Staying Secure When Travelling For Business

Business travelers are some of the most at-risk victims of cyberattacks, but don't seem to realise it, according to an IBM Security report conducted by Morning Consult

The transportation industry has become the 2nd most attacked industry, and since January 2018, some 566 million records have been either leaked or compromised in the travel industry, the report found.

While the majority of business professionals (70%) engage in high-risk behavior during travel, only 40% said they believed they would be targeted for cybercrimes while on the road, the report found.

"Traveling has always been when people are at their most vulnerable. A few hundred years ago, the perpetrators were pirates or highwaymen. Now those criminals are still out there, but they've changed their methods to focus on digital attacks instead," Caleb Barlow, vice president of X-Force Threat Intelligence at IBM Security, said in a press release. 

"People carry a goldmine of data when traveling including passports, payment information and detailed travel itineraries. When placed in the hands of a cybercriminal, all of this information can be patched together into a complete picture of the traveler's life to inform identity theft, initiate spear phishing attacks, or be sold on the dark web."

More than 70% of Americans surveyed said they have connected to public Wi-Fi, charged their devices using public USB stations, or enabled auto-correct on their devices—all actions that put their information at risk, the report said.

The report outlined the following six ways business travelers can protect themselves against cyberattacks while in transit:

1. Monitor loyalty rewards
Information entered for loyalty programs and rewards are as good as money to cybercriminals, the report said. Users should monitor their accounts for strange activity, use strong passwords, and implement multi-factor authentication.

2. Choose your Wi-Fi with care
Public Wi-Fi networks are easy targets for cyber-criminals to steal personal data such as credit card information. Business travelers should try to avoid public networks, if possible, or consider using a VPN.

3. Bring a backup battery
While free USB power charging stations are convenient, cyber-criminals are able to download data or install malware via those connections. Users should bring their own battery banks to recharge devices while traveling.

4. Turn off unneeded connectivity
If you don't have to use connectivity, then don't, the report said. Connectivity includes Wi-Fi, Bluetooth, and other auto-connecting networks.

5. Shred your tickets
Destroy unnecessary papers like tickets, boarding passes, luggage tags, or hotel receipts that you collect over the course of your trip. Criminals are able to obtain a lot of information from those scraps of paper.

6. Be smart when paying 
Try to avoid using debit cards at stores or restaurants, the report said. If using an ATM, business travelers should select one within a bank branch or at an airport, where ATMs are better protected.

IBM:         TechRepublic

You Might Also Read:

Hacking Your Holiday: Cyber Criminals Target Tourism:


 

 

« Tackling The ‘Splinternet’
Britain Wants More Women In Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

SkyePoint Decisions

SkyePoint Decisions

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider.

ImpactQA

ImpactQA

ImpactQA is a global leading software testing & QA consulting company. Ten years of excellence. Delivering unmatched services & digital transformation to SMEs & Fortune 500 companies.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Northdoor

Northdoor

Northdoor provides a comprehensive set of services around information security and works with leading global technology vendors to deploy and manage cyber security solutions.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.