www.techtarget.com Open in urlscan Pro
2606:4700:4400::6812:2a27  Public Scan

Submitted URL: https://go.techtarget.com/r/219032249/44254533/17?utm_content=eru-rd2-rcpG
Effective URL: https://www.techtarget.com/whatis/feature/10-cybersecurity-tips-for-business-travelers?utm_campaign=20220425_ERU+Transmissi...
Submission: On April 25 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.techtarget.com/whatis/search/query

<form action="https://www.techtarget.com/whatis/search/query" method="get" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search Thousands of Tech Definitions</label>
  <input class="header-search-input whatis" id="header-search-input" type="text" name="q" placeholder="Search Thousands of Tech Definitions">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>

Text Content

3
Trending Now

4 common causes of wi-fi problemsDownload NowView All3
X
3Hello, these 3 documents have been trending and as a member they are free to
you.
 * 
   4 common causes of wi-fi problemsDownload Now
 * 
   Wi-Fi 6: What you need to knowDownload Now
 * 
   What building materials are bad for Wi-Fi?Download Now




WhatIs.com
Search Thousands of Tech Definitions
Browse Definitions :
 * A
 * B
 * C
 * D
 * E
 * F
 * G
 * H
 * I
 * J
 * K
 * L
 * M
 * N
 * O
 * P
 * Q
 * R
 * S
 * T
 * U
 * V
 * W
 * X
 * Y
 * Z
 * #

Login Register
 * Techtarget Network
 * Tech Accelerator
 * Webinars

RSS
 * WhatIs.com
 * Browse Definitions Security Admin
   Security View All
    * Authentication and access control
    * Compliance, risk and governance
    * Network security
    * Threat management
   
   Business software View All
    * ERP
    * HR management
    * Marketing and CX
    * Microsoft
    * Software applications
   
   Cloud computing View All
    * Internet applications
    * Internet of Things
    * Web services
   
   Computer science View All
    * Electronics
    * Internet technologies
    * IT standards and organizations
    * Microprocessors
    * Robotics
   
   Data analytics and AI View All
    * Algorithms
    * Artificial intelligence
    * Data and data management
    * Database management
   
   Data centers View All
    * Data backup and disaster recovery
    * Data center management
    * Linux
    * Operating systems
    * Storage Admin
    * Storage and Data Mgmt
    * Virtualization
   
   IT management View All
    * Certifications
    * IT career paths
    * IT Operations
    * Personal computing
    * Project management
    * Technical support
   
   Networking View All
    * High-speed networks
    * Network Admin
    * Network hardware
    * Networking and communications
    * Wireless and mobile
   
   Security View All
    * Authentication and access control
    * Compliance, risk and governance
    * Network security
    * Security Admin
    * Threat management
   
   Software development View All
    * Agile software development
    * AppDev
    * DevOps
    * Programming
   
   Please select a category
    * Business software
    * Cloud computing
    * Computer science
    * Data analytics and AI
    * Data centers
    * IT management
    * Networking
    * Security
    * Software development

 * Quick Study Resources
    * Business strategies
    * Career resources
    * Emerging tech
    * Tech explainers

 * Follow:
 * 
 * 
 * 



Getty Images

Getty Images

Feature


10 CYBERSECURITY TIPS FOR BUSINESS TRAVELERS




DON'T PUT YOUR SENSITIVE INFORMATION AT RISK WHEN YOU TRAVEL. LEARN HOW TO TAKE
A FEW EXTRA PRECAUTIONS WITH THESE CYBERSECURITY TIPS.

Share this item with your network:

 * 
 * 
 * 


By
 * Amanda Hetler, SEO Content Writer

Published: 22 Apr 2022

Whether you are a seasoned traveler or traveling for the first time,
cybersecurity poses a risk. Business travelers are extremely vulnerable because
they carry sensitive data, so it's vital that they take extra precautions to
keep this information safe.



After being cooped up during the pandemic, business and leisure travelers are
itching to globe-trot once again. Referred to as "revenge travel," people are
rushing to book their next trips to make up for lost time, and companies are
looking to send their employees out for business once again. Industry experts
expect travel levels to be higher than pre-pandemic levels.

With more and more people traveling, criminals are looking to capitalize. To
protect your personal information and your company's sensitive data, follow
these 10 cybersecurity travel tips to ensure your information doesn't travel to
an unwanted destination.


