From open to secure: Why your clients' WiFi can be a huge risk
On Tuesday 17th March 2026, we hosted an event in Newcastle — From Open to Secure: WiFi Risk & Compliance.
The goal was straightforward: to have an honest conversation about what providing WiFi actually means for businesses, and show rather than just tell.
It included a live security demonstration, a breakdown of the compliance obligations businesses have, and a look at what a properly secure network looks like in practice.
Here's a summary of the core message.
Your clients' WiFi is probably their biggest unmanaged risk
Most businesses have done the sensible things. They've got a firewall, they're backing up their data, and someone has sat through the GDPR training. But WiFi? That's usually where the good habits stop.
Walk into the average pub, gym, or cafe and you'll find a shared password on a chalkboard, a captive portal nobody's reviewed since it was set up, or a network where customers, staff, and point-of-sale systems all sit together. This isn't an edge case. It's the default for most venues.
The problem isn't that business owners are careless. It's that the risks aren't visible until something goes wrong.
What "open" actually means
A shared WiFi password isn't really a password. Once it's written on a chalkboard, it's effectively public. Former staff have it. Anyone who's ever visited has it. And once someone's on that network, they can see everything else on it.
In most small venues, that means the same network customers browse on is the one the card machines and EPOS systems run on. That's the exact setup that could allow hackers to steal millions from a company. It’s also worth noting that being small doesn't make a business a less attractive target. It usually makes them an easier one.
Your clients' WiFi could be hacked from a handbag
You don't need to break into a network to steal data from it. You just need to copy it.
During the discussion, cybersecurity expert, Eliza May Austin, demonstrated that a device small enough to fit in a handbag can clone any WiFi network name in minutes. Phones and laptops connect based on network name and signal strength, not authenticity.
So if someone in your client's venue is running one of these devices, their customers can connect to a fake network, enter credentials on a convincing replica login page, and walk away with no idea anything happened.
The fake login pages can be built in under ten minutes with readily available AI tools. This isn't theoretical.
The answer isn't asking customers to be more vigilant. It's making sure the network they connect to is secure enough that there's nothing to intercept in the first place.
The legal exposure
If your client provides WiFi to the public, they have legal obligations that most of them aren't currently meeting.
Under UK GDPR, businesses are responsible for the security of personal data flowing across their network. An unsecured network isn't just a technical oversight; it’s a compliance failure. Furthermore, under the Investigatory Powers Act, a business may be called upon to identify a specific user in cases of criminal activity or copyright infringement.
A shared password makes this level of attribution nearly impossible. So does a poorly configured captive portal. Without individual authentication, a business is providing a mask for any bad actor on the premises.
What a secure network actually looks like
Purple replaces open or password-based networks with one that's encrypted and passwordless. Users connect through the Purple app, which issues a certificate that can't be intercepted or replicated. No captive portal. No shared key. No obvious point of failure.
For staff networks, access is tied to identity rather than a device or a password. When someone leaves and HR removes them from the company directory, they lose network access automatically. No manual IT process. No risk of former employees retaining access.
The solution scales from a single plug-in device for an independent venue, through to full city deployments, such as Newcastle’s city-wide WiFi.
The conversation worth having
Most clients haven't thought about their WiFi as a risk. That's precisely when it's worth raising.
Any client who operates a physical venue, manages staff connectivity, or handles customer data has exposure here. It's also a conversation that connects legal, IT, and operations, which makes it a useful one for strengthening broader relationships.
The opening question is straightforward: do you know who's on your network right now? If the answer is no, or even "not really", there's a conversation to be had.
If you'd like to see the full event, including the live hacking demonstration, you can watch the recording here.
Recent Posts










