Staying Secure When Travelling For Business

Business travelers are some of the most at-risk victims of cyberattacks, but don't seem to realise it, according to an IBM Security report conducted by Morning Consult

The transportation industry has become the 2nd most attacked industry, and since January 2018, some 566 million records have been either leaked or compromised in the travel industry, the report found.

While the majority of business professionals (70%) engage in high-risk behavior during travel, only 40% said they believed they would be targeted for cybercrimes while on the road, the report found.

"Traveling has always been when people are at their most vulnerable. A few hundred years ago, the perpetrators were pirates or highwaymen. Now those criminals are still out there, but they've changed their methods to focus on digital attacks instead," Caleb Barlow, vice president of X-Force Threat Intelligence at IBM Security, said in a press release. 

"People carry a goldmine of data when traveling including passports, payment information and detailed travel itineraries. When placed in the hands of a cybercriminal, all of this information can be patched together into a complete picture of the traveler's life to inform identity theft, initiate spear phishing attacks, or be sold on the dark web."

More than 70% of Americans surveyed said they have connected to public Wi-Fi, charged their devices using public USB stations, or enabled auto-correct on their devices—all actions that put their information at risk, the report said.

The report outlined the following six ways business travelers can protect themselves against cyberattacks while in transit:

1. Monitor loyalty rewards
Information entered for loyalty programs and rewards are as good as money to cybercriminals, the report said. Users should monitor their accounts for strange activity, use strong passwords, and implement multi-factor authentication.

2. Choose your Wi-Fi with care
Public Wi-Fi networks are easy targets for cyber-criminals to steal personal data such as credit card information. Business travelers should try to avoid public networks, if possible, or consider using a VPN.

3. Bring a backup battery
While free USB power charging stations are convenient, cyber-criminals are able to download data or install malware via those connections. Users should bring their own battery banks to recharge devices while traveling.

4. Turn off unneeded connectivity
If you don't have to use connectivity, then don't, the report said. Connectivity includes Wi-Fi, Bluetooth, and other auto-connecting networks.

5. Shred your tickets
Destroy unnecessary papers like tickets, boarding passes, luggage tags, or hotel receipts that you collect over the course of your trip. Criminals are able to obtain a lot of information from those scraps of paper.

6. Be smart when paying 
Try to avoid using debit cards at stores or restaurants, the report said. If using an ATM, business travelers should select one within a bank branch or at an airport, where ATMs are better protected.

IBM:         TechRepublic

You Might Also Read:

Hacking Your Holiday: Cyber Criminals Target Tourism:


 

 

« Tackling The ‘Splinternet’
Britain Wants More Women In Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

Acutec

Acutec

Acutec is an award winning IT support, services and solutions provider including managed IT Security and backup/disaster recovery.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

Australian Cyber Collaboration Centre (A3C)

Australian Cyber Collaboration Centre (A3C)

A3C assists business to understand and navigate the cyber ecosystem to address their specific cyber needs. It is a central connection point for businesses looking to improve their cyber resilience.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.