1. LOCK DOWN DEVICES

Using a strong password or PIN is necessary to keep your information safe.
Keeping tablets, smartphones and laptops locked when not in use is even more
important. Most of these devices have security settings to lock the device with
a fingerprint ID, facial recognition or PIN.

> Having your device unlocked for even a minute or two can give hackers plenty
> of time to breach it.

If you misplace your items, this is the first line of defense. Having your
device unlocked for even a minute or two can give hackers plenty of time to
breach it.


2. UPDATE PASSWORDS

Change passwords that you regularly use, along with PINs on your devices. Also,
don't use a common PIN for a safe or security box in the hotel. Be sure to
create a strong password using a mix of characters and recommended length of at
least 12 characters. Consider creating short phrases to help you remember
passwords.

You might also choose to use a password manager that stores passwords in one
protected area. You can use free password managers, such as LastPass or KeePass,
found in the app stores, or use the ones built into your devices and browsers,
such as iCloud Keychain and Google Password Manager. You can also pay a small
subscription fee for more features on password managers such as Dashlane or
1Password.

You can change all your passwords once you return home. Having a set of travel
passwords versus the same passwords you use at home and the office gives you
another level of protection.

Steps for proper password hygiene.



3. USE CAUTION WITH PUBLIC WI-FI

Free Wi-Fi might seem appealing, but it makes you vulnerable to security issues.
Using unsecured and unencrypted Wi-Fi networks in areas such as hotel rooms,
airports, cafes, lounges and meeting venues puts you at risk for data theft.
When you are connected to these networks, anyone can read and track your
information.

If you must use public Wi-Fi, you can reduce your risk by using a VPN. A VPN
creates a more secure connection with password protection and encryption. This
scrambles your information so that people can't read your passwords, data or
anything else you send or receive online. If you cannot connect to a VPN, avoid
accessing your personal accounts and sensitive business data while using a free
hotspot connection.

How a VPN protects data using encryption.



4. INSTALL ANTIVIRUS SOFTWARE ON ALL DEVICES

One of the easiest and most effective ways to keep your business and personal
information safe is to install antivirus software on your mobile devices. This
includes your laptop, tablet and smartphone.

Having this software is a last line of defense. This protects you if you
accidentally connect to an infected network and helps protect your devices from
malware, which can steal your personal or business information and crash your
device.

Be sure you install any antivirus updates as soon as possible. These updates
include security patches and other fixes to your antivirus software.


5. UPDATE OPERATING SYSTEMS AND APPS

Just like antivirus software, you need to keep your operating systems current.
You should also update the apps on your smartphone -- especially ones you use
regularly for your job or personal business.

Before traveling, check that everything is up to date. These updates can fix
known bugs or security issues. You should complete all these updates before you
leave and not while you are traveling.


6. DISABLE BLUETOOTH

Bluetooth connectivity can present problems because signals come from all
directions. When you leave Bluetooth on, people nearby can connect to your phone
and possibly hack your device. Keep Bluetooth disabled as much as possible to
prevent potential attacks.


7. BACK UP INFORMATION ON YOUR DEVICES TO THE CLOUD

Before traveling, back up your devices' data to the cloud to keep your
information safe. While you try to protect your devices, life happens. It's
possible that you will either lose your device or damage it.

Trying to restore data while traveling can be complicated. Having all your
information in the cloud lets you access this information from anywhere, since
it is on a remote server, and provides a backup for items stored on your
computer.


8. STOP AUTO-CONNECTING

Most phones have a setting to automatically connect to Wi-Fi networks. While
this can be useful for your daily activities, don't connect to Wi-Fi networks as
you travel.

Turn off this feature before you travel to prevent your laptop and smartphone
from automatically connecting to a network. Instead, manually connect to
networks after determining they are safe.


9. BE CAUTIOUS OF SKIMMER DEVICES

Criminals can use skimmer devices to copy credit card information without
touching or using your card. It takes only seconds for someone to hover the
device over your credit card and copy its data. They can even do this by
hovering the device near your wallet or pocket.

An easy way to prevent this is to use an RFID protection wallet or card holder
that creates a digital wall between your credit cards and the skimmer. Wrapping
your cards in foil will also block the signal.

Skimmers can also be hidden on ATMs and other legitimate card readers. The
machines still operate properly, so they are harder to detect. Check ATMs for
any signs of tampering before inserting your card. Also look for any pieces that
don't seem to fit properly.


