DHS: Cybersecurity Tips While Traveling

Before You Go

  • Update the antivirus and anti-malware software installed in your devices to the latest version. Patch all your security software, web browser, and operating systems regularly and frequently. Even better, sign up for automatic updates if there is an option.
  • Back up your information including your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory settings.
  • Keep your devices locked when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. In addition, please use strong PINs and passwords for unlocking your devices.
  • Add Multi-Factor Authentication / Two-Factor Authentication (MFA/2FA), an authenticator app or a secure token, as the extra security login protection. Not only for the access to your devices, but also for your accounts including email, banking, and social media, and any other service that requires logging in.

During Your Trip

  • Stop auto-connecting as some devices will automatically seek and connect to available wireless networks or Bluetooth devices. This instant connection opens the door for cybercriminals to remotely access your devices. Disable these features so that you actively choose when to connect to a safe network.
  • Confirm the name of the network and exact login procedures with appropriate staff to ensure that the network is legitimate before you connect to any public wireless hotspot at an airport, hotel, or café. Never use public Wi-Fi to involve any sensitive activities such as banking.
  • DO NOT respond and do not click on any links or attachments found in the email looks “phishy” or the emails sent from strangers or someone you are unsure about their authenticity. Try using the “junk” or “block” option to no longer receive messages from a particular sender.
  • Be careful about what you are posting on social media, such as your personal identity information (PII), location, and daily routine. Because your full name, birthday, or your vacation plans can help criminals to target you, your loved ones, and your physical belongings.
  • Never leave your equipment, including any USB or external storage devices, unattended in a public place in order to prevent theft and unauthorized access or loss of sensitive information. Keep your devices secured in public areas such as taxis, at airports, on airplanes, and in your hotel room.

If the employees in your organization need to travel a lot, the data protection needs should be taken care of specifically. LIFARS’ Tabletop Exercises are individually tailored to meet the specific data protection needs of each client. LIFARS experts identify and interview essential personnel to understand your company’s distinct capabilities and existing contingency plans, then use this information to formulate a custom data-breach scenario based on our real-world experience. Your team will recognize the nature and extent of the data breach, conduct triage to understand the impact to your organization and data, make collaborative decisions about containing the evolving threat, and identify the notifications necessary to satisfy pertinent regulations. A detailed report documenting the event explains our findings and highlights improvements to your cybersecurity and incident response readiness. Typical Tabletop Exercise scenarios include:

  • GDPR Data Breach
  • Business Email Compromise
  • Ransomware Containment
  • Insider Threat
  • SaaS Provider Data Breach
  • Social Media Compromise



Contact LIFARS Immediately For

Your Customized Tabletop Exercises