Staying Secure When Travelling For Business

Business travelers are some of the most at-risk victims of cyberattacks, but don't seem to realise it, according to an IBM Security report conducted by Morning Consult

The transportation industry has become the 2nd most attacked industry, and since January 2018, some 566 million records have been either leaked or compromised in the travel industry, the report found.

While the majority of business professionals (70%) engage in high-risk behavior during travel, only 40% said they believed they would be targeted for cybercrimes while on the road, the report found.

"Traveling has always been when people are at their most vulnerable. A few hundred years ago, the perpetrators were pirates or highwaymen. Now those criminals are still out there, but they've changed their methods to focus on digital attacks instead," Caleb Barlow, vice president of X-Force Threat Intelligence at IBM Security, said in a press release. 

"People carry a goldmine of data when traveling including passports, payment information and detailed travel itineraries. When placed in the hands of a cybercriminal, all of this information can be patched together into a complete picture of the traveler's life to inform identity theft, initiate spear phishing attacks, or be sold on the dark web."

More than 70% of Americans surveyed said they have connected to public Wi-Fi, charged their devices using public USB stations, or enabled auto-correct on their devices—all actions that put their information at risk, the report said.

The report outlined the following six ways business travelers can protect themselves against cyberattacks while in transit:

1. Monitor loyalty rewards
Information entered for loyalty programs and rewards are as good as money to cybercriminals, the report said. Users should monitor their accounts for strange activity, use strong passwords, and implement multi-factor authentication.

2. Choose your Wi-Fi with care
Public Wi-Fi networks are easy targets for cyber-criminals to steal personal data such as credit card information. Business travelers should try to avoid public networks, if possible, or consider using a VPN.

3. Bring a backup battery
While free USB power charging stations are convenient, cyber-criminals are able to download data or install malware via those connections. Users should bring their own battery banks to recharge devices while traveling.

4. Turn off unneeded connectivity
If you don't have to use connectivity, then don't, the report said. Connectivity includes Wi-Fi, Bluetooth, and other auto-connecting networks.

5. Shred your tickets
Destroy unnecessary papers like tickets, boarding passes, luggage tags, or hotel receipts that you collect over the course of your trip. Criminals are able to obtain a lot of information from those scraps of paper.

6. Be smart when paying 
Try to avoid using debit cards at stores or restaurants, the report said. If using an ATM, business travelers should select one within a bank branch or at an airport, where ATMs are better protected.

IBM:         TechRepublic

You Might Also Read:

Hacking Your Holiday: Cyber Criminals Target Tourism:


 

 

« Tackling The ‘Splinternet’
Britain Wants More Women In Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

GreatHorn

GreatHorn

GreatHorn offers the only cloud-native security platform that stops targeted social engineering and phishing attacks on communication tools like O365, G Suite, and Slack.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company.

DOS

DOS

DOS is an Ecuadorian company with 3 decades of presence in the market and extensive experience in the planning, management and execution of IT Service Integration Projects.

Nameshield Group

Nameshield Group

Nameshield is one of most experienced domain name registrars, trademark protection specialists and managers of online reputational risk in the world today.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.

iomart Group

iomart Group

iomart is a cloud computing and IT managed services business providing secure hybrid cloud, network connectivity, data management, and digital workplace capability.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.