Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnSecurity Leadership and ManagementLogical Security

Counteracting heightened security risks for travelers, remote workers

Counteracting heightened security risks for travelers, remote workers

By Pam Nigro, Contributing Writer
woman accessing a network with security protocols

gahsoon / E+ via Getty Images

September 16, 2024

As the remote work landscape continues to mature and the summer travel season continues, organizations face an increased risk of cybersecurity threats due to the heightened use of mobile devices accessing company networks remotely. While remote connectivity offers employees flexibility and convenience, it also opens potential avenues for breaches through unsecured networks, device theft or phishing schemes. To safeguard sensitive data and maintain network integrity, organizations must adopt a proactive and multi-faceted security approach.

Mobile devices are particularly susceptible to theft or loss, especially in unfamiliar environments. To mitigate this risk, it's imperative for organizations to implement a robust mobile device management (MDM) or enterprise mobility management (EMM) solution. These systems enable the enforcement of security protocols such as remote wiping, data encryption and strong password policies on all devices accessing the network. Additionally, MDM/EMM can effectively separate personal and corporate data, enhancing the security of confidential information.

Another critical step is mandating the use of Virtual Private Networks (VPNs) for all remote connections. VPNs establish encrypted tunnels for data transmission, significantly reducing the risk of interception or unauthorized access when employees connect from public Wi-Fi networks. Employees must understand that using a VPN to encrypt all traffic transmitted back to the organization is non-negotiable. Organizations should provide reliable VPNs and comprehensive training on their proper usage.


❝

By embracing a multi-faceted approach that combines technological solutions, implementing a comprehensive employee education program, and stringent policies, organizations can effectively protect their sensitive data and mitigate the elevated risks associated with the busy travel season.


Additionally, comprehensive cybersecurity training is essential to equip employees with the knowledge and skills to protect their devices while traveling. This training should focus on potential threats, emphasizing the dangers of unsecured public Wi-Fi and promoting the use of secure alternatives like VPNs. Employees must be aware of the vulnerabilities associated with their devices and the potential consequences of theft or loss. Reinforcing the importance of strong passwords, biometric locks and remote-wiping capabilities can significantly reduce the risk of unauthorized access to sensitive company data.

Furthermore, organizations should adopt an "update before you go" policy, mandating that employees update their device operating systems and applications before traveling. This ensures that the latest security patches are applied, protecting against known vulnerabilities that could be exploited by cybercriminals.

Multi-factor authentication (MFA) is another essential layer of security that organizations should strongly encourage. By requiring an additional verification step, MFA makes it significantly harder for unauthorized users to gain access, even if login credentials are compromised. As noted in an ISACA Now blog post, MFA is also an important safeguard against AI-driven credential-hacking.

Finally, a clear and concise policy outlining travel-related cybersecurity practices should be established and communicated to all employees. This policy should provide guidance on connecting to the company network remotely, specify approved devices and applications, and outline the steps employees should take in case of device loss or a suspected data breach.

The busy travel season presents heightened cybersecurity risks due to increased travel and remote work. By embracing a multi-faceted approach that combines technological solutions (MDM/EMM, VPNs), implementing a comprehensive employee education program, and establishing stringent policies, organizations can effectively protect their sensitive data and mitigate the elevated risks associated with the busy travel season. Vigilance, preparedness and a proactive cybersecurity strategy are crucial for protecting the organization during this period of increased vulnerability.

KEYWORDS: organizational risks remote workforce travel cybersecurity work from home

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigro headshot

Pam Nigro is the Vice President of Security and Security Officer at Medecision. She also is an ISACA Board Director and was the 2022-23 ISACA Board Chair. Image courtesy of Nigro

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Remote worker

    Securing remote work for holiday travelers

    See More
  • Ribbon of data

    Quantum Computing: A Call to Action for Security Professionals

    See More
  • cybersecurity-laptop

    National Security Agency Releases Cybersecurity Guidance for Remote Workers

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • June 6, 2012

    Basic Remote Connection for AXIS Camera Companion

    In this webinar, you will learn how to setup basic forwarding rules and Network address translation (NAT) in a router. We will also show you how to setup remote connection using AXIS Camera Companion.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing