Staying Secure When Travelling For Business

Business travelers are some of the most at-risk victims of cyberattacks, but don't seem to realise it, according to an IBM Security report conducted by Morning Consult

The transportation industry has become the 2nd most attacked industry, and since January 2018, some 566 million records have been either leaked or compromised in the travel industry, the report found.

While the majority of business professionals (70%) engage in high-risk behavior during travel, only 40% said they believed they would be targeted for cybercrimes while on the road, the report found.

"Traveling has always been when people are at their most vulnerable. A few hundred years ago, the perpetrators were pirates or highwaymen. Now those criminals are still out there, but they've changed their methods to focus on digital attacks instead," Caleb Barlow, vice president of X-Force Threat Intelligence at IBM Security, said in a press release. 

"People carry a goldmine of data when traveling including passports, payment information and detailed travel itineraries. When placed in the hands of a cybercriminal, all of this information can be patched together into a complete picture of the traveler's life to inform identity theft, initiate spear phishing attacks, or be sold on the dark web."

More than 70% of Americans surveyed said they have connected to public Wi-Fi, charged their devices using public USB stations, or enabled auto-correct on their devices—all actions that put their information at risk, the report said.

The report outlined the following six ways business travelers can protect themselves against cyberattacks while in transit:

1. Monitor loyalty rewards
Information entered for loyalty programs and rewards are as good as money to cybercriminals, the report said. Users should monitor their accounts for strange activity, use strong passwords, and implement multi-factor authentication.

2. Choose your Wi-Fi with care
Public Wi-Fi networks are easy targets for cyber-criminals to steal personal data such as credit card information. Business travelers should try to avoid public networks, if possible, or consider using a VPN.

3. Bring a backup battery
While free USB power charging stations are convenient, cyber-criminals are able to download data or install malware via those connections. Users should bring their own battery banks to recharge devices while traveling.

4. Turn off unneeded connectivity
If you don't have to use connectivity, then don't, the report said. Connectivity includes Wi-Fi, Bluetooth, and other auto-connecting networks.

5. Shred your tickets
Destroy unnecessary papers like tickets, boarding passes, luggage tags, or hotel receipts that you collect over the course of your trip. Criminals are able to obtain a lot of information from those scraps of paper.

6. Be smart when paying 
Try to avoid using debit cards at stores or restaurants, the report said. If using an ATM, business travelers should select one within a bank branch or at an airport, where ATMs are better protected.

IBM:         TechRepublic

You Might Also Read:

Hacking Your Holiday: Cyber Criminals Target Tourism:


 

 

« Tackling The ‘Splinternet’
Britain Wants More Women In Cyber Security »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

Paladion

Paladion

Paladion is a provider of managed IT security services.

Rhebo

Rhebo

Rhebo Industrial Protector monitors and ensures the continuous, correct, and predictable operation of real-time Industrial Control Systems to prevent outages and reduce downtimes.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

Cyber Security Canada

Cyber Security Canada

Cyber Security Canada is an accredited Certification Body for government-backed Cyber Security Certification Programs, designed specifically for small and medium-sized Canadian businesses.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

aiComply

aiComply

aiComply's AI-driven platform offers automated intelligence for an efficient cybersecurity compliance workflow, eliminating onerous manual and time-consuming paperwork.

OmniSecuritas Technologies

OmniSecuritas Technologies

Omnisecuritas assists businesses in maintaining secure and resilient operations by providing comprehensive, affordable, turnkey cybersecurity products and services to businesses of all sizes.