So, here’s the scene: Sadly, I had to take a family member to A&E.
Naturally, in the rush, I forgot a book, and of course, there was no 5G signal.
Hours of waiting stretched ahead, with the only connection to the outside world being the hospital’s public Wi-Fi.
As the CEO of a cyber and tech company, I don’t take chances with public Wi-Fi, but sometimes, you have to make the best of the situation.
I wasn’t about to let a few hours in a hospital waiting room become a cybersecurity free-for-all.
Here’s how I made myself “hard to hack” in A&E:
1. I Fired Up My VPN – A Digital Suit of Armour
Public Wi-Fi is like a crowded, unsecured room where anyone can snoop on what you’re doing.
So, rule number one: VPN on.
A VPN (Virtual Private Network) encrypts your connection, making it way harder for anyone else on the network to see or intercept my data.
It’s like a private tunnel, and in places like A&E, it’s non-negotiable.
2. I Avoided Accessing Sensitive Information
Sure, hours of waiting can make it tempting to catch up on work emails or even check online banking.
But I stuck to safe territory: no sensitive accounts, no logins.
Even with a VPN, public Wi-Fi is still a shared space, and you never know who’s lurking.
If you don’t absolutely need to access it, don’t.
When in doubt, avoid pulling up anything you wouldn’t be comfortable sharing in a crowded room.
3. I Locked Down My Device Settings
Most people don’t realise that devices are often set to automatically share or connect with others nearby.
First thing I did? Disable all sharing features.
That means turning off file sharing, AirDrop, Bluetooth, anything that could make my device accessible to others on the same network.
The last thing I wanted was for my phone to be discoverable by anyone else hanging around the A&E Wi-Fi.
4. I Checked for “Fake” Hospital Wi-Fi Networks
Here’s a trick cybercriminals love: setting up Wi-Fi networks with names similar to legitimate public networks.
So, I did a quick check with the hospital staff to make sure I was connecting to the real Wi-Fi and not some “fake” network created by an opportunistic hacker.
If you’re in a public space, never connect to a network without double-checking - it’s the Wi-Fi equivalent of leaving your front door unlocked.
5. I Disconnected When I Didn’t Need It
Once I’d caught up on some non-sensitive bits and had my fill of scrolling through the news, I logged out of the network entirely.
Staying connected to public Wi-Fi longer than necessary just keeps you exposed.
I wrapped up my online browsing, disconnected, and saved my data for when I really needed it.
6. Remembering That A&E Can Be a Social Engineering Playground
While I was at A&E for personal reasons, a public hospital waiting room can also be a prime fishing pond for social engineering.
You’re surrounded by people, all potentially chatting, sharing information, maybe even logging into work accounts.
If you’re working remotely, be mindful of who’s around you and what details you’re sharing aloud or displaying on your screen.
Attackers can use casual observations to get information for later, whether it’s your job title, business name, or a casual mention of a project.
Final Thought: Cybersecurity Isn’t Just for Your IT Team
Being hard to hack isn’t about avoiding public Wi-Fi altogether or retreating into a digital bunker.
It’s about making cybersecurity part of your daily habits, even when the circumstances aren’t ideal.
Just a few quick moves can make all the difference in keeping your data and privacy safe.
And if it’s this easy to protect yourself in A&E, imagine how these habits can improve your resilience elsewhere.
Oh, and thankfully the family member is all well.
At Toro Digital, we’re here to make cybersecurity second nature - whether you’re in a high-stakes boardroom or a busy waiting room.
Make these simple routines your standard, and you’ll be a lot harder to hack.