SlideShare a Scribd company logo
1 of 1
Download to read offline
KEEPING YOUR
CONTENT SAFE
43% 32%
69%
62%73%
90%
74%
52%
79%
87% 86%
89%
TIP
Protecting the irreplaceable | www.f-secure.com
Traveling this summer, and taking technology with you? Be aware of special tech
considerations before you start your journey.
on the RoadSURFING SAFE
PROTECTING
YOUR DEVICE
Tech Travel Tip:
Public WiFi is not secure or private. Assume
anything you do over it is part of a public
conversation. For personal matters, stick to
HTTPS sites.
TIP
Tech Travel Tip:
F-Secure’s free Anti-Theft app protects your
mobile device in case it goes missing. Available at
http://www.f-secure.com/en/web/home_global/
anti-theft
TIP
Italy Netherlands
USING PUBLIC
WIFI HOTSPOTS
52% 49%
54%
of people are
concerned about the
security and privacy of
using public WiFi.
Females are more
concerned than males.
67%of people value the content on their
device more than the device itself.
All data from the F-Secure Digital Lifestyle Survey 2013, which covered web interviews of
6,000 broadband subscribers aged 20–60 years from 15 countries: Germany, Italy, France,
the UK, the Netherlands, Belgium, Sweden, Finland, Poland, the USA, Brazil, Chile,
Colombia, Australia and Malaysia. The survey was completed by GfK, April 2013.
*The F-Secure 2012 Consumer Broadband Survey
11%of people had
their device lost or
stolen in the
previous 12 months.*
Colombia
Losing your device could impact
not only your data, but also your
organization’s, because 61% use
their devices for both work and
personal purposes.
Brazil
Australia
Women more
so than men
USA
Malaysia
98%Sweden
Finland
36%
8%
24%
of people bank online.
bank online.
of people bank using
their smartphones
ONLINE
BANKING
Men bank online
more than women.
Tech Travel Tip:
When traveling, the safest way to bank online
is to use your smartphone and mobile data
plan with your bank’s mobile app.
TIP
Tech Travel Tip:
Back up your content before you leave so if
anything happens to your device, your
content is safe.
Chile
Belgium
Poland

More Related Content

What's hot

$4 Million Average Cost to an Organisation For a Data Breach!
$4 Million Average Cost to an Organisation For a Data Breach!$4 Million Average Cost to an Organisation For a Data Breach!
$4 Million Average Cost to an Organisation For a Data Breach!Xirrus
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
Phone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsPhone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsJohn Adam
 
Cisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the NumbersCisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the NumbersCisco Service Provider
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3Carlos Villafane
 
Potato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 HoursPotato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 HoursReshveena Kaur
 
digital media space in nigeria April 2015
digital media space in nigeria April 2015digital media space in nigeria April 2015
digital media space in nigeria April 2015dapo ladipo
 
Technological changes
Technological changesTechnological changes
Technological changesFrank Calberg
 
4imprint Wearable Tech Infographic
4imprint Wearable Tech Infographic4imprint Wearable Tech Infographic
4imprint Wearable Tech Infographic4imprint
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bbtechnosyah
 
Dehyper Pitchdeck: IoT Privacy & Security
Dehyper Pitchdeck: IoT Privacy & SecurityDehyper Pitchdeck: IoT Privacy & Security
Dehyper Pitchdeck: IoT Privacy & SecurityDEHYPER
 
Business inSecurity
Business inSecurityBusiness inSecurity
Business inSecurityEboney Brown
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
July digital media report
July digital media reportJuly digital media report
July digital media reportJemma Tracey
 
Mobile Apps The Essentials
Mobile Apps  The EssentialsMobile Apps  The Essentials
Mobile Apps The EssentialsGlenn McKnight
 

What's hot (20)

Identity verification and AI
Identity verification and AIIdentity verification and AI
Identity verification and AI
 
IoT - Rise of New Zombies Army
IoT - Rise of New Zombies ArmyIoT - Rise of New Zombies Army
IoT - Rise of New Zombies Army
 
$4 Million Average Cost to an Organisation For a Data Breach!
$4 Million Average Cost to an Organisation For a Data Breach!$4 Million Average Cost to an Organisation For a Data Breach!
$4 Million Average Cost to an Organisation For a Data Breach!
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Phone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsPhone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations Governments
 
Cisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the NumbersCisco Visual Networking Index Graphic--By the Numbers
Cisco Visual Networking Index Graphic--By the Numbers
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
 
Potato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 HoursPotato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 Hours
 
digital media space in nigeria April 2015
digital media space in nigeria April 2015digital media space in nigeria April 2015
digital media space in nigeria April 2015
 
Technological changes
Technological changesTechnological changes
Technological changes
 
Sholove cyren web security presentation2
Sholove cyren web security presentation2Sholove cyren web security presentation2
Sholove cyren web security presentation2
 
4imprint Wearable Tech Infographic
4imprint Wearable Tech Infographic4imprint Wearable Tech Infographic
4imprint Wearable Tech Infographic
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bb
 
The Nigerian Digital Landscape - Nov 2014
The Nigerian Digital Landscape - Nov 2014The Nigerian Digital Landscape - Nov 2014
The Nigerian Digital Landscape - Nov 2014
 
Dehyper Pitchdeck: IoT Privacy & Security
Dehyper Pitchdeck: IoT Privacy & SecurityDehyper Pitchdeck: IoT Privacy & Security
Dehyper Pitchdeck: IoT Privacy & Security
 
Qr codes
Qr codesQr codes
Qr codes
 
Business inSecurity
Business inSecurityBusiness inSecurity
Business inSecurity
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
July digital media report
July digital media reportJuly digital media report
July digital media report
 
Mobile Apps The Essentials
Mobile Apps  The EssentialsMobile Apps  The Essentials
Mobile Apps The Essentials
 

Viewers also liked

Economic Sanctions - The New Compliance Minefield - J. Boscariol
Economic Sanctions - The New Compliance Minefield - J. BoscariolEconomic Sanctions - The New Compliance Minefield - J. Boscariol
Economic Sanctions - The New Compliance Minefield - J. Boscarioljboscariol
 
Insight Brussels December 2013
Insight Brussels December 2013Insight Brussels December 2013
Insight Brussels December 2013MSL
 
Itt1 intro knowing and doing
Itt1 intro knowing and doingItt1 intro knowing and doing
Itt1 intro knowing and doingMorten Nielsen
 
รู้ค่าเงินตราต่างประเทศอย่างง่ายดายถ้ามี Currencies master
รู้ค่าเงินตราต่างประเทศอย่างง่ายดายถ้ามี Currencies masterรู้ค่าเงินตราต่างประเทศอย่างง่ายดายถ้ามี Currencies master
รู้ค่าเงินตราต่างประเทศอย่างง่ายดายถ้ามี Currencies masternuttakorn nakkerd
 

Viewers also liked (7)

Economic Sanctions - The New Compliance Minefield - J. Boscariol
Economic Sanctions - The New Compliance Minefield - J. BoscariolEconomic Sanctions - The New Compliance Minefield - J. Boscariol
Economic Sanctions - The New Compliance Minefield - J. Boscariol
 
Insight Brussels December 2013
Insight Brussels December 2013Insight Brussels December 2013
Insight Brussels December 2013
 
Itt1 intro knowing and doing
Itt1 intro knowing and doingItt1 intro knowing and doing
Itt1 intro knowing and doing
 
Card
CardCard
Card
 
Stonehenge
StonehengeStonehenge
Stonehenge
 
C9 software testing
C9 software testingC9 software testing
C9 software testing
 
รู้ค่าเงินตราต่างประเทศอย่างง่ายดายถ้ามี Currencies master
รู้ค่าเงินตราต่างประเทศอย่างง่ายดายถ้ามี Currencies masterรู้ค่าเงินตราต่างประเทศอย่างง่ายดายถ้ามี Currencies master
รู้ค่าเงินตราต่างประเทศอย่างง่ายดายถ้ามี Currencies master
 

Similar to Surfing Safe on the Road

Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must KnowVala Afshar
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Alliance
 
Three Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingThree Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingContent Raven
 
Emerging web technologies 2014
Emerging web technologies 2014Emerging web technologies 2014
Emerging web technologies 2014bthat
 
Mobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtMobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtIGN MANTRA
 
