7 Tips on Data Security for Business Travelers 7 Tips on Data Security for Business Travelers

7 Tips on Data Security for Business Travelers

by Calyptix, July 8, 2016

Business Travel TipsTravelling for work is becoming more and more commonplace for American employees.

Priorities for a business trip can vary, but one thing always at the forefront of employer and employee minds is traveler safety.

But how concerned are you about the safety of your company’s network or work device?

When caught up in the hustle and bustle of business travel, it can be easy to forget about the importance of keeping in check with your company’s network security policies.

Unfortunately, losing focus while being so vulnerable can be bad news for a business.

Protecting yourself and your company from data breaches and incidents can be as simple as following these business travel tips.

Business Travel TipsTip #1. Avoid public computers

Using a computer provided in a hotel lobby or café can be especially risky because you can’t control who will use the computer before or after you do.

This can leave you vulnerable to keylogging programs or other tracking software.

Using a public computer for general tasks such as checking the weather or looking for a place to catch some grub is fine, however, avoid logging in to any personal or business accounts.

If you find yourself in absolute need of accessing your email or Facebook news feed, be sure to use the incognito or a similar browsing setting in order to protect your information.

Once you finish looking about, clear your browser’s history, cache, download history, and cookies.

Business Travel TipsTip #2. Password protect your devices

In the event your work laptop or cell phone gets stolen, setting your device to require a password for access can help deter thieves and hackers from getting private information from it.

While other measures such as encryption should still be put into place, making your device password sensitive is an easy way to buff up your device’s security on a business trip.

Tip #3. Encryption, Encryption, Encryption

Speaking of encryption, setting your device up with encryption software can also help keep your information safe from prying eyes.

Be sure to encrypt your device before any business travel to ward off hackers.

Business Travel TipsTip #4. Use a VPN

Using a VPN provided by your company is another way to help secure information on your device.

By accessing the internet through a private network, you are able to keep your credentials, transaction info and location secure and encrypted.

If your company doesn’t provide a VPN, never fear – you have plenty of paid and free options to choose from (unlimited VPN also comes standard on Calyptix AccessEnforcer).

Tip #5. Patch up your software

Software companies release patch updates regularly in order to keep ahead of the latest hacking trends such as malware and phishing attempts, so updating your device before embarking on your business journey can help minimize your risk for a successful attack.

As annoying as it might be, a software update can be the thing that stands between your company’s sensitive information and a malicious attack.

Business Travel TipsTip #6. Only use Wi-Fi that requires a password

To the trusting eye, a Wi-Fi network with the same name as the locally loved coffee shop you’re in may not seem like a security threat at all.

However, hackers have been known to create fake networks that attract unsuspecting victims.

Avoid using unprotected networks. If you’re out and about and find yourself needing to hop online, but don’t see a secure network to use, use the hotspot access from your cell phone.

4G networks are much more secure than any local network you find in the area.

TBusiness Travel Tipsip #7. Wipe a stolen device

A lost or stolen smartphone can be heartbreaking, but it doesn’t have to lead to a data security disaster at your company.

Android and iOS provide ways to wipe your phone of all personal data even when it’s out of your reach.

Android’s Device Manager will allow you to remotely wipe, ring, or lock a device, or view its location on a map.

iOS’s Find My iPhone tool provides similar options.

Make sure these features are enabled BEFORE you travel or lose a phone. Here’s how:

  • iPhone – enable Find My iPhone in your Settings app under iCloud > Find My iPhone.
  • Android – turn on Device Manager in your Settings app under Google > Security > Android Device Manager.

 

Business Travel TipsAbove all else, exercise caution whenever plugging into the world wide web while adventuring across the nation (or world).

Not knowing who or what to trust leaves you and your company at a severe disadvantage during travel.

By following these tips, you can help ensure that you won’t be the weak link between your company and a successful hacking attack.

 

 

 

Related Sources

Eight Ways to Stay Secure while Traveling

Internet Security for Travelers

10 Tips for Secure Business Travel

Top Seven Network Attack Types in 2016

2 Comments


    • JM Pettaway
      Reply Cancel Reply
    • July 26, 2016

    I called Entrust yesterday to inquire about email encryption. Their sales people indicated that in order for it to work, everybody you send encrypted email to has to also have email encryption. I would guess that most people we send email to do not have email encryption so it appears I would be accomplishing very little. What am I missing?

      • Adam Sutton, Calyptix
        Reply Cancel Reply
      • July 26, 2016

      Hi Mike -- Thanks for commenting. I cannot speak to Entrust's solution, but the encryption we recommend in this post is in reference to a device's data -- i.e. encrypting individual files or full-disk encryption. This will prevent thieves from accessing important information on a stolen device. If you're considering email encryption, and if it requires both the sender and recipient to use the same solution, then you may want to consider using it for only a portion of your correspondence. Email is notoriously insecure and should not be used to send sensitive information. However, if you have a few contacts who require you to send such information via email, then you may ask them to use the encryption system. That way your sensitive information is encrypted, and only a subset of your contacts have to use the system.

Leave a Reply

Your email address will not be published Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

*