• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

How to better protect your data when you’re on a business trip overseas


By VARINDIA - 2017-11-19
How to better protect your data when you’re on a business trip overseas

Government agencies, journalists, and businesses trading in some parts of the world may find themselves at greater risk of being spied upon than others.You only have to keep a vague eye on the security headlines to recognise that organisations have had information stolen from them, or their computers compromised, when their staff have visited countries such as Russia and China.

 

So, what should you be doing to protect yourself better digitally if you’re travelling to a high-risk country?

 

Here are some tips which may help prevent hackers from accessing sensitive government information, corporate trade secrets, journalist contacts, and… of course… passwords which could open up a wealth of further information.

 

Do you need to go there in the first place?

 

The first question to ask yourself is this: is your journey really necessary? Not only can a long-haul trip overseas trip have an impact on your body clock and carbon footprint, but it’s increasingly argued that face-to-face meetings are less necessary due to advances in teleconferencing and online meeting services.

 

To be fair, I think that a video conference call is never quite as good as meeting someone in real life, forming a good relationship over a business dinner, etc… but that doesn’t mean that it should always be necessary to have a meeting in person.

 

Okay, you’re going on the trip. What will you bring with you?

 

If possible, do not bring your regular work laptop. Instead bring a temporary “burner” laptop or alternative computing device that you wouldn’t be too bothered losing or having compromised. Ensure that there is no sensitive data on your devices before you make your trip. And it doesn’t just stop at laptops. Consider not taking your smartphone, if possible and – again – take a “burner” device instead.

 

Before you leave

 

Ensure that your security patches and anti-virus software is up-to-date. Ideally it is wise to ensure that latest patches and updates are in place before you leave for your trip, to reduce the chances that anything you download has been compromised.

 

3NCrypt y0ur d@ta and d3v1C3s

Encrypt your devices – making sure to choose strong, hard-to-crack, unique passwords. Where possible also enable multi-factor authentication and biometric checks to make it harder for an attacker to gain access to your data.When communicating – via email or instant messaging – take advantage of end-to-end encryption when possible to prevent conversations from being intercepted.

 

Turn off Wi-Fi

 

Wi-Fi and Bluetooth when travelling. If you must use Wi-Fi ensure that you have a trusted VPN enabled which will create an encrypted tunnel for your communications.Even using hard-wired internet access in, say, a hotel may be inadvisable. A 3G or 4G cellular connection remains the safest option.

 

Keep an eye on your devices, and beware the evil maid attack

 

If you do take your computer or smartphone with you, never leave them unattended. Instead, keep your devices with you, and don’t leave them in your hotel room. So-called “evil maid” attacks see someone access your hotel room – perhaps posing as room service – and gaining access to your laptop. A keylogger may be installed, and your laptop returned to its normal place in your room. Noticing nothing suspicious (and perhaps pleased to notice your mini-bar has been restocked and your bed made) you log into your device and your password is captured. On another visit, the “evil maid” can obtain the password, and your device could have its data decrypted or be implanted with a rootkit.

If it’s impractical to bring your computer with you, you could consider leaving it in your room’s safe or check it in with the hotel concierge, but this doesn’t guarantee that it still won’t be accessed and tampered with.

 

Email

 

Talk to your IT team. They may be prepared to set you up with a temporary “burner” email address that can be used during your trip, with messages forwarded there from your current account. Such a system means that even if it is compromised hackers will not be able to access older communications – which will often reveal sensitive or personal identifying information. Obviously, you should disable the forwarding of messages to the burner email account upon your return!

 

A spy in your pocket

 

If you are worried that your smartphone may have been compromised, don’t just turn it off in meetings – remove its battery! That way there is little chance that it is secretly recording your private conversations. One of the advantages of carrying a “dumb” phone overseas it is unlikely to have as many methods of being compromised to either steal data or spy on you.

 

Social media

 

Be careful not to announce your whereabouts on social media either intentionally or accidentally by, for instance, uploading images containing meta data that gives away your location.

 

Going home

 

As you leave the foreign country, make a note if your devices are inspected at the border. If they are, you may wish to be especially wary of every connecting them to your corporate network – be sure to inform your IT security team upon your return. Obviously if you chose to take a “burner” device in the first place, there is less pain associated with dumping it upon your return.

 

Internet attacks don’t respect country borders

Finally, remember that a determined hacker won’t necessarily limit their attacks to when you are in their country. If they want to get into your systems they may well try when you are “safely” back in your home country as well. Always be aware of the techniques that malicious hackers use to break into systems, ensure you have patches and anti-virus updates in place, and your wits about you.

 

Zakir Hussain Rangwala
Director, BD soft, Country Partner of Bitdefender

 

Tags: protect your data, business trip, zakir hussain rangwala bitdefender, bitdefender, anti virus, varindia, A spy in your pocket, Social media, hackers

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.