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureI.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureIndonesia Honeynet Chapter
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsLiberteks
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Warybee Investor Pitchdeck
Warybee Investor PitchdeckWarybee Investor Pitchdeck
Warybee Investor PitchdeckTCA Malaysia
 
Bitdefender-CSG-Report-creat7534-interactive
Bitdefender-CSG-Report-creat7534-interactiveBitdefender-CSG-Report-creat7534-interactive
Bitdefender-CSG-Report-creat7534-interactivestartupro
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlanKart Griffin
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust ReportAVG Technologies
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET Journal
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Internet of Things Study Acquity Group 2014
Internet of Things Study Acquity Group 2014Internet of Things Study Acquity Group 2014
Internet of Things Study Acquity Group 2014Ludovic Privat
 

Similar to Surfing Safe on the Road (20)

Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
 
Mobile security
Mobile securityMobile security
Mobile security
 
3 steps security
3 steps security3 steps security
3 steps security
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
 
Three Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingThree Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content Sharing
 
Emerging web technologies 2014
Emerging web technologies 2014Emerging web technologies 2014
Emerging web technologies 2014
 
Mobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtMobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirt
 
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureI.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Warybee Investor Pitchdeck
Warybee Investor PitchdeckWarybee Investor Pitchdeck
Warybee Investor Pitchdeck
 
Bitdefender-CSG-Report-creat7534-interactive
Bitdefender-CSG-Report-creat7534-interactiveBitdefender-CSG-Report-creat7534-interactive
Bitdefender-CSG-Report-creat7534-interactive
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlan
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Internet of Things Study Acquity Group 2014
Internet of Things Study Acquity Group 2014Internet of Things Study Acquity Group 2014
Internet of Things Study Acquity Group 2014
 

More from F-Secure Corporation

How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?F-Secure Corporation
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!F-Secure Corporation
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsF-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace F-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceF-Secure Corporation
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3F-Secure Corporation
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2F-Secure Corporation
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeF-Secure Corporation
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Corporation
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsF-Secure Corporation
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big businessF-Secure Corporation
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業F-Secure Corporation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?F-Secure Corporation
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetF-Secure Corporation
 

More from F-Secure Corporation (20)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 

Surfing Safe on the Road

  • 1. KEEPING YOUR CONTENT SAFE 43% 32% 69% 62%73% 90% 74% 52% 79% 87% 86% 89% TIP Protecting the irreplaceable | www.f-secure.com Traveling this summer, and taking technology with you? Be aware of special tech considerations before you start your journey. on the RoadSURFING SAFE PROTECTING YOUR DEVICE Tech Travel Tip: Public WiFi is not secure or private. Assume anything you do over it is part of a public conversation. For personal matters, stick to HTTPS sites. TIP Tech Travel Tip: F-Secure’s free Anti-Theft app protects your mobile device in case it goes missing. Available at http://www.f-secure.com/en/web/home_global/ anti-theft TIP Italy Netherlands USING PUBLIC WIFI HOTSPOTS 52% 49% 54% of people are concerned about the security and privacy of using public WiFi. Females are more concerned than males. 67%of people value the content on their device more than the device itself. All data from the F-Secure Digital Lifestyle Survey 2013, which covered web interviews of 6,000 broadband subscribers aged 20–60 years from 15 countries: Germany, Italy, France, the UK, the Netherlands, Belgium, Sweden, Finland, Poland, the USA, Brazil, Chile, Colombia, Australia and Malaysia. The survey was completed by GfK, April 2013. *The F-Secure 2012 Consumer Broadband Survey 11%of people had their device lost or stolen in the previous 12 months.* Colombia Losing your device could impact not only your data, but also your organization’s, because 61% use their devices for both work and personal purposes. Brazil Australia Women more so than men USA Malaysia 98%Sweden Finland 36% 8% 24% of people bank online. bank online. of people bank using their smartphones ONLINE BANKING Men bank online more than women. Tech Travel Tip: When traveling, the safest way to bank online is to use your smartphone and mobile data plan with your bank’s mobile app. TIP Tech Travel Tip: Back up your content before you leave so if anything happens to your device, your content is safe. Chile Belgium Poland