10. MINIMIZE LOCATION SHARING

It is common for travelers to update their social networking sites while
traveling to new cities or countries. However, this excessive sharing creates a
security threat. Telling everyone that you are away makes it easy for criminals
to know when you are not in your hotel room or at home. Limit the information
you post online to limit threats to your property, including your work devices.

NEXT STEPS

17 free cybersecurity tools you should know about



RELATED RESOURCES

 * ISM Essentials Guide on Cloud and Virtualization Security –SearchSecurity.com
 * Cloud Endpoint Security: Considerations for Cloud Security Services
   –SearchSecurity.com
 * The New Network: Software-Defined Networking Gets Real –SearchSecurity.com
 * Maintaining security in managed services –SearchSecurity.com

DIG DEEPER ON SECURITY MANAGEMENT

 * ONE ACTOR BEHIND MAGECART SKIMMER KIT
   
   
   By: Cliff Saran

 * RETAILER MONSOON ALLEGEDLY EXPOSING DATA VIA PULSE CONNECT SERVER
   
   
   By: Alex Scroxton

 * NORTH KOREA BEHIND SPATE OF MAGECART ATTACKS
   
   
   By: Alex Scroxton

 * ACCESSORIES STORE CLAIRE’S HIT BY MAGECART CREDIT CARD FRAUDSTERS
   
   
   By: Alex Scroxton

Sponsored News
 * Two Game-Changing Wireless Technologies You May Not Know About –Intel
 * Is DASH Enough? Identifying the Real Needs of PC Fleet Management –Intel
 * Built for Business, Built for Now –Intel

Related Content
 * Ticketmaster breach part of worldwide card-skimming ... – SearchSecurity
 * Warzone bulletproof hosts protecting Magecart group – ComputerWeekly.com
 * North Korea behind spate of Magecart attacks – ComputerWeekly.com



Latest TechTarget resources
 * Networking
 * Security
 * CIO
 * HR Software
 * Customer Experience

SearchNetworking
 * What is 6G? Overview of 6G networks & technology
   
   6G (sixth-generation wireless) is the successor to 5G cellular technology. 6G
   networks will be able to use higher frequencies ...

 * OSGi (Open Service Gateway Initiative)
   
   The OSGi (Open Service Gateway Initiative) specification is a Java framework
   for developing and deploying modular software ...

 * small cell
   
   A small cell is an umbrella term used to describe a miniature radio access
   point or wireless network base station with a low ...

SearchSecurity
 * security information management (SIM)
   
   Security information management (SIM) is the practice of collecting,
   monitoring and analyzing security-related data from computer...

 * WLAN Authentication and Privacy Infrastructure (WAPI)
   
   WLAN Authentication and Privacy Infrastructure (WAPI) is a wireless local
   area network security standard officially supported by ...

 * mail bomb
   
   A mail bomb is a form of a denial-of-service (DoS) attack designed to
   overwhelm an inbox or inhibit a server by sending a massive...

SearchCIO
 * IT asset management (ITAM)
   
   IT asset management (ITAM) is a set of business practices that combines
   financial, inventory and contractual functions to ...

 * business process
   
   A business process is an activity or set of activities that accomplish a
   specific organizational goal. Business processes should ...

 * IT innovation
   
   IT (information technology) innovation in an enterprise is about using
   technology in new ways, where the result is a more ...

SearchHRSoftware
 * chief human resources officer (CHRO)
   
   Chief human resources officer (CHRO) is a top-level management executive in
   charge of an organization's employees.

 * talent management
   
   Talent management is a process used by companies to optimize how they
   recruit, train and retain employees.

 * HR automation
   
   Human resources automation (HR automation) is a method of using software to
   automate and streamline repetitive and laborious ...

SearchCustomerExperience
 * neuromarketing
   
   Neuromarketing is the study of how people's brains respond to advertising and
   other brand-related messages by scientifically ...

 * contextual marketing
   
   Contextual marketing is an online marketing strategy model in which people
   are served with targeted advertising based on their ...

 * call center schedule adherence
   
   Call center schedule adherence is a standard metric used in business call
   centers to determine whether call center agents are ...

 * Browse by Topic
 * Browse Resources

 * About Us
 * Editorial Ethics Policy
 * Contact Us
 * Advertisers
 * Business Partners
 * Events
 * Media Kit
 * Corporate Site
 * Reprints

All Rights Reserved, Copyright 1999 - 2022, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info


Close