{"id":12517,"date":"2018-06-08T08:10:19","date_gmt":"2018-06-08T16:10:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/06\/08\/news-6286\/"},"modified":"2018-06-08T08:10:19","modified_gmt":"2018-06-08T16:10:19","slug":"news-6286","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/06\/08\/news-6286\/","title":{"rendered":"Tips for safe summer travels: your cybersecurity checklist"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 08 Jun 2018 15:00:00 +0000<\/strong><\/p>\n<p>Summer is just around the corner in the Northern Hemisphere, and with it comes vacation plans for many. Those looking to take some time away from work and home are likely making plans to secure their home, have their pets taken care of, and tie up loose ends at work. But how about securing your devices and your data while you&#8217;re away? Here are some things to take into consideration if you want to have a trip free of cyber worries.<\/p>\n<h3>Before you leave<\/h3>\n<p>Some of the things on your cybersecurity checklist can be taken care of before you leave. They include the following:<\/p>\n<ul>\n<li>Make sure the operating systems and software on all the devices you are going to take along with you are up to date. Having to install updates while you are on the road can be a pain due to slow and unstable connections. Use your at-home Wi-Fi, which you know is secured with a password. (Right? If not\u2014do that right away.)<\/li>\n<li>You may want to take precautions to secure devices that you&#8217;ll be leaving behind in your workplace and home. If a burglar gets hold of your desktop, they should not be able to harvest any valuable data. All devices should be password protected (including the ones you are taking along with you).<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24106\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/tips-safe-summer-travels-cybersecurity-checklist\/attachment\/shutterstock_767855560\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_767855560.jpg\" data-orig-size=\"1000,667\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"shutterstock_767855560\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_767855560-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_767855560-600x400.jpg\" class=\"aligncenter size-large wp-image-24106\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_767855560-600x400.jpg\" alt=\"\" width=\"600\" height=\"400\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_767855560-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_767855560-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_767855560.jpg 1000w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/04\/3-2-1-go-make-backups-of-your-data\/\" target=\"_blank\" rel=\"noopener\">Back up<\/a> the valuable data on the devices you are bringing so that if you lose them, it won&#8217;t be a double disaster.<\/li>\n<li>Do not announce the dates of your upcoming travel plans on social media. That&#8217;s a great way to alert criminals to case your house and break in during the time you&#8217;ll be gone.\u00a0Post your travel pics when you get back. They will still be cool.<\/li>\n<li>Disable the auto-connect options shortly before you leave and have your devices forget the network SSIDs in their lists. Threat actors can abuse these features for <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/man-in-the-middle-mitm\/\" target=\"_blank\" rel=\"noopener\">man-in-the-middle attacks<\/a>.<\/li>\n<li>If you have contactless debit and credit cards, get <a href=\"https:\/\/www.amazon.com\/Blocking-Sleeves-Credit-Passport-Protectors\/dp\/B00CMAA9X4\" target=\"_blank\" rel=\"noopener\">shields in which to store them<\/a> so you can carry them around without leaking information.<\/li>\n<li>Think twice about bringing a multitude of devices. The chances of anything getting damaged, stolen, or lost are much higher when you&#8217;re on the road.<\/li>\n<li>Make sure your travel insurance covers all the devices and any other valuables you plan to take along.<\/li>\n<\/ul>\n<h3>While you are traveling<\/h3>\n<p>Travel plans can range from road trips to a nearby camping spot to flights to five-star beach resorts. Because of the wide range of travel options, some of the following advice may or may not apply:<\/p>\n<ul>\n<li>If you park your car at the airport, obviously make sure no valuable devices are left behind. This is also a good time to disable the Bluetooth of your phone, because the car is probably the only useful Bluetooth connection you need. And when Bluetooth is off, it can\u2019t be abused.<\/li>\n<li>Airports and other waypoints on your travels will often offer public, free, and unprotected Wi-Fi. Consider the risks associated with them when you use them, or use a VPN to enhance the security by encrypting your connection.<\/li>\n<li>If you need to use Wi-Fi at your hotel, make sure their connections are secured with passwords. And if you need to access sensitive material for work, set up VPN on your laptop beforehand.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24108\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/tips-safe-summer-travels-cybersecurity-checklist\/attachment\/shutterstock_219454381\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_219454381.jpg\" data-orig-size=\"1000,670\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shutterstock_219454381\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_219454381-300x201.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_219454381-600x402.jpg\" class=\"aligncenter size-large wp-image-24108\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_219454381-600x402.jpg\" alt=\"\" width=\"600\" height=\"402\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_219454381-600x402.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_219454381-300x201.