Staying Secure When Travelling For Business

Business travelers are some of the most at-risk victims of cyberattacks, but don't seem to realise it, according to an IBM Security report conducted by Morning Consult

The transportation industry has become the 2nd most attacked industry, and since January 2018, some 566 million records have been either leaked or compromised in the travel industry, the report found.

While the majority of business professionals (70%) engage in high-risk behavior during travel, only 40% said they believed they would be targeted for cybercrimes while on the road, the report found.

"Traveling has always been when people are at their most vulnerable. A few hundred years ago, the perpetrators were pirates or highwaymen. Now those criminals are still out there, but they've changed their methods to focus on digital attacks instead," Caleb Barlow, vice president of X-Force Threat Intelligence at IBM Security, said in a press release. 

"People carry a goldmine of data when traveling including passports, payment information and detailed travel itineraries. When placed in the hands of a cybercriminal, all of this information can be patched together into a complete picture of the traveler's life to inform identity theft, initiate spear phishing attacks, or be sold on the dark web."

More than 70% of Americans surveyed said they have connected to public Wi-Fi, charged their devices using public USB stations, or enabled auto-correct on their devices—all actions that put their information at risk, the report said.

The report outlined the following six ways business travelers can protect themselves against cyberattacks while in transit:

1. Monitor loyalty rewards
Information entered for loyalty programs and rewards are as good as money to cybercriminals, the report said. Users should monitor their accounts for strange activity, use strong passwords, and implement multi-factor authentication.

2. Choose your Wi-Fi with care
Public Wi-Fi networks are easy targets for cyber-criminals to steal personal data such as credit card information. Business travelers should try to avoid public networks, if possible, or consider using a VPN.

3. Bring a backup battery
While free USB power charging stations are convenient, cyber-criminals are able to download data or install malware via those connections. Users should bring their own battery banks to recharge devices while traveling.

4. Turn off unneeded connectivity
If you don't have to use connectivity, then don't, the report said. Connectivity includes Wi-Fi, Bluetooth, and other auto-connecting networks.

5. Shred your tickets
Destroy unnecessary papers like tickets, boarding passes, luggage tags, or hotel receipts that you collect over the course of your trip. Criminals are able to obtain a lot of information from those scraps of paper.

6. Be smart when paying 
Try to avoid using debit cards at stores or restaurants, the report said. If using an ATM, business travelers should select one within a bank branch or at an airport, where ATMs are better protected.

IBM:         TechRepublic

You Might Also Read:

Hacking Your Holiday: Cyber Criminals Target Tourism:


 

 

« Tackling The ‘Splinternet’
Britain Wants More Women In Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

CloudDNA

CloudDNA

CloudDNA deliver solutions that enable users and devices to connect over high performance, secure, efficient, scalable cloud networks.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

PRESENSE Technologies

PRESENSE Technologies

PRESENSE Technologies specializes in monitoring and enforcing IT security policies at critical points in the network and on end systems.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startups Association is an umbrella organization that aims to promote, support and represent the interests of tech startups in Romania.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

Robust Intelligence

Robust Intelligence

Robust Intelligence enables enterprises to secure their AI transformation with an automated solution to protect against security and safety threats.

Enaviya Information Technologies

Enaviya Information Technologies

Enaviya offer a comprehensive set of manual and automated software testing services adhering to standard quality assurance for best practices and processes.