With the advancement of Information Technology, it is obvious that not less than 70% of the world population is making use of the internet every seconds.

There is an advanced need to be connected online anywhere anytime. Be it a Businessman, Student, Trader, everyone needs the service of the Information Communication Technology to be on top of their game in this jet age.

With this, there is a high demand for internet data subscription. Just on the 1st of September 2019, Daily Trust Newspaper published that Nigerians spend NGN 197 Billion every month on internet data. Hmmmm…I am not surprised, because when you exhaust your data, you are even advised to borrow data from your telecommunication network, to pay later.

So, what of when data is exhausted, and no money to subscribe, and you don’t want to borrow, or you’ve exceeded your monthly data budget (that’s if you have one), which I will advise you to have?

The only alternative left here is sourcing for free or open Wi-Fi everywhere just to stay connected.

What is a WIFI? A WIFI is an acronym for ‘Wireless Fidelity’ which is a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.

There is nothing wrong with Wi-Fi connection if only you know the source of the wifi very well. Many public Wi-Fi is a treat to personal information and your personal login details for different transactions.

What is public Wi-Fi?

Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. These “hotspots” are so widespread and common that people frequently connect to them without thinking twice. Although it sounds harmless to log on and check your social media account or browse some news articles, everyday activities that require a login — like reading e-mail or checking your bank account — could be risky business on public Wi-Fi.

It’s dangerous to conduct online activity via a public WiFi because many comm jackers and hackers may be waiting there for their prey to stray within reach.


 1. Man-in-the-Middle attacks

One of the most common threats on these networks is called a Man-in-the-Middle (MitM) attack. Essentially, a MitM attack is a form of eavesdropping. When a computer makes a connection to the Internet, data is sent from point A (computer) to point B (service/website), and vulnerabilities can allow an attacker to get in between these transmissions and “read” them. So what you thought was private no longer is.

2. Spying

There are special software and hardware equipment that hackers can easily buy to help them spy your WiFi network so that all your behaviors will be exposed crystal clear to them. They can even get access to all your online business, resources, account and password, browsing and chat histories, etc., any info they want.

3. Malware distribution

Thanks to software vulnerabilities, there are also ways that attackers can slip malware onto your computer without you even knowing. A software vulnerability is a security hole or weakness found in an operating system or software program. Hackers can exploit this weakness by writing code to target a specific vulnerability, and then inject the malware onto your device.

4. Malicious hotspots

These “rogue access points” trick victims into connecting to what they think is a legitimate network because the name sounds reputable. Say you’re staying at the ‘Eko Hotels’  and want to connect to the hotel’s Wi-Fi. You may think you’re selecting the correct one when you click on “Eko Hotles” but you haven’t. Instead, you’ve just connected to a rogue hot-spots set up by cyber criminals who can now view your sensitive information.

5. Unencrypted networks

Encryption means that the information that is sent between your computer and the wireless router are in the form of a “secret code,” so that it cannot be read by anyone who doesn’t have the key to decipher the code. Most routers are shipped from the factory with encryption turned off by default, and it must be turned on when the network is set up. If an IT professional sets up the network, then chances are good that encryption has been enabled. However, there is no surefire way to tell if this has happened.

>>>There may come a time when your only option is an unsecured, free, public WiFi hotspot, and your work simply cannot wait. If that’s the case, understanding the risks of public WiFi may prevent you from falling victim to an attack.

Remember anything you do on a public WiFi network is NOT secure. Any information you share or access on these networks is as good as gone.

But If you find yourself in a situation where you absolutely must connect to WiFi (first ask if you REALLY need to connect) here are a few suggestions to improve your safety:


  • Allow your Wi-Fi to auto-connect to networks
  • Log into any account via an app that contains sensitive information. Go to the website instead and verify it uses HTTPS before logging in
  • Leave your Wi-Fi or Bluetooth on if you are not using them
  • Access websites that hold your sensitive information, such as such as financial or healthcare accounts
  • Log onto a network that isn’t password protected


  • Disable file sharing
  • Only visit sites using HTTPS
  • Log out of accounts when done using them
  • Use a VPN, like Norton Secure VPN, to make sure your public Wi-Fi connections are made private

But as a traveler, we have provided a secured wifi that gets you connected on the GO 247, with Unlimited data access and zero roaming charges. This wifi can connect to your five gadgets simultaneously to keep just connected roaming the world for lesser charges.

Do you need this product?

Contact Glocalme Travel Solutions at 31 Oba Akran Avenue Ikeja Lagos Nigeria or visit our website at www.glocalmesolutions.com


Leave a Reply

Close Menu