Top Tips for Cyber Safe Travel

19 Dec 2016

Top Tips for Cyber Safe Travel

Top Tips for Cyber Safe Travel 

As you travel using your internet-powered mobile devices, you are often exposed to the following cyber security risks:

Unsecured Wi-Fi networks – prone to being attacked by hackers who can gain access into your devices. If a network does not ask for a password then do not use it.  

Publicly-shared computers - often not protected with antivirus software. Your browsing history may be visible to the next user and if you’re using your USB, your files are in danger of being corrupted.

Try to avoid using them if possible.

Fake hotspots or Bluetooth connections - used by hackers to deceive you into connecting your device to a malicious network.

Bluetooth connections may expose your username, password, credit card or bank information.

Always verify that the network that you’re connecting to is legitimate.

Once connected, you can look at a URL to find out if your web browsing is secure.

If you're using an HTTPS website then your information is secure. If the website has an HTTP address, your browsing is not secure and any of the data that you transmit could be intercepted.

Social engineering attacks - Sharing your activities on social media platforms, or location via GPS, can pave the way for unscrupulous individuals to use your information to their advantage.

They may track your whereabouts and pretend to represent a service company such as your hotel or car rental company to charge you on your credit card.

Always be aware of what you’re posting on social media. You can also edit the privacy settings of your profiles to ensure that only the people you know can view them.

Before you connect, check! - Is the network legit? To find out, only ask authorised staff.

It is advisable that you adjust the settings of your device so that it does not connect automatically to available networks.

Stop clicking away - When using a public Wi-Fi network, limit your online activities to searching for information instead of submitting your personal data on banking or shopping sites.

Update your software - Use the most up-to-date OS, antivirus software, browser, and applications as they come with improved security features.

Use a temporary device - Try leaving personal or work devices behind when you travel.

Take  a temporary device with you that has little data stored in it to keep security threats to a minimum level.

Secure your devices - It goes without saying but, never lose hold of your gadgets when you’re in public places.

For more cyber security advice contact the experts on +44 (0) 207 887 2699

For the latest PGI updates like our pages on LinkedIn – PGIPGI Cyber and Facebook – PGIPGI Cyber

Share this article


Your free global geopolitical
risk dashboard

PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.

The Risk Portal gives users up-to-date information and analysis on global affairs.

The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.

Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.

Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.

Visit the Risk Portal

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.

Get in touch today

For more information on how we can help you or your business, please contact us via:

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP