SlideShare a Scribd company logo
1 of 1
How to keep Your Gadgets Safe When Travelling
Nowadays, very few people even think of setting out on a journey without taking their gadgets with them,
which is not irrational considering the vast amount of personal and business-related information stored in
them. Instant access to the Internet is something we all take for granted and we can make use of it just
about anywhere – from any means of transport to coffee shops. This,however, makes it quite a feat to
ensure our gadgets and devices are not exposed to all possible forms of security threats. Luckily, it is a
matter of common sense and state-of-the art technology use to safeguard them easily and inexpensively.
First of all, it is important to ensure all your software is up-to-date. You can Google or check the
manufacturer’s website to find out if a software update is available. It would also be prudent to create
strong passwords, to create an original combination of letters, numbers and special characters of 8
characters (or even more). Acronyms are highly recommended and should preferably be changed twice a
year.
Moreover, when it comes to Androids, iPhones and Blackberry phones, their default browser security
settings are already efficient and reliable, so there’s no need to change them. Additionally, unencrypted
public wireless networks are too risky as they require no authentication or password to log in. Even
encrypted Networks pose potential risks. It would therefore be advisable to be cautious as to the kind of
actions you perform on such networks.
Each time you access a website where you are required to share personal information, such as your phone
number or bank’s website, you should be confident beyond any doubt that you do this securely. To be
absolutely certain, ensure that https is active (the s indicates connection to the site via Secure Socket
Layer – SSL) . This is evidence that all your personal data will be transmitted over the Net in an
encrypted form.This,however, is no guarantee of security. Quite the contrary is true.If you exchange your
information on an unencrypted server, you may still fall victim to MITM attack(man in the middle
attack). No matter how rare these attacks are, they do happen, so be sure to connect on an encrypted
network and that the websites you connect to use https.
Apart from the SSL option (encryption) it is wise to use a VPN (a virtual private network) if it is within
your reach, as it provides a secure option to protect your sensitive data.
If you have set up your mobile device to automatically enter passwords and login information into
frequently visited websites, it is advisable to turn this off.It is very likely to pose a privacy threat. Third-
party apps are a great alternative option, as they manage saved passwords with a much higher level of
security. Mac OS X is a great example, as well asKeePass is for some versions of Windows. LastPass,
1Password and SlashID are better alternatives for iOS and Android smartphones.
It is a frequent trend to download apps. Especially the free ones are extremely tempting. You should not
be blind to the possibility that this may not be entirely secure, as the Android market is a bit more open.
Some caution and foresight come a long way. For instance, TaintDroid is an Android tool that notifies
users if a third party is requesting information. Its only drawback is it’s not available on the Android
market.
It should be clear that even when you do take all these precautions it is not a guarantee that you will not
fall victim to hackers. In such a case change your password to a stronger one. In case of theft, make sure
your device has an autowipe or remote wipe feature, so your data is still safe. In any case, even in the
worst case scenario, there is always a solution as long as you stay informed.

More Related Content

Similar to Keep Your Gadgets Safe When Travelling(39

Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Password selection,piggybacking-
Password selection,piggybacking-Password selection,piggybacking-
Password selection,piggybacking-Baljit Saini
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfOZONESOFT Solutions
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 

Similar to Keep Your Gadgets Safe When Travelling(39 (20)

Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Password selection,piggybacking-
Password selection,piggybacking-Password selection,piggybacking-
Password selection,piggybacking-
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Keeping Your Cloud Data in Check
Keeping Your Cloud Data in CheckKeeping Your Cloud Data in Check
Keeping Your Cloud Data in Check
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 

Keep Your Gadgets Safe When Travelling(39

  • 1. How to keep Your Gadgets Safe When Travelling Nowadays, very few people even think of setting out on a journey without taking their gadgets with them, which is not irrational considering the vast amount of personal and business-related information stored in them. Instant access to the Internet is something we all take for granted and we can make use of it just about anywhere – from any means of transport to coffee shops. This,however, makes it quite a feat to ensure our gadgets and devices are not exposed to all possible forms of security threats. Luckily, it is a matter of common sense and state-of-the art technology use to safeguard them easily and inexpensively. First of all, it is important to ensure all your software is up-to-date. You can Google or check the manufacturer’s website to find out if a software update is available. It would also be prudent to create strong passwords, to create an original combination of letters, numbers and special characters of 8 characters (or even more). Acronyms are highly recommended and should preferably be changed twice a year. Moreover, when it comes to Androids, iPhones and Blackberry phones, their default browser security settings are already efficient and reliable, so there’s no need to change them. Additionally, unencrypted public wireless networks are too risky as they require no authentication or password to log in. Even encrypted Networks pose potential risks. It would therefore be advisable to be cautious as to the kind of actions you perform on such networks. Each time you access a website where you are required to share personal information, such as your phone number or bank’s website, you should be confident beyond any doubt that you do this securely. To be absolutely certain, ensure that https is active (the s indicates connection to the site via Secure Socket Layer – SSL) . This is evidence that all your personal data will be transmitted over the Net in an encrypted form.This,however, is no guarantee of security. Quite the contrary is true.If you exchange your information on an unencrypted server, you may still fall victim to MITM attack(man in the middle attack). No matter how rare these attacks are, they do happen, so be sure to connect on an encrypted network and that the websites you connect to use https. Apart from the SSL option (encryption) it is wise to use a VPN (a virtual private network) if it is within your reach, as it provides a secure option to protect your sensitive data. If you have set up your mobile device to automatically enter passwords and login information into frequently visited websites, it is advisable to turn this off.It is very likely to pose a privacy threat. Third- party apps are a great alternative option, as they manage saved passwords with a much higher level of security. Mac OS X is a great example, as well asKeePass is for some versions of Windows. LastPass, 1Password and SlashID are better alternatives for iOS and Android smartphones. It is a frequent trend to download apps. Especially the free ones are extremely tempting. You should not be blind to the possibility that this may not be entirely secure, as the Android market is a bit more open. Some caution and foresight come a long way. For instance, TaintDroid is an Android tool that notifies users if a third party is requesting information. Its only drawback is it’s not available on the Android market. It should be clear that even when you do take all these precautions it is not a guarantee that you will not fall victim to hackers. In such a case change your password to a stronger one. In case of theft, make sure your device has an autowipe or remote wipe feature, so your data is still safe. In any case, even in the worst case scenario, there is always a solution as long as you stay informed.