Use multi-factor authentication
  • Enable login notifications to receive alerts on suspicious logins

 

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Remote Work

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.