Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnSecurity Leadership and ManagementLogical Security

Counteracting heightened security risks for travelers, remote workers

Counteracting heightened security risks for travelers, remote workers

By Pam Nigro, Contributing Writer
woman accessing a network with security protocols

gahsoon / E+ via Getty Images

September 16, 2024

As the remote work landscape continues to mature and the summer travel season continues, organizations face an increased risk of cybersecurity threats due to the heightened use of mobile devices accessing company networks remotely. While remote connectivity offers employees flexibility and convenience, it also opens potential avenues for breaches through unsecured networks, device theft or phishing schemes. To safeguard sensitive data and maintain network integrity, organizations must adopt a proactive and multi-faceted security approach.

Mobile devices are particularly susceptible to theft or loss, especially in unfamiliar environments. To mitigate this risk, it's imperative for organizations to implement a robust mobile device management (MDM) or enterprise mobility management (EMM) solution. These systems enable the enforcement of security protocols such as remote wiping, data encryption and strong password policies on all devices accessing the network. Additionally, MDM/EMM can effectively separate personal and corporate data, enhancing the security of confidential information.

Another critical step is mandating the use of Virtual Private Networks (VPNs) for all remote connections. VPNs establish encrypted tunnels for data transmission, significantly reducing the risk of interception or unauthorized access when employees connect from public Wi-Fi networks. Employees must understand that using a VPN to encrypt all traffic transmitted back to the organization is non-negotiable. Organizations should provide reliable VPNs and comprehensive training on their proper usage.


❝

By embracing a multi-faceted approach that combines technological solutions, implementing a comprehensive employee education program, and stringent policies, organizations can effectively protect their sensitive data and mitigate the elevated risks associated with the busy travel season.


Additionally, comprehensive cybersecurity training is essential to equip employees with the knowledge and skills to protect their devices while traveling. This training should focus on potential threats, emphasizing the dangers of unsecured public Wi-Fi and promoting the use of secure alternatives like VPNs. Employees must be aware of the vulnerabilities associated with their devices and the potential consequences of theft or loss. Reinforcing the importance of strong passwords, biometric locks and remote-wiping capabilities can significantly reduce the risk of unauthorized access to sensitive company data.

Furthermore, organizations should adopt an "update before you go" policy, mandating that employees update their device operating systems and applications before traveling. This ensures that the latest security patches are applied, protecting against known vulnerabilities that could be