www.allstateidentityprotection.com
Open in
urlscan Pro
104.255.33.48
Public Scan
Submitted URL: http://links.email.allstateidentityprotection.com/els/v2/0d~4F9zWkWcg/TjhnSVNGUXhkWkxKelcwbmtzWHVocnBxTTB2UXZNdEdqbHV3QlozbWV6TjN3b3JVYzVUUE1qalVX...
Effective URL: https://www.allstateidentityprotection.com/security-pro/seven-tips-for-device-protection-while-on-the-go?utm_source=AIP_email&utm_medium=em...
Submission: On July 21 via manual from IN — Scanned from DE
Effective URL: https://www.allstateidentityprotection.com/security-pro/seven-tips-for-device-protection-while-on-the-go?utm_source=AIP_email&utm_medium=em...
Submission: On July 21 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOMGET /content-hub/search
<form action="/content-hub/search" method="GET" class="search-form">
<div class="input-group"><input type="text" placeholder="search articles and content" name="q" autocomplete="off" aria-label="search articles and content" class="search-input form-control"><button
class="btn btn-light btn-search input-group-prepend"><span role="img" aria-label="search button"><img src="/images/magnifying-glass-search-icon.svg" height="20" width="20" alt="magnifying-glass-search-icon"></span></button></div>
</form>
Text Content
Skip to main content sign in < back home / 7 tips for device protection while on the go 7 TIPS FOR DEVICE PROTECTION WHILE ON THE GO By Allstate Identity Protection 4 min read make text bigger email articledownload article Overview When you’re traveling, it may seem convenient to use public networks and charging stations. But criminals can sometimes manipulate these shared resources to hack into smartphones, tablets, and laptops. To protect your information and devices on the go, avoid entering sensitive details while connected to public Wi-Fi, switch off Bluetooth when not in use, and charge devices with your own portable charger or wall charger. You probably take steps to protect your wallet, passport, and luggage while traveling. But what about your digital devices and the information stored on them? If you're taking a trip this summer, it's a good time to consider your approach to digital security. Simple actions can help you stay safe, such as being cautious about where you charge your phone and how you browse the web. Plus, keeping these top cyber threats in mind throughout your trip can help prevent identity theft and fraud from ruining your time away. COMMON CYBERSECURITY RISKS WHEN TRAVELING Criminals are always looking for new ways to steal money and personal information. Travelers who are focused on exploring a new place or distracted by an itinerary may be seen as easy targets. To stay safe, be aware that theft is one of the most common crimes against tourists. As well as that, travelers should also watch out for the following cyber threats: UNSECURED NETWORKS It may be tempting to log onto a public wireless network when you’re on a trip — and most airlines, airports, hotels, and coffee shops make it easy to do so by way of free public Wi-Fi. But is it safe to log on? According to the Federal Trade Commission (FTC), most websites today are encrypted, which makes connecting through a public Wi-Fi network generally safe. It’s possible, however, for sophisticated hackers to bypass site encryption. So it’s still wise to avoid conducting sensitive business, such as online banking, when connected to public Wi-Fi networks. Use your best judgment when accessing other personal accounts, such as your email, and consider the amount of sensitive information contained there. JUICE JACKING An alert issued by the Federal Bureau of Investigation (FBI) earlier this year warned that free charging stations could also pose a cybersecurity threat. The FBI warned that bad actors have found a way to use public USB ports to infect connected devices with malware, or malicious software, also known as “juice jacking.” If infected, criminals may be able to track what you do online, spy on your keystrokes (called a keylogging attack), and otherwise hack the normal operation of your device without your consent. BLUESNARFING ATTACK Another point of vulnerability is your phone’s Bluetooth, or the short-range device-to-device connection that can link your smartphone to your headphones, car, or any other wireless device located within a few feet. Keeping your devices findable via Bluetooth, or making a Bluetooth connection between your device and another wireless device in public, could be problematic. This makes your device susceptible to hackers who may want to spy on your private data, download malware, and tamper with your settings. Once a hacker has paired with their target device, they can use various techniques to access the data they need. They may do this by exploiting vulnerabilities in the firmware, or using brute force to crack passwords. HOW TO PROTECT YOUR DEVICES WHILE TRAVELING Now that you know the risks, let’s look at how to safeguard against them. Keep these cybersecurity tips in mind before — and during — your next vacation: * Enable “Find My” on all devices you’re traveling with. This lets you track down, and wipe the data off of, a lost or stolen device. * Invest in a portable wireless phone charger. This will allow you to charge your device without relying on public USB ports, which may pose a threat. At the very least, remember to pack your full charger, including both the charging cable and the Common Power Supply (CPS), AKA the portion that lets you plug your charging cable into a wall outlet. * Be sure your devices are password protected. And use good password hygiene. This will help protect your private data, should your device be lost or stolen. * Deactivate Bluetooth when you’re not using it. And avoid connecting devices via Bluetooth in a crowded setting. * Use free Wi-Fi with caution. As previously mentioned, public Wi-Fi is generally safe to use these days. That said, it’s still best to avoid using it to conduct sensitive business, such as checking your bank account or paying a medical bill. * Consider a VPN. If you’re planning to conduct remote work that involves sending or receiving highly sensitive data, consider investing in a VPN, or virtual private network, like the one we offer. This can offer an extra layer of encryption and cybersecurity. * Don’t drop your defenses to phishing scams. Stay as wary of suspicious or unsolicited emails, texts, and phone calls while traveling as you are at home. WHAT TO DO IF YOU’VE BEEN HACKED WHILE TRAVELING While hackers can typically install malware undetected, devices may show signs of being infected with malicious software. If your phone or computer starts acting irregularly — for example, if new apps appear that you didn’t download or if you see outgoing text messages that you didn’t send — it may be a sign of foul play. Another tip-off is battery life. If your device suddenly can’t hold a charge or feels hot to the touch, have it inspected for malware. If you’re an Allstate Identity Protection member and your device is lost, stolen, or hacked during a trip (or while at home), give us a call right away. We can help you determine the best course of action for securing your data. Quick Guide BEFORE YOU HIT THE ROAD, CONSIDER THESE ADDITIONAL SAFETY TIPS * Leave unnecessary tech at home * Install the most current software updates * Ensure two-factor authentication is enabled for important accounts SHARE THIS CONTENT TO YOUR SOCIAL CHANNELS RECENT POSTS THE SURPRISING TRUTH ABOUT YOUNG PEOPLE AND SCAMS 4 min THE LATEST ON SCAMS AIDED BY AI 3 min TRY THESE TIPS TO COMBAT ACCOUNT TAKEOVERS 5 min * COMPANY INFORMATION * Careers * About us * Log in * QUICK LINKS * Personal solutions * Business solutions * Partnership opportunities * CONNECT WITH US Privacy StatementNotice of CollectionTerms & ConditionsAccessibility Copyright © 2023 Powered by InfoArmor, an Allstate Company