As you travel using your internet-powered mobile devices, you are often exposed to the following cyber security risks:
Unsecured Wi-Fi networks – prone to being attacked by hackers who can gain access into your devices. If a network does not ask for a password then do not use it.
Publicly-shared computers - often not protected with antivirus software. Your browsing history may be visible to the next user and if you’re using your USB, your files are in danger of being corrupted; try to avoid using them if possible.
Fake hotspots or Bluetooth connections - used by hackers to deceive you into connecting your device to a malicious network. Bluetooth connections may expose your username, password, credit card or bank information.
Always verify that the network that you’re connecting to is legitimate. Once connected, you can look at a URL to find out if your web browsing is secure.
Secure connection - If you’re using an HTTPS website then your information is secure. If the website has an HTTP address, your browsing is not secure and any of the data that you transmit could be intercepted.
Social engineering attacks - Sharing your activities on social media platforms, or location via GPS, can pave the way for unscrupulous individuals to use your information to their advantage. They may track your whereabouts and pretend to represent a service company such as your hotel or car rental company to charge you on your credit card.
Always be aware of what you’re posting on social media. You can also edit the privacy settings of your profiles to ensure that only the people you know can view them.
Before you connect, check! - Is the network legit? To find out, only ask authorised staff. It is advisable that you adjust the settings of your device so that it does not connect automatically to available networks.
Stop clicking away - When using a public Wi-Fi network, limit your online activities to searching for information instead of submitting your personal data on banking or shopping sites.
Update your software - Use the most up-to-date OS, antivirus software, browser, and applications as they come with improved security features.
Use a temporary device - Try leaving personal or work devices behind when you travel. Take a temporary device with you that has little data stored in it to keep security threats to a minimum level.
Secure your devices - It goes without saying but, never lose hold of your gadgets when you’re in public places.
Protection Group International believes that cyber security doesn’t need to be overly complicated, incomprehensible or vastly expensive. We specialise in delivering strategic vulnerability assessment services and offer a range of senior cyber awareness education to enable you to tackle cyber threats in-house. For more information click here.
Our partner company, Protection Vessels International, is focussed on the efficient delivery of high quality, cost effective security solutions for the maritime community. We invest in our well-maintained logistic infrastructure to enhance customers’ business continuity through the protection of their assets and people. For more information click here.
Your free global geopolitical
PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.
The Risk Portal gives users up-to-date information and analysis on global affairs.
The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.
Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.
Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.
Making ongoing compliance easier for you and your business
GDPR is now in force. Make sure your business meets the necessary requirements, providing assurance for all of your customers and employees.
A full audit of your business to assess the level of your compliance against GDPR requirements.
Become GDPR compliant with minimal work. We will conduct an analysis, review, report and implement any necessary changes to your business.
We will conduct simple security assessments to help you understand and mitigate the potential risks to your business.
Get your business ready to face the cyber challenge.
We provide a full range of accredited, certified and bespoke services that assess the resilience of your cyber security posture.
PGI’s Qualified Security Assessors (QSA) will help you meet Payment Card Industry Data Security Standards (PCI DSS).
Find out more on PCI DSS
Demonstrate your commitment to cyber security by achieving and maintaining accreditation for the globally-recognised information security standard.
Find out more on ISO 27001
Understand the threats of phishing and malware to avoid being targeted.
Undertake our phishing vulnerability assessment to reduce your organisation’s risk of attack, by measuring the cyber awareness of your workforce.
PGI will conduct a tailored phishing campaign, using multiple methods, to identify realism and train employees where necessary to mitigate future attacks.
PGI monitor multiple metrics to identify the types of phishing, generate in-depth analytical reports and provide an informed decision to help improve your organisation’s level of security and awareness.
Prevent attacks, respond to breaches and protect your business.
Our bespoke range of cyber security services not only protect your critical assets but provide the education you need to keep your operations and data safe.
Implement this cost-effective cyber security measure launched by the government to prevent cyber-attacks, demonstrate information security commitment to your clients, and attract new business by being recognised as a secure organisation.
Find out more on Cyber Essentials Accreditation
The most effective way to identify how attackers target your organisation’s weaknesses is by evaluating your system, your network security, and reporting on any vulnerabilities that could have an impact on your business.
Find out more on Penetration Testing
If your business has experienced breaches, network compromises or operational disruption, our team of cyber security specialists can deploy quickly, and will begin the process of detecting and eliminating the threat efficiently.
Find out more on Data Breach Response & Recovery
Data Breach Response & Recovery
We prevent attacks, respond to security breaches, and protect your business
Our team of specialists can deploy quickly and efficiently to begin the process of detecting, eliminating and preventing future threats of a breach.
A vital part of the response process is making a copy of your data for safe forensic analysis. We will work with you to preserve and use this evidence to discover the extent of an intrusion.
Find out more on Digital Forensics
We will identify and minimise the risks, as well as the possibility of future risks to your business.
Consistent interaction with your management team and recommendations on how to approach all outcomes that need attention.
Subscribe to our Cyber Bytes Newsletter
Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.