Why You Probably Don’t Need a VPN on Public Wi-Fi Anymore

For years, tech advice blogs and security gurus have hammered home one warning: “Never use public Wi-Fi without a VPN!”

That advice made sense back in the early 2010s when coffee shop hotspots were the Wild West of open, unencrypted traffic. But times have changed. Thanks to widespread encryption and better default security, the average person no longer needs a VPN just to check email at Starbucks.

Here’s why.

1. HTTPS Is Now Everywhere

In the past, most websites didn’t encrypt your connection. That meant someone on the same Wi-Fi network could “sniff” your traffic and read everything passwords, messages, you name it.

Today, over 95% of web traffic uses HTTPS by default. This encryption happens end-to-end between your browser and the website, even over open Wi-Fi. Your data is scrambled before it ever leaves your device, making it unreadable to anyone nearby.

2. Wi-Fi Encryption Itself Has Improved

Most modern public hotspots (including those in cafes, airports, and hotels) use WPA2 or WPA3 encryption, even if they don’t require a password. This prevents casual eavesdropping and makes it much harder for attackers to spy on your traffic without already compromising the network.

3. The “Evil Twin” Risk Is Overblown

Yes, a determined attacker could set up a fake hotspot with the same name as a legitimate one. But in practice, this is rare and your device will usually warn you if a network’s encryption or certificate doesn’t match expectations. Using HTTPS also prevents fake hotspots from stealing sensitive info, since they can’t decrypt secure traffic.

4. VPNs Can Actually Make You Less Secure

Not all VPNs are trustworthy. Many “free” VPNs log your browsing activity or sell your data. Even some paid VPNs have been caught storing logs despite promising not to. If you route all your traffic through an untrustworthy VPN provider, you’re just trading one potential eavesdropper (the coffee shop) for another (the VPN company).

5. Your Biggest Risks Aren’t From the Wi-Fi Itself

Most modern attacks target your device directly through phishing links, malicious downloads, or compromised apps not by passively sniffing your connection. A VPN won’t protect you from those. Good password hygiene, software updates, and cautious clicking will.

So When Is a VPN Worth It?

Bypassing censorship (e.g., in restrictive countries) Accessing region-locked services Hiding your IP address from the sites you visit

If those aren’t your goals, you can probably skip the VPN for everyday café browsing.

The Bottom Line

A few years ago, using a VPN on public Wi-Fi was basic survival. Today, it’s more of a niche tool. With HTTPS, WPA2/3, and better OS-level protections, your data is already encrypted by default. Focus on real security basics strong passwords, multi-factor authentication, and staying alert to scams and you can sip that latte in peace.

Unlocking The Power Of Retention Labels In Microsoft 365

Retention labels in Microsoft 365 play a crucial role in effective data management and governance. With the increasing volume of digital content generated by organisations, it is essential to implement proper strategies for data retention.

In this article, we will explore the power of retention labels in Microsoft 365 and how they can benefit organisations in managing their data effectively.

By applying retention labels at the item level, such as documents or emails, organisations can retain or delete content based on regulatory compliance requirements and internal policies. Retention labels ensure that content is preserved for the required duration and disposed of appropriately when no longer needed.

Continue reading → Unlocking The Power Of Retention Labels In Microsoft 365

Unlocking Mac Security: Conditional Access Policies via Microsoft Intune

In the modern-day corporate environment, securing devices has become a significant concern. Among the multitude of devices used in businesses, Mac devices are growing in popularity, and with this increase comes the need for robust security. Today we are going to explore how Microsoft Intune and Conditional Access policies can unlock the potential of Mac security for your corporate business.

Continue reading → Unlocking Mac Security: Conditional Access Policies via Microsoft Intune

Why Businesses Using M365 Should Go Passwordless for Their Users

As cyber threats continue to evolve, traditional password-based authentication methods are no longer sufficient to protect sensitive business data. Passwords can be compromised, stolen, or hacked, leading to costly data breaches and reputational damage. In response, many businesses are now turning to passwordless authentication as a more secure and user-friendly alternative.

Microsoft 365 (M365) is a popular suite of cloud-based productivity tools used by millions of businesses worldwide. M365 includes several features that enable passwordless authentication, providing a more secure and seamless user experience. In this article, we’ll explore why businesses using M365 should consider going passwordless for their users.

Continue reading → Why Businesses Using M365 Should Go Passwordless for Their Users

Introducing Conditional Access by Network Location for SharePoint and OneDrive for Business

 

Introducing Conditional Access by Network Location for SharePoint and OneDrive for Business

As showcased at Ignite in September 2016, we are bringing network location-based conditional access policy to SharePoint and OneDrive for Business to First Release starting 20 January 2017.

 

CloudSecurity.png
Continue reading → Introducing Conditional Access by Network Location for SharePoint and OneDrive for Business