By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Start Your Business Magazine
  • Store
    Merchandise
    Subscribe
  • Features

    Grow, expand and leverage your business..

    Grow your start up business with our experts and industry insiders…

    Get Started

    Quick Links

    • Agenda
    • Business Books
    • Marketing
    • Technology
    • Wellbeing
    • Finance
    Reading: Top travelling cybersecurity risks and how to avoid them

    Our Newsletters

    Our website stores cookies on your computer. They allow us to remember you and help personalise your experience with our site..

    Read our privacy policy for more information.
  • Book
  • Trending
    Technology

    How to make your online presence more sustainable

    With the threat of climate change growing larger each day, individuals and…

    Uncategorized

    Promotional Products That Boost Visibility and Loyalty

    In a world filled with digital noise, tangible, branded merchandise stands out…

    blog

    Scam Report: The Latest Trends in SMS Cyber Attacks

    Brands Most Frequently Imitated  by Scammers Many SMS scams impersonate businesses to…

  • Topics

    Topics

    • Agenda
    • Blogs
    • Book Review
    • Business Advice
    • eCommerce
    • SME Update
    Reading: Top travelling cybersecurity risks and how to avoid them
    • Events
    • Business Experts
    • Featured
    • Franchise
    • Growing Business
    • Health
    Reading: Top travelling cybersecurity risks and how to avoid them
    • Finance
    • Franchise Experts
    • How To
    • Interviews
    • Just for fun
    Reading: Top travelling cybersecurity risks and how to avoid them
    • Lifestyle
    • Making money
    • Manufacturing
    • Marketing
    • Money
    • Property
    Reading: Top travelling cybersecurity risks and how to avoid them
    • Starting Up
    • Taxation
    • Technology
    • Wellbeing
    • Women in Business
    Reading: Top travelling cybersecurity risks and how to avoid them
Reading: Top travelling cybersecurity risks and how to avoid them
Connect
Start Your Business MagazineStart Your Business Magazine
Aa
  • Magazine
  • SEO – Backlinks
  • Book: Start Your Business
Search
  • Agenda
  • Book Review
  • Blogs
  • Finance
  • Growing Business
  • How To
  • Interviews
  • Marketing
  • SME Update
  • Starting Up
  • Technology
  • Wellness
  • Contact
Have an existing account? Sign In
Follow US
  • RSS
  • Terms And Conditions
  • Privacy Policy
  • Contact
  • Licensing
  • SEO
Copyright © 2014-2023 Ruby Theme Ltd. All Rights Reserved.

Top travelling cybersecurity risks and how to avoid them

Start Your Business
Technology
Share
4 Min Read
  1. Unsecured wi-fi networks

One of the most common ways company data is put at risk is through employees connecting to unsecured wi-fi spots whilst travelling.

Public wifi networks are often not encrypted, so any data sent or received is unprotected against unauthorized users. Alongside this, cybercriminals are clued in on the desperation many travellers experience when without wifi, leading to many creating honeypot hotspots where hackers create fake networks to collect company data. 

Cafes, restaurants (25%), airports (23%), and hotels (20%) are the most common locations where personal information is compromised.

Venky Sundar, Founder and President of Indusface, advises on how to protect your company data: “The first port of call for businesses is to create policies that outline the protocols for public wifi usage, with requirements for complete avoidance or VPN usage. 

Ensure employees turn off auto-connect wifi settings too. Alternatively, business-funded mobile networks for hot-spotting will help deter public wifi connections for employees in a pinch.”

  1. Device theft or loss

With 16% of business travellers planning to combine a business trip with a holiday this year, it is paramount to stay vigilant at all times. 80% of travellers have lost, forgotten, or had something stolen from them when they travel, but only 40% ever get their items back.

“Effective ways to limit the risk of loss and theft is to implement clear policies on secure handling of business equipment when travelling and encourage employees to keep tech close at all times in secure luggage and hand luggage rather than checked bags. Companies can also invest in smart luggage and remote device management which allows the quick wiping of devices in the event of a loss.”

  1. Unsecured mobile apps

Business travelers often rely on their mobiles when traveling for convenience and when using personal phones for business they may disregard the security of their apps. This includes messaging services that are not end-to-end encrypted, meaning messages both personal and for business are at risk. 

“Mobile app penetration testing is invaluable here, assessment of the security of mobile applications by simulating attacks helps identify vulnerabilities. Carrying out this testing is key to ensuring sensitive data is not at risk.”

  1. Fake charging stations

Fake charging stations or juice jacking is a form of cyber attack where a device is plugged into a public USB charging port that a criminal has tampered with, once a device is plugged in, data is stolen or malware is installed. This is particularly prevalent in airports, coffee shops, and on public transport, all places business travellers frequent.

“USB data blockers are inexpensive but a great solution to stop the data transfer between the device and the charging port. Investing in software security will help add another layer of defence if desperation hits. Alternatively, business travellers would benefit from a portable charger that can keep their tech going when away from the office.”

  1. Shared or publicly accessible devices

Shared devices are a significant security risk wherever you are but sometimes they are unavoidable especially when travelling. From saved passwords and browsing history to stolen identity and bank details, sharing devices opens up a multitude of risks.

“Typically employees should avoid sharing devices at all times to limit the security risk, where unavoidable ensure to never save passwords, create separate accounts, and avoid using the device for sensitive material.” 

For more information please visit: https://www.indusface.com/.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Start Your Business February 4, 2025
Share this Article
Twitter LinkedIn Reddit Email Copy Link
  • RSS
  • Terms And Conditions
  • Privacy Policy
  • Contact
  • Licensing
  • SEO

Get the latest from us delivered straight to your inbox

Start Your Business Magazine: The Ultimate Business Start Up Guide provides information advice and guidance for entrepreneurs and new business start ups. Get the latest from us delivered directly to your inbox.

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site..

Read our privacy policy for more information.

Copyright 2023 Gambit Interactive Media Limited – All Rights Reserved.

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. Cookies are used for ads personalisation We do this to improve browsing experience as well as show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?