Cyber Security Guidelines While Traveling

Cyber Security Guidelines While Traveling

Purpose

The purpose of this document is intended to complement cyber security while travelling. It looks to provide cyber security information to increase awareness of cyber-based threats that one might face while travelling. This document also provides mitigation advice which may reduce the risk associated with these threats.

Background

More and more peoples are travelling and carrying their electronic gadgets, like phones, tablets and laptops, with them. Today everyone have become increasingly reliant on timely access to digital information, even while travelling. Remote access is generally facilitated through the use of portable electronic devices which can offer the traveler both communication services and access to information, even when this information is stored on internal corporate information technology infrastructure. Work-related international as well as national travel has always posed its own unique set of risks and rewards. Organizations must continue to evolve policies, guidelines and procedures in order to ensure that laptops, cell phones and other communications equipment are appropriately safe while traveling. Following are some guidelines for travelers to improve their cyber security awareness

Before travel

If you are traveling with equipment such as phones, tablets and laptops following are some guidelines you must be follow before traveling : –

  • Check for encryption import restrictions (e.g., China, Israel, and Russia) and US export control laws, if allowed, encrypt all information on all devices
  • Image the device and backup your data
  • Ensure antivirus, security patches, and firewall are enabled and up to date
  • Remove all sensitive data and any information that is not needed
  • Limit and restrict administrative privileges.
  • Verify that mobile devices are not able to access the Internet at the same time that the user is accessing the organization’s internal network.
  • Ensure proper security settings are implemented for Virtual Private Network (VPN) access (if applicable).
  • Make sure that your all devices are password protected
  • Avoid to carry unnecessary devices
  • Keep Backup of your data.
  • Verify your hardware, software warranty and repair information.

During travel

Following are some guidelines you must be follow during travel in order to keep data safe and secure: –

  • Maintain physical control of the device at all times.
  • Avoid connecting to public Internet access point and open wireless access point.
  • Avoid connecting untrusted or unknown digital devices such as USB keys, media cards and USB chargers to your own devices.
  • Be aware of your surroundings for people who might be able to view your screen/keyboard especially in public areas.
  • After every use empty your “trash” and “recent” folders.
  • Be careful when browsing the web for personal use.
  • Be cautious clicking on pop-ups.
  • Don’t use shared computers to login to accounts.
  • Use secure VPN to access resources and approved cloud services
  • Use a non-privileged account and keep track of credentials used so you can change them later

After Traveling

Following are some guidelines you must follow after your trip in order to keep your data safe: –

  • Reset all credentials including remote and local accesses and other accounts once you abort your trip.
  • Avoid immediately connecting to personal or business networks
  • Scan the devices for the presence of malicious software before connecting to the corporate network.
  • Test removable memory devices such as CD-ROMs, DVDs and USB sticks that were received during travel before plugging them into the corporate network.
  • Handle and report suspected incidents in line with organizational procedures and policies.

Leave a Reply