{"id":3716,"date":"2021-10-08T11:26:49","date_gmt":"2021-10-08T16:26:49","guid":{"rendered":"https:\/\/cmitsolutions.com\/richardson\/?p=3716"},"modified":"2023-02-20T14:44:54","modified_gmt":"2023-02-20T20:44:54","slug":"cybersecurity-tips-for-traveling","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/blog\/cybersecurity-tips-for-traveling\/","title":{"rendered":"Cybersecurity Tips for Traveling"},"content":{"rendered":"<p>Whether your small business has employees on a trip for business or for pleasure, unfortunately traveling is going to make them (and by association, your business) more vulnerable to cyber-attacks. Anyone carrying sensitive information with them on their devices, including smartphones and laptops, could be a target.<\/p>\n<p>Make sure you and your company are putting in the greatest effort to increase your protection and ensure your business\u2019 security with these cybersecurity tips for traveling.<\/p>\n<h2>Be Cautious About Public Wi-Fi<\/h2>\n<p>When traveling, be wary about using public Wi-Fi networks in places like hotels, coffee shops, or other places where multiple people work on their laptops. If possible, encourage your team to avoid it altogether, especially if traveling in a foreign country, since cybersecurity laws and regulations may not be the same.<\/p>\n<p>Free Wi-Fi can be vulnerable to cyber threats, so avoid unencrypted networks that might compromise your data. If you or your team have to use public Wi-Fi, avoid accessing sensitive company information or logging into tools that allow access to your company\u2019s data, and be sure to ask your hotel about its security protocol.<\/p>\n<h2>Install and Update Anti-Virus Software<\/h2>\n<p>This is something you should be doing anyway, but if you\u2019re traveling with devices that connect you with <a href=\"https:\/\/cmitsolutions.com\/richardson\/?p=3675\">sensitive information or PII<\/a>, ensure that you\u2019re also running anti-virus software and that it\u2019s regularly updated and from a company you trust.<\/p>\n<p>With employees working remotely, at a different office, or during vacation, making sure that your company is doing all it can to protect PII is crucial, including cloud backups, requiring multi-layer security, and regular software updates.<\/p>\n<h2>Update Your Passwords<\/h2>\n<p>If you\u2019re going to be accessing personal or company information from your phone or computer while traveling, change the passwords that you regularly use, and make sure your computer and phone can\u2019t be accessed without your unique pin, password, or fingerprint.<\/p>\n<p>Avoid weak or predictable passwords by creating a password of 12 characters or longer that includes a mix of numbers, letters, and special characters. The 2020 Verizon Data Breach Investigation Report revealed that <a href=\"https:\/\/www.secplicity.org\/2021\/05\/04\/2021-world-password-day-how-many-will-be-stolen-this-year\/\">81% of security breaches<\/a> are because of weak passwords.<\/p>\n<h2>Disconnect Automatic WiFi and Bluetooth Connection<\/h2>\n<p>Many electronic devices such as phones and laptops have auto-connect settings enabled, which searches for nearby free Wi-Fi networks or Bluetooth networks and connects them with your device instantly. When traveling to ensure the highest defense against cyberthreats, disable these settings so nearby assailants can\u2019t easily hack your device. Make sure you have to manually approve and connect to each Wi-Fi network or Bluetooth network in order to keep your information secure.<\/p>\n<h2>Install a Privacy Screen<\/h2>\n<p>Consider requiring your employees to install a <a href=\"https:\/\/www.hp.com\/us-en\/shop\/tech-takes\/why-do-i-need-computer-privacy-screen\">privacy screen<\/a> to their laptop or phone in order to place another obstacle between them and individuals who could be \u201cspying.\u201d<\/p>\n<p>Device privacy screens, sometimes referred to as privacy filters, are thin pieces of material that adhere to your screen to restrict its viewing angle. These tiny polarized \u201cblinds\u201d will make it so that only the person directly in front of the device can view what\u2019s on the screen, and protect your information from visual hacking.<\/p>\n<h2>Backup Your Information<\/h2>\n<p>As always, prioritize backing up your important information so that in case anything happens, you won\u2019t lose it all. Using <a href=\"https:\/\/cmitsolutions.com\/richardson\/hosting-and-cloud\/\">a cloud service<\/a> is a great way to safely and securely back up information without the risk of losing or compromising a physical device.<\/p>\n<h2>Prevent Physical Theft<\/h2>\n<p>In addition to virtually protecting your information, you should also make sure that your devices are protected from physical theft and compromise as well. Travelers are often looked at as prime targets when it comes to theft. Never leave your devices unattended. When you don\u2019t have your laptop on you, make sure it\u2019s secured in your hotel safe.<\/p>\n<h2>Connect with CMIT Solutions<\/h2>\n<p>If you need assistance with <a href=\"https:\/\/cmitsolutions.com\/richardson\/services\/cybersecurity\/\">boosting your cybersecurity<\/a>, <a href=\"https:\/\/cmitsolutions.com\/richardson\/\">CMIT Solutions of Richardson<\/a> has your back. We provide 24\/7 security monitoring of your systems, including anti-malware and anti-virus protection, and can also assist you in backing up your sensitive data via <a href=\"https:\/\/cmitsolutions.com\/richardson\/?page_id=762\">backup services<\/a> like <a href=\"https:\/\/cmitsolutions.com\/richardson\/?page_id=130\">cloud hosting<\/a>. <a href=\"https:\/\/cmitsolutions.com\/richardson\/contact-us\/\">Contact us today<\/a> and let\u2019s get started.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether your small business has employees on a trip for business or&#8230;<\/p>\n","protected":false},"author":128,"featured_media":4097,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-3716","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-richardson-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/wp-json\/wp\/v2\/posts\/3716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/wp-json\/wp\/v2\/users\/128"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/wp-json\/wp\/v2\/comments?post=3716"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/wp-json\/wp\/v2\/posts\/3716\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/wp-json\/wp\/v2\/media\/4097"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/wp-json\/wp\/v2\/media?parent=3716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/wp-json\/wp\/v2\/categories?post=3716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/richardson-tx-1049\/wp-json\/wp\/v2\/tags?post=3716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}