The list of topics to cover in awareness training programs continues to grow with the expansion of free Wi-Fi across major cities. From San Francisco to New York, cities across the country are giving makeovers to old phone booths. This month New York City began replacing thousands of pay phones with free Wi-Fi hot spots. According to The Wall Street Journal, “The city expects to have 500 hot spots installed by July, and eventually, about 7,500 units will be replaced.” While this 21st century technological upgrade is great for consumers, it poses security risks for the enterprise.Tyler Cohen Wood, cyber security adviser to Inspired eLearning, said there are several reasons for concern. In addition to Wi-Fi hotspots opening up the possibility of hackers stealing valuable information, the city will also have the ability to collect information. Each booth will be equipped with a tablet for free calls and web browsing, but this opens the doors for complete strangers to access information and receive passwords if not protected. Cohen Wood warned, “It is possible a hacker could put key loggers on tablets, so be cognizant, and don’t enter private info onto the tablets provided.”As more cities hop on board with these implementations, enterprises could fall victim to even more human error if security teams don’t educate their employees on how to secure their devices and their sensitive information. More than ever, security awareness training for end users is critical to securing the extended network of the enterprise. What people don’t know can hurt them and result in a breach. Here are some tips Cohen Wood recommends including in an awareness training program:If people are going to use these hotspots, make sure they are using a virtual private network (VPN), and encrypting what they are sending. Make sure users understand that what they’re sending or putting on a tablet could be viewed by anyone else on the network if it is not secured, which means it could be viewable by the next person who comes along, viewable by Google, or viewable by the city of New York or whoever else is watching.If not secured, people can sniff your traffic.Don’t do anything that is company business or includes private information, unless using secured things like VPN, (still not recommended). If users have their phone set up to automatically connect to Wi-Fi, they may think they’re on secure network — but they’are not.Do not access bank information, company information, or other private/sensitive data unless they have manually disconnected from the free network.Security professionals need to make sure that end users understand the implications and risks involved in sending a work email through a public network, so don’t underestimate the power of continuously educating all employees from entry-level folks all the way up to executives. Cohen Wood said, “New York is not the only city that is putting in Wi-Fi, and what has been said in the privacy policy is that the consortium behind LinkNYC might share anonymized data with third parties but nothing personal.”The reality, Cohen Wood noted, is that “If you’re using this network and encryption, they have the keys to view the traffic. If you have sensitive info or work info, I would highly recommend that you use your own encryption. Even if they were able to pull out metadata, if you’re using a VPN through your company, they can’t get anything.” In today’s world where we are relying more and more on these devices and IoT is coming out faster, Cohen Wood said, “The best way to protect yourself is by having an education program in place. I’m not talking about learning about all the bits and bytes about what is going on, but what you can do to protect yourself, your company, and your family.” Related content news analysis Searching for unicorns: Managing expectations to find cybersecurity talent Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people. By Kacy Zurkus Sep 29, 2017 4 mins IT Skills Careers IT Leadership feature Vulnerability vs. risk: Knowing the difference improves security Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks. By Kacy Zurkus Sep 26, 2017 3 mins Risk Management Vulnerabilities IT Leadership opinion What the Equifax breach means to me — an end user perspective Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in another massive breach? By Kacy Zurkus Sep 15, 2017 4 mins Cyberattacks DLP Software Internet Security opinion Abandoned mobile apps, domain names raise information security risks When app creators abandon domains for bigger, better deals, what happens to all the app-specific data? By Kacy Zurkus Sep 08, 2017 3 mins Access Control Data and Information Security Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe