Now that the temperatures are rising, many employees might be contemplating taking a break from their workspace. You could be more inclined to attend that seminar in Barcelona or go on a vacation with the family while keeping the corporate phone close at hand.
Whether you’re boarding a flight or enjoying a relaxing break closer to home, relocating your work away from your usual office space introduces a new array of security hazards. These encompass unsecured Wi-Fi networks, compromised public charging stations, and Bluetooth intrusions.
So if you’re embarking on a vacation with your laptop in tow this summer, TechRepublic has conversed with specialists to unveil the finest strategies to safeguard your digital gadgets and company information.
SEE: Key Travel Suggestions for Business Professionals from TechRepublic Premium
1. Consult in-house security team before embarking on your journey
Tim Rawlins, a senior consultant and security head at NCC Group, highlighted the significance of communicating with your organization’s security unit before heading out with work devices to ensure you’re up to date with any policies and procedures.
“Working internationally is not always permissible; there could be visa concerns or security constraints such as geo-blocking and data sovereignty matters that you may have overlooked,” he informed TechRepublic.
“Stay abreast of the local circumstances and be mindful of prevalent scams and dangers in the area you’re visiting. Promptly report any dubious activities or potential security breaches to your firm’s IT or security department.”
2. Refrain from using public Wi-Fi networks
Martin Lee, the EMEA lead at cybersecurity corporation Cisco Talos, conveyed to TechRepublic via email, “There’s consistently the temptation to economize on data roaming fees by connecting to public networks or WiFi. Nevertheless, it might be worthwhile to contemplate paying additional fees to guarantee the safety of your data.”
“Shared public networks may be utilized by dubious individuals, or a seemingly cost-free network may be a deceitful ploy set up to deceive the unwary. A cybercriminal snooping on a network could filch cookies or session tokens to gain entry to your confidential services.
“Alternatively, an attacker might execute a man-in-the-middle assault to impersonate a crucial system while intercepting and altering data.”
3. Employ a VPN
VPNs can be utilized on smartphones connected to local cellular networks abroad, as well as on laptops. Trevor Horwitz, the founder and Chief Information Security Officer of TrustNet, mentioned in an email to TechRepublic, “By encrypting your data before it exits your device, a VPN guarantees any intercepted data remains unreadable.
“Another bonus of a VPN is the ability to disguise your location by assigning a new IP address. This aids in circumventing any restrictions imposed by the Wi-Fi provider and heightens online privacy.”
SEE: Top 5 VPNs for Travelling in 2024 (Free & Premium VPNs)
4. Conceal devices securely while on the move
“When journeying, ensure that devices are kept discreetly out of view,” stated Lee. “Remain vigilant of your surroundings during device usage, as thieves are skillful at seizing devices in crowded spots, discreetly getting hold of them when attention shifts elsewhere.”
Rawlins advised staying especially alert when using a mobile phone’s navigation app. “Phones are frequently snatched on the street by criminals riding electric bikes, or during the closing of doors on public transport,” he explained to TechRepublic via email.
5. Opt for exclusive work gadgets or virtual desktop alternatives
Horwitz advised that frequent travelers should mull over acquiring a designated work device that contains solely the necessary data and functionalities for their journey. “This approach boosts security by segregating travel-related activities from primary devices, allowing for stricter security protocols and decreased risks,” he elaborated.
“Preceding and following the journey, erase the dedicated devices and restore them to a pristine state. Lastly, make sure to inspect and scrutinize any dubious activities that could have taken place during your travels.”
Any information stored on a work device should be encrypted and backed up. Horwitz suggested that it’s preferable to store backups in the cloud rather than on an external drive, enabling access to a duplicate while abroad if necessary and facilitating automatic updates.
Alternatively, ponder on utilizing a virtual desktop solution that remotely links to a device in the office. Horwitz noted, “All the data and files used are stored in the virtual setting and not on the local gadget. If a gadget is stolen, there should be no data to pilfer.”
6. Protect work devices
The foundation for safeguarding the devices you bring along begins with their built-in security configurations and antivirus software.
Rawlins stated, “Safeguard your devices with robust, unique passwords and activate biometric security features whenever feasible. Additionally, update your software, specifically the operating system, to the latest available version.
“Activate two-factor authentication on all your accounts, especially your email where password reset messages are sent, but utilize an authenticator app instead of a text or email forwarded to your phone.”
Andrew Lungsden, a security consultant at Forge Secure, supplemented in an email, “Limiting the number of login attempts before an account gets locked out can also deter someone from cracking a weak password.”
He also endorsed the use of personal firewalls, which scrutinize and filter incoming and outgoing network traffic. “This guarantees that you reduce the connections your laptop might expose to an untrusted Wi-Fi network, and helps minimize your device as a potential target,” Lungsden emphasized.
7. Utilize a privacy screen
Lungsden suggested, “If you’re engaged in projects containing client data or any sensitive information, having an individual nearby glimpsing at your screen could pose a threat.
“You can mitigate this risk with privacy screens for your laptop or mobile device. This is a screen protector that obscures your screen from anyone not directly facing it and can offer additional protection for your company data.”
8. Turn off USB ports
Lungsden recommended, “The USB ports on your gadget can be deactivated. It only takes seconds for a USB accessory to be connected to your laptop, a program to automatically execute, and your device to be compromised. Moreover, you likely won’t require USB ports while on a trip.
“By deactivating them before setting off on any journey, you can help eliminate a potential hazard.”
9. Activate device lockout and remote wiping features
There’s a heightened probability of a thief seizing your work device when traveling with it, and it might even be unlocked at the time. Therefore, remember to configure its lockout settings.
Lungsden mentioned, “You can set a brief lockout period and also ensure the account locks as the laptop is closed. This lowers the likelihood of your account being accessed.”
He further recommended that remote locking and wiping features can be advantageous in case of theft, as they aid in ensuring data protection. “Numerous device management systems furnish functionalities like these,” Lungsden pointed out.
10. Exercise caution with leased accommodations
Lee cautioned, “When reserving accommodation, double-check that the booking site is authentic and not a replicated site that will pocket your money without providing a valid booking confirmation. Never agree to remit payment for accommodation outside the official booking platform, as you won’t have any recourse for a refund if the booking is deceptive.”
When lodged in leased accommodations, it is crucial not to leave valuables or devices unguarded, even in a locked area. “Room keys may have been cloned or stolen,” cautioned Lee.
Upon concluding the stay, it’s crucial to log out of any devices, such as smart TVs, and refrain from saving any credentials. “Otherwise, subsequent guests could potentially infiltrate your accounts,” Lee added.
