Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnSecurity Leadership and ManagementLogical Security

Counteracting heightened security risks for travelers, remote workers

Counteracting heightened security risks for travelers, remote workers

By Pam Nigro, Contributing Writer
woman accessing a network with security protocols

gahsoon / E+ via Getty Images

September 16, 2024

As the remote work landscape continues to mature and the summer travel season continues, organizations face an increased risk of cybersecurity threats due to the heightened use of mobile devices accessing company networks remotely. While remote connectivity offers employees flexibility and convenience, it also opens potential avenues for breaches through unsecured networks, device theft or phishing schemes. To safeguard sensitive data and maintain network integrity, organizations must adopt a proactive and multi-faceted security approach.

Mobile devices are particularly susceptible to theft or loss, especially in unfamiliar environments. To mitigate this risk, it's imperative for organizations to implement a robust mobile device management (MDM) or enterprise mobility management (EMM) solution. These systems enable the enforcement of security protocols such as remote wiping, data encryption and strong password policies on all devices accessing the network. Additionally, MDM/EMM can effectively separate personal and corporate data, enhancing the security of confidential information.

Another critical step is mandating the use of Virtual Private Networks (VPNs) for all remote connections. VPNs establish encrypted tunnels for data transmission, significantly reducing the risk of interception or unauthorized access when employees connect from public Wi-Fi networks. Employees must understand that using a VPN to encrypt all traffic transmitted back to the organization is non-negotiable. Organizations should provide reliable VPNs and comprehensive training on their proper usage.


❝

By embracing a multi-faceted approach that combines technological solutions, implementing a comprehensive employee education program, and stringent policies, organizations can effectively protect their sensitive data and mitigate the elevated risks associated with the busy travel season.


Additionally, comprehensive cybersecurity training is essential to equip employees with the knowledge and skills to protect their devices while traveling. This training should focus on potential threats, emphasizing the dangers of unsecured public Wi-Fi and promoting the use of secure alternatives like VPNs. Employees must be aware of the vulnerabilities associated with their devices and the potential consequences of theft or loss. Reinforcing the importance of strong passwords, biometric locks and remote-wiping capabilities can significantly reduce the risk of unauthorized access to sensitive company data.

Furthermore, organizations should adopt an "update before you go" policy, mandating that employees update their device operating systems and applications before traveling. This ensures that the latest security patches are applied, protecting against known vulnerabilities that could be exploited by cybercriminals.

Multi-factor authentication (MFA) is another essential layer of security that organizations should strongly encourage. By requiring an additional verification step, MFA makes it significantly harder for unauthorized users to gain access, even if login credentials are compromised. As noted in an ISACA Now blog post, MFA is also an important safeguard against AI-driven credential-hacking.

Finally, a clear and concise policy outlining travel-related cybersecurity practices should be established and communicated to all employees. This policy should provide guidance on connecting to the company network remotely, specify approved devices and applications, and outline the steps employees should take in case of device loss or a suspected data breach.

The busy travel season presents heightened cybersecurity risks due to increased travel and remote work. By embracing a multi-faceted approach that combines technological solutions (MDM/EMM, VPNs), implementing a comprehensive employee education program, and establishing stringent policies, organizations can effectively protect their sensitive data and mitigate the elevated risks associated with the busy travel season. Vigilance, preparedness and a proactive cybersecurity strategy are crucial for protecting the organization during this period of increased vulnerability.

KEYWORDS: organizational risks remote workforce travel cybersecurity work from home

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigro headshot

Pam Nigro is the Vice President of Security and Security Officer at Medecision. She also is an ISACA Board Director and was the 2022-23 ISACA Board Chair. Image courtesy of Nigro

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Remote worker

    Securing remote work for holiday travelers

    See More
  • Cyber and artificial intelligence

    Concerted push needed for AI training in security community

    See More
  • fraud-enews

    Heightened fraud and cyber risks threaten e-commerce merchants

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing