• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » data privacy » 10 Cyber Security Tips for Business Travelers

10 Cyber Security Tips for Business Travelers

2017-08-08 by Michelle Dvorak

10 Cyber Security Tips for Business Travelers

Cyber security for business travelers (or leisure trips too!)is becoming of increasing importance. It’s so easy to have your credit information lifted. It’s said that the average person has erroneous bank charges at least once a year now. I know I just got another letter from my bank stating that one of my cards will be replaced due to a data compromise at a retail location where I made a purchase. Whether it’s protecting your laptop from physically being taken from an unattended hotel room, or guarding your credit card data, or even keeping the information on your smartphone safe, cyber security for business travelers takes diligence and knowledge of hackers’ practices.

Don’t Use Unsecured WiFi

Unsecured WiFi is an open wireless connection to the internet that has no password and is available to anyone who wants to use it, including hackers. Many times, the wireless connection is free allowing business travelers to simply select the network from their laptop, smartphone, or tablet so they may gain access to the internet. However, what many don’t realize is that anyone in the area can use that same network to sniff the WiFi traffic for passwords, login names, credit card numbers, or anything else while it is in transit. WiFi connections are easy to hack, it just takes time and a readily available software called a packet sniffer.

Password Protect Device Hotspots

Your smartphone can be a WiFi Hotspot. That means you can use your cellular data to broadcast a network to other nearby wireless capable electronic devices. But did you know that your hotspot can be detected and used by anyone within 100 feet? Potentially your hotspot can be an unsecured network. That’s why you should always setup a password on the device used to create the hotspot.

Use a RFID Case for Credit and Bank Cards

While I was on the Las Vegas Strip two years ago, one of my travel companion’s credit card was stolen. She didn’t know anything was wrong until her bank called her while we were walking down the Las Vegas strip. We were in Las Vegas, but there had been a charge in Reno, Nevada, then another in Maryland just a few hours later. She still had the card in her possession and had not used it during her trip. Her card had been scanned.

The next time I was in Vegas, as I approached an outdoor escalator I notice a man with a backpack leaning against the trash can at the foot of the escalator. The trash can, and the guy were positioned so that you would most likely walk fairly close to him to get to the escalator. He had a backpack at his feet. A credit card RFID reader can read your cards’ data from about two feet away. There was a stream of pedestrians walking within a few inches of this guy because of his convenient positioning. Ever since my card was lifted in New York city I travel with my cards in a RFID blocking wallet.

Don’t log into anything important using a public computer

Public computers are available in places like hotel business centers, resorts, and public libraries. This is one of the easiest ways to gain access to someone’s account or personal information. Don’t use a public (shared) computer to log into any account, including social media accounts, dating websites, and of course any kind of financial account.

Lock Electronics in the Hotel Safe

When you leave the room lock your electronic devices in the hotel safe. Don’t give cleaning hotel staff or thieves the chance to break in to your room and steal laptop. Call the hotel or look on travel review sites prior to booking and make sure that your hotel has a room safe and that a laptop will fit into it.

Don’t Use Bank Cards at Train Ticket Kiosks

Last year when I was traveling in New York City, my card was swiped. Although I still had the physical card, it was being used at gas stations and restaurants in Long Island. My bank shut down the card and had to open an investigation to get the cash back. Although they only charge about $500 worth of products and services, it could have been much worse. The investigation took about two weeks to complete before my money was restored to my bank account. Use a credit card, rather than a bank card when possible, that ways hackers cannot get at your actual cash.
I’ll never know if it was the ticket machine that swiped my card number or if I had just been scanned. Now, I only use the app to buy my tickets. No more credit cards!

Favor Restaurants that Swipe Credit Cards at the Table

When I traveled to Spain I noticed that all the restaurants bring a portable card reader to the table to swipe your credit card for payment. Restaurants in the United States almost universally take the card away to the point-of-sale terminal. I’d rather have my card in sight, so I know the numbers are not being copied for later use! When you find a restaurant that swipes at the table, then use that establishment Otherwise, go old school and pay cash!

In a hotel, use electrical outlet, not USB charger

It very easy to hack into a smartphone plugged into a USB port charger. A hacker that was in the room before you, can install a $30 device to read your phone’s information. When you use a USB charging port you basically connecting your phone to a data port when the only thing you wanted to so is to charge your phone. This applies to any USB port including those in coffee shops, airports, and conference centers.

Don’t Use Smartphone Charging Kiosks

This applies, paid or free phone charging kiosks. The bit above about not using USB chargers applies to those public charging kiosks too. Although the companies that are operating those kiosks are not hacking your phone they may be recording some of your identifying information. Many phone charging kiosks capture the unique ID of your phone while its charging. It’s use to gather metrics about the kiosk’s use. It can also be used to track your phone form one kiosk to another. Be sure to read the terms of service before using any service such as a charging kiosk.

Turn Device Location Data Off

Whether you realize it or not your location data and WiFi usage are being used to track you. Location sold to advertisers in the form of behaviors and interests. With this information advertisers select who they want to show advertisements to on social media channels, with website banner ads, and with Google AdWords ads. Do you think that checking in on Facebook for your favorite charity is a donation from the kindness of someone’s heart? Guess again, it’s so you can contribute to the wealth of massive data pool coveted by advertisers.


Stay Safe Onlne – Subscribe! It’s FREE

* indicates required

 
 

 

 



Filed Under: data privacy Tagged With: travel, tutorial

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version