Archives - Travel Tech Tips


Avoid charging your phone at public stations

Public charging stations are becoming more common in airports, train stations and malls. While they may be convenient, they’re also a potential security risk. Hackers can compromise these outlets, so that when you plug into them, they gain access to all of your phone’s data.

Guard your mobile devices

To prevent theft and unauthorized access or loss of sensitive information, never leave your equipment—including any USB or external storage devices—unattended in a public place. Keep your devices secured in taxis, at airports, on airplanes, and in your hotel room. The more we travel, the more we are at risk for cyberattacks.

Stop auto connecting when traveling

Watch out for some mobiles devices that may request and connect to available wireless networks or Bluetooth devices automatically. Instant connection like this may open the way for cybercriminals to remotely access your devices. Many times you can deactivate these settings so that you actively select when to connect to a safe network.

Keep it locked when traveling

Lock your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. Set your devices to lock after a short time and use strong PINs and passwords. In a world where we are constantly connected, cybersecurity […]

Avoid free Internet access

When you find yourself out in the great “wild Wi-Fi West,” avoid free Internet access with no encryption. If you do use an unsecured public access point, practice good Internet hygiene by avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi.

Traveling — back up your information first

When you’re traveling—whether domestic or international—it is always important to practice safe online behavior and take proactive steps to secure Internet-enabled devices. Back up your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory […]