SlideShare a Scribd company logo
1 of 2
Download to read offline
www.titanfile.com
+ 1 855 315-6012 | sales@titanfile.com Copyright © 2013 TitanFile
Protecting your data
while travelling
With all of these devices and documents on the move, there are increased risks of security breaches.
If you’re crossing international boundaries, your electronic devices may be searched and subsequently
copied by border guards. Aside from the potential for a border search, unsecured networks, easy
to lose USB memory sticks and theft all add up to potential data loss while traveling.
Regardless of what industry you are in, you probably frequently find
yourself travelling – often with a lot of confidential client data in tow.
1. Remove sensitive data from your devices
Before you depart on your next business trip consider what’s stored on your computer. Do you
need those privileged client files? Remove anything that isn’t entirely necessary for this trip,
saving it to an encrypted external device, or a secure cloud application. Consult with your IT
department; they may have computers that are to be used specifically for business travel.
2. Seek out SSL protection
SSL (Secure Socket Layer) encrypts your information before it is sent over the Internet. This
prevents hackers and malicious parties from eavesdropping on your communication. Most
professional services, including Google Apps, LinkedIn and Exchange Servers, have SSL sites
you can access by using https:// instead of http:// when typing in the site’s URL.
3. Connect to your own hotspot whenever possible
Hackers can use busy spots such as airports or coffee shops to set-up monitored or fake
wireless (WiFi) networks, filtering content for passwords and other sensitive data. Avoid these
traps by using a personal hotspot. Most cell phone providers offer 3G and LTE USB modems
that allow secure connections to the Internet over a cellular network.
4. Store confidential information in a secure cloud
Worried about someone accessing documents on your stolen or confiscated device? Storing
files in the cloud provides you with an alternative that not only protects your information, but
also negates the need to have files stored on your computer. Cloud computing is also beneficial
for travellers, giving you the freedom to access your data regardless of location.
Take these 10 steps to protect your confidential information on your next trip:
www.titanfile.com
+ 1 855 315-6012 | sales@titanfile.com Copyright © 2013 TitanFile
Protecting your data
while travelling
5. If you must use a storage device, choose an external hard drive
If, due to organizational regulations or poor Internet connectivity, storing your data in the cloud
is not an option, consider external hard drives. As they are generally larger than USB keys,
they’re not as easy to misplace. If choosing this option, it’s important that all files stored on the
drive are encrypted – adding an extra layer of security in case of loss or theft.
6. Avoid public computers
Many airports and libraries have computers available for public use. Never use these comput-
ers to check your email or access confidential information. If you have no other option, always
check for the presence of keyloggers – small, cheap devices that log everything you type.
9. Invest in a privacy screen
The majority of modern laptops pride themselves on having a wide viewing angle. While this is
a great feature if you’re watching a movie with a friend, it’s not as impressive when you’re
reviewing confidential financial reports. Protect yourself while flying or sitting in close quarters
with a privacy screen. Privacy screens are cheap and accommodate all sizes of Macs and PCs.
7. Use a device tracking system
With their many devices; travelers are often targets for thieves. Oftentimes when a device goes
missing, it’s not the loss of the hardware that’s the issue – it’s the loss of its contents. Immedi-
ately download tracking software on your device. Many solutions allow you to track the location
of your hardware, remotely pull and delete files and take screenshots and camera images to
monitor anyone using the device.
10. Keep your laptop inconspicuous
Storing your laptop in your checked baggage or using any other method for concealment could
spell disaster. Overly guarded or hidden laptops attract the attention of border guards who
could become suspicious of your secrecy, as well as thieves who immediately place a higher
value on protected items.
8. Avoid using local storage for email
If you use Microsoft Outlook, Mozilla Thunderbird or one of the other desktop based email
clients, chances are that the viewed email messages will be stored locally. It is better practice to
opt-in for web-based access to email, including Gmail via Google Apps, or WebMail for Micro-
soft Outlook. If you have to store your email messages locally due to corporate policies or low
Internet connectivity, always encrypt your email database file.

More Related Content

Recently uploaded

Sample sample sample sample sample sample
Sample sample sample sample sample sampleSample sample sample sample sample sample
Sample sample sample sample sample sample
Casey Keith
 
Sample sample sample sample sample sample
Sample sample sample sample sample sampleSample sample sample sample sample sample
Sample sample sample sample sample sample
Casey Keith
 

Recently uploaded (20)

Udhampur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Udhampur Call Girls 🥰 8617370543 Service Offer VIP Hot ModelUdhampur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Udhampur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Paschim Medinipur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Paschim Medinipur Call Girls 🥰 8617370543 Service Offer VIP Hot ModelPaschim Medinipur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Paschim Medinipur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Siliguri Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Siliguri Call Girls 🥰 8617370543 Service Offer VIP Hot ModelSiliguri Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Siliguri Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Purba Bardhaman Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Purba Bardhaman Call Girls 🥰 8617370543 Service Offer VIP Hot ModelPurba Bardhaman Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Purba Bardhaman Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Top travel agency in panchkula - Best travel agents in panchkula
Top  travel agency in panchkula - Best travel agents in panchkulaTop  travel agency in panchkula - Best travel agents in panchkula
Top travel agency in panchkula - Best travel agents in panchkula
 
Roorkee Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Roorkee Call Girls 🥰 8617370543 Service Offer VIP Hot ModelRoorkee Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Roorkee Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Sample sample sample sample sample sample
Sample sample sample sample sample sampleSample sample sample sample sample sample
Sample sample sample sample sample sample
 
TOURISM ATTRACTION IN LESOTHO 2024.pptx.
TOURISM ATTRACTION IN LESOTHO 2024.pptx.TOURISM ATTRACTION IN LESOTHO 2024.pptx.
TOURISM ATTRACTION IN LESOTHO 2024.pptx.
 
Alipurduar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Alipurduar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelAlipurduar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Alipurduar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
abortion pills in Riyadh+966572737505 Cytotec Riyadh
abortion pills in  Riyadh+966572737505    Cytotec Riyadhabortion pills in  Riyadh+966572737505    Cytotec Riyadh
abortion pills in Riyadh+966572737505 Cytotec Riyadh
 
Dimapur‎ Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Dimapur‎ Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDimapur‎ Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Dimapur‎ Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Elevate Your Busy Season Email Marketing, Holly May Webinar.pptx
Elevate Your Busy Season Email Marketing, Holly May Webinar.pptxElevate Your Busy Season Email Marketing, Holly May Webinar.pptx
Elevate Your Busy Season Email Marketing, Holly May Webinar.pptx
 
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
 
Birbhum Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Birbhum Call Girls 🥰 8617370543 Service Offer VIP Hot ModelBirbhum Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Birbhum Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Krishnanagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Krishnanagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelKrishnanagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Krishnanagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Tehri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Tehri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot ModelTehri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Tehri Garhwal Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Kashipur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Kashipur Call Girls 🥰 8617370543 Service Offer VIP Hot ModelKashipur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Kashipur Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Daman Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Daman Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDaman Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Daman Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Ramnagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Ramnagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelRamnagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Ramnagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Sample sample sample sample sample sample
Sample sample sample sample sample sampleSample sample sample sample sample sample
Sample sample sample sample sample sample
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Checklist: Protecting Your Data While Travelling

  • 1. www.titanfile.com + 1 855 315-6012 | sales@titanfile.com Copyright © 2013 TitanFile Protecting your data while travelling With all of these devices and documents on the move, there are increased risks of security breaches. If you’re crossing international boundaries, your electronic devices may be searched and subsequently copied by border guards. Aside from the potential for a border search, unsecured networks, easy to lose USB memory sticks and theft all add up to potential data loss while traveling. Regardless of what industry you are in, you probably frequently find yourself travelling – often with a lot of confidential client data in tow. 1. Remove sensitive data from your devices Before you depart on your next business trip consider what’s stored on your computer. Do you need those privileged client files? Remove anything that isn’t entirely necessary for this trip, saving it to an encrypted external device, or a secure cloud application. Consult with your IT department; they may have computers that are to be used specifically for business travel. 2. Seek out SSL protection SSL (Secure Socket Layer) encrypts your information before it is sent over the Internet. This prevents hackers and malicious parties from eavesdropping on your communication. Most professional services, including Google Apps, LinkedIn and Exchange Servers, have SSL sites you can access by using https:// instead of http:// when typing in the site’s URL. 3. Connect to your own hotspot whenever possible Hackers can use busy spots such as airports or coffee shops to set-up monitored or fake wireless (WiFi) networks, filtering content for passwords and other sensitive data. Avoid these traps by using a personal hotspot. Most cell phone providers offer 3G and LTE USB modems that allow secure connections to the Internet over a cellular network. 4. Store confidential information in a secure cloud Worried about someone accessing documents on your stolen or confiscated device? Storing files in the cloud provides you with an alternative that not only protects your information, but also negates the need to have files stored on your computer. Cloud computing is also beneficial for travellers, giving you the freedom to access your data regardless of location. Take these 10 steps to protect your confidential information on your next trip:
  • 2. www.titanfile.com + 1 855 315-6012 | sales@titanfile.com Copyright © 2013 TitanFile Protecting your data while travelling 5. If you must use a storage device, choose an external hard drive If, due to organizational regulations or poor Internet connectivity, storing your data in the cloud is not an option, consider external hard drives. As they are generally larger than USB keys, they’re not as easy to misplace. If choosing this option, it’s important that all files stored on the drive are encrypted – adding an extra layer of security in case of loss or theft. 6. Avoid public computers Many airports and libraries have computers available for public use. Never use these comput- ers to check your email or access confidential information. If you have no other option, always check for the presence of keyloggers – small, cheap devices that log everything you type. 9. Invest in a privacy screen The majority of modern laptops pride themselves on having a wide viewing angle. While this is a great feature if you’re watching a movie with a friend, it’s not as impressive when you’re reviewing confidential financial reports. Protect yourself while flying or sitting in close quarters with a privacy screen. Privacy screens are cheap and accommodate all sizes of Macs and PCs. 7. Use a device tracking system With their many devices; travelers are often targets for thieves. Oftentimes when a device goes missing, it’s not the loss of the hardware that’s the issue – it’s the loss of its contents. Immedi- ately download tracking software on your device. Many solutions allow you to track the location of your hardware, remotely pull and delete files and take screenshots and camera images to monitor anyone using the device. 10. Keep your laptop inconspicuous Storing your laptop in your checked baggage or using any other method for concealment could spell disaster. Overly guarded or hidden laptops attract the attention of border guards who could become suspicious of your secrecy, as well as thieves who immediately place a higher value on protected items. 8. Avoid using local storage for email If you use Microsoft Outlook, Mozilla Thunderbird or one of the other desktop based email clients, chances are that the viewed email messages will be stored locally. It is better practice to opt-in for web-based access to email, including Gmail via Google Apps, or WebMail for Micro- soft Outlook. If you have to store your email messages locally due to corporate policies or low Internet connectivity, always encrypt your email database file.