Archives - Travel Tech Tips


Guard your mobile devices

To prevent theft and unauthorized access or loss of sensitive information, never leave your equipment—including any USB or external storage devices—unattended in a public place. Keep your devices secured in taxis, at airports, on airplanes, and in your hotel room. The more we travel, the more we are at risk for cyberattacks.

Stop auto connecting when traveling

Watch out for some mobiles devices that may request and connect to available wireless networks or Bluetooth devices automatically. Instant connection like this may open the way for cybercriminals to remotely access your devices. Many times you can deactivate these settings so that you actively select when to connect to a safe network.

Keep it locked when traveling

Lock your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. Set your devices to lock after a short time and use strong PINs and passwords. In a world where we are constantly connected, cybersecurity […]

Avoid free Internet access

When you find yourself out in the great “wild Wi-Fi West,” avoid free Internet access with no encryption. If you do use an unsecured public access point, practice good Internet hygiene by avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi.

Traveling — back up your information first

When you’re traveling—whether domestic or international—it is always important to practice safe online behavior and take proactive steps to secure Internet-enabled devices. Back up your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory […]

Be cautious before you connect public Wi-Fi hotspots

Like on an airplane or in an airport, hotel, train/bus station or café — be sure to confirm the name of the network and exact login processes with appropriate staff to ensure that the network is legitimate. Cybercriminals can easily create a similarly named network hoping that users will overlook which network is the valid […]