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_219454381.jpg 1000w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<ul>\n<li>Privacy screens make sure that only the person sitting straight in front of the screen can read what is on it. This can stop people from secretly watching what you are doing. Good privacy screens are easy to apply and are available for laptops and many handheld devices.<\/li>\n<li>Don\u2019t use public computers for sensitive Internet traffic. This certainly includes online shopping and any other financial transactions. While you are traveling, it&#8217;s safer to spend money at your destination instead of online.<\/li>\n<li>If you use webmail to read your mail when you are away from home, keep in mind that this may be less secure then reading the mail in your favorite email client. Some webmail services have html enabled by default.<\/li>\n<li>Use a fully updated anti-malware solution for all your devices. <a href=\"https:\/\/www.malwarebytes.com\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> has solutions for many operating systems and types of devices.<\/li>\n<li>Since you may not want to take your laptop and every other device with you as you go sightseeing, make sure there is a safe place to keep the items left behind. Not every hotel safe is big enough for a laptop. Ask your hotel concierge if they have other options for securing devices. Simply leaving them behind in your room is not the safest move.<\/li>\n<\/ul>\n<h3>If you travel abroad<\/h3>\n<p>Some extra attention to detail may be required when you travel abroad.<\/p>\n<ul>\n<li>Make sure you leave your country with the devices fully charged. You may need to use them for a while before you get another chance to re-charge. It may require different cables, power plugs, and adapters to charge your devices at your destination or checkpoints along the way. Come prepared.<\/li>\n<li>Not only the US, but also some other countries will look at your social media accounts to find any information that could make you a less welcome guest. It might be prudent to remove any questionable comments to thwart further investigations.<\/li>\n<li>If traveling into the US from abroad, be prepared that you might be asked to hand over your device and your password to get in. Make sure there is nothing to be found on it that you don\u2019t want to be found.<\/li>\n<\/ul>\n<h3>When you get back<\/h3>\n<p>Back home safe and sound? Don\u2019t rest yet. Check a few more things and then you can start posting online about your relaxing, fun, and incident-free vacation.<\/p>\n<ul>\n<li>Update your anti-malware solution and run manual scans on your devices to check for any uninvited guests you may have picked up on the road.<\/li>\n<li>If you bought devices abroad, check them for compliance and whether they are compromised. In some countries, devices are sold with monitoring software pre-installed.<\/li>\n<li>Check your bank account for any unexpected withdrawals or spending. Warn your bank or credit card provider if you suspect foul play or if you have lost sight of your credit card at some point. it&#8217;s especially important to do this if you suspect your login credentials may have been stolen.<\/li>\n<li>As an extra precaution, you may want to change the passwords that you used during your time away. If someone managed to get ahold of one during your trip, you&#8217;ll stop them from doing any damage with a changed password.<\/li>\n<\/ul>\n<h3>Don\u2019t let all this ruin the fun<\/h3>\n<p>While most of the things mentioned above are precautions we (should) take every day, they are not the first ones that come to mind when you are planning that awesome trip you have worked for all year. But as always, it\u2019s better to be safe than sorry.<\/p>\n<p>Recommended reading: <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/07\/7-tips-to-stay-cyber-safe-this-summer\/\" target=\"_blank\" rel=\"noopener\">7 tips to stay cyber safe this summer<\/a><\/p>\n<p>Safe travels!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/tips-safe-summer-travels-cybersecurity-checklist\/\">Tips for safe summer travels: your cybersecurity checklist<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/tips-safe-summer-travels-cybersecurity-checklist\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 08 Jun 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/tips-safe-summer-travels-cybersecurity-checklist\/' title='Tips for safe summer travels: your cybersecurity checklist'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_271982654.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A cybersecurity checklist for when you are about to travel or go on vacation, helps to prevent data-loss and other security issues.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/privacy-security-world\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/backup\/\" rel=\"tag\">backup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity-checklist\/\" rel=\"tag\">cybersecurity checklist<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-loss\/\" rel=\"tag\">data-loss<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/devices\/\" rel=\"tag\">devices<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iot\/\" rel=\"tag\">IoT<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/tips-safe-summer-travels-cybersecurity-checklist\/' title='Tips for safe summer travels: your cybersecurity checklist'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/tips-safe-summer-travels-cybersecurity-checklist\/\">Tips for safe summer travels: your cybersecurity checklist<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11169,18676,18362,6275,10495,5897,10497],"class_list":["post-12517","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-backup","tag-cybersecurity-checklist","tag-data-loss","tag-devices","tag-iot","tag-privacy","tag-security-world"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12517"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12517\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12517"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}