Public WiFi for Your Business: Setup, Security and Best Practices
Providing public WiFi for customers and visitors requires more than plugging in a second router. This guide covers the right approach to network architecture, legal requirements under UK GDPR, hardware options and the security controls that protect your business while keeping guests connected.
Matt Cannon
Managing Director
The Business Case for Guest WiFi
Offering WiFi to customers, clients and visitors is now an expected amenity in most business environments — from retail and hospitality to professional services and co-working spaces. Done well, it improves customer satisfaction and can support marketing goals. Done poorly, it creates a direct pathway into your corporate infrastructure.
The challenge is that many businesses either share their corporate WiFi password with visitors (a significant security risk) or buy a consumer router without understanding the segmentation limitations. Neither approach is acceptable for a business that takes data protection seriously.
Understanding the Risks of Unmanaged Guest WiFi
When a visitor connects to your WiFi, their device joins the same broadcast domain as your other connected devices unless you have implemented proper segmentation. This creates several risks:
- Network reconnaissance: A technically capable visitor can scan the network and identify connected devices, open ports and services.
- Lateral movement: If a visitor's device is already compromised by malware, that malware can attempt to spread to other devices on the same network segment.
- Bandwidth abuse: Without limits, visitors can consume your internet capacity, degrading performance for business operations.
- Legal liability: If a visitor uses your network for illegal activity (copyright infringement, distributing prohibited content), your IP address is associated with that activity.
The Right Architecture: VLANs and Network Segmentation
The foundation of a secure public WiFi setup is network segmentation using VLANs (Virtual Local Area Networks). The guest SSID should be assigned to a separate VLAN that has no routing path to your internal corporate network.
In practical terms this means:
- Visitors can browse the internet normally
- Visitors cannot reach your file servers, internal applications, printers or other devices
- Your corporate devices cannot see guest devices
- The guest VLAN exits to the internet through your firewall with appropriate rules
This architecture requires a managed switch, a business-grade access point, and a firewall or router capable of VLAN routing. Consumer-grade equipment frequently lacks these capabilities.
Choosing the Right Hardware
Business Access Points
For most SMEs, platforms such as Ubiquiti UniFi, Cisco Meraki and Aruba Instant On offer a good balance of capability and cost. These support multiple SSIDs, VLAN tagging, central management and detailed logging. Access point costs typically range from £150 to £500 per unit depending on the model and coverage requirements.
Managed Switches
To pass VLAN-tagged traffic between your access point and firewall, you need a managed switch. Entry-level managed switches from brands like Netgear, TP-Link or Cisco are available from around £80–£300 for small deployments.
Firewall
Your firewall enforces the rule that guest traffic cannot reach internal systems. If you are using a basic ISP-supplied router, you may need to upgrade to a proper business firewall such as pfSense, FortiGate or Sophos. Managed firewall services are available from around £30–£60 per month.
Captive Portal: Terms, Consent and Marketing
A captive portal requires visitors to accept terms before gaining internet access. From a legal standpoint, it creates evidence that users agreed to your acceptable use policy. From a marketing standpoint, it is an opportunity to collect email addresses — but only with clear, freely given consent under UK GDPR.
Key requirements if you collect personal data via a captive portal:
- State clearly what data you are collecting and why
- Provide a link to your privacy policy
- Do not bundle WiFi access with consent to marketing — consent must be freely given
- Store the consent record and retention period appropriately
- Provide a simple way for visitors to withdraw consent
Bandwidth Management and Fair Use
Without controls, a single visitor streaming video in 4K can saturate a modest internet connection. Set per-SSID bandwidth limits appropriate to your connection speed. For a 100 Mbps leased line, allocating 20–30 Mbps total to guest WiFi while protecting 70–80 Mbps for business use is a reasonable starting point.
Most business access points allow you to configure QoS (Quality of Service) rules that prioritise business-critical traffic (VoIP calls, CRM systems) over guest internet traffic automatically.
Security Controls Checklist
Before making your guest WiFi available to visitors, confirm the following:
- Guest SSID is on a dedicated VLAN with no internal routing
- Client isolation is enabled (guests cannot see each other)
- Firewall rules block guest VLAN access to all private IP ranges
- WPA2 or WPA3 encryption is active (not open/unsecured)
- Bandwidth limits are configured
- DNS filtering is applied to the guest VLAN
- Connection logging is enabled and retained for at least 30 days
- A captive portal with acceptable use terms is in place
- Guest WiFi password is rotated regularly
Ongoing Management
Guest WiFi is not a set-and-forget infrastructure component. Include it in your regular IT security reviews, check that firmware updates are applied to access points and periodically verify that the VLAN segmentation remains intact — particularly after any network changes or equipment additions.
AMVIA manages WiFi infrastructure for a range of UK businesses, handling everything from initial design and deployment to ongoing monitoring. If your current guest WiFi arrangement has grown organically rather than being properly designed, a review is worth scheduling before an incident prompts one.
Is Your Guest WiFi Properly Segmented?
Most businesses assume their guest WiFi is secure. Many are wrong. AMVIA can review your current setup and confirm whether your corporate network is properly protected.
Frequently Asked Questions
A second router can work in some configurations, but only if it is connected to your internet gateway in a way that bypasses your corporate network entirely — not bridged into your existing LAN. Without proper configuration, a second router provides minimal security benefit. Business-grade access points with VLAN support are a more reliable solution.
Yes. Under the UK GDPR, if you collect any personal data (IP addresses, email addresses, login times), you must inform visitors via a privacy notice. If you are using a captive portal to collect email addresses for marketing purposes, consent must be freely given and separately obtained from access to the WiFi service.
For most businesses, changing the guest WiFi password weekly or monthly is appropriate. In high-footfall environments like cafes or reception areas, weekly rotation reduces the risk of former visitors connecting later. Display the current password at your reception or on a welcome card rather than using a static long-term credential.
Client isolation is a setting that prevents devices on the same WiFi network from communicating with each other. On a guest WiFi network, enabling it means Visitor A cannot attempt to access Visitor B's device. It is a simple, low-cost control that significantly reduces the risk of peer-to-peer attacks on your guest network.
No — guest WiFi is designed for internet-only access and should not route to internal systems. Contractors who need access to business systems should be provisioned with temporary accounts and credentials following your normal access management process, ideally connecting via a managed device on your corporate network or through a VPN.
Related Reading
How to Set Up Public WiFi for Business Visitors
Step-by-step guidance on configuring a secure guest WiFi network, from VLAN setup to captive portals.
Data Protection & Privacy | UK GDPR Guide for Businesses
What UK GDPR means for businesses collecting data from customers and visitors.
UK Cybersecurity Guide for SMEs | Practical Steps
A practical overview of the most important cybersecurity controls for UK small and medium businesses.