Archives - Travel Safety


Limit the details you share in automatic email replies on Gmail

If you’re headed on vacation, it’s a good idea to set up automatic replies from your email. In Gmail, go to Settings and scroll down to “Vacation responder” under the General tab. You can include some amount of information, like when you’ll respond to emails, but keep it to a minimum. Remember, while you might […]

Ditch public USB charging and pack your own supply instead

When you plug your cellphone into public USB charging ports, you could be exposing your device to malware planted there by malicious actors. When you’re traveling, plan ahead and charge a couple of your own secure power banks so you won’t be tempted to tap into potentially hazardous public ports.

When traveling never leave devices unattended

It is important to remember that laptops, phones and tablets should never be left unattended. Ensure your devices are with you at all times. If you are staying in a hotel, the best thing to do is lock them in a safe. If a safe is not available, lock them in your luggage. And, while […]

Don’t post your vacation plans

Limit the information you post on social media—from personal addresses to where going to get lunch. What many people don’t realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account numbers, […]

When traveling stop auto connecting

Some devices will automatically seek and connect to available wireless networks or Bluetooth devices. This instant connection opens the door for cyber criminals to remotely access your devices. Disable these features so that you actively choose when to connect to a safe network.

Traveling—stay protected when connected

Before you connect to any public wireless hotspot—such as at an airport, hotel, or café—be sure to confirm the name of the network and exact login procedures with appropriate staff to ensure that the network is legitimate. If you do use an unsecured public access point, practice good Internet hygiene by avoiding sensitive activities (e.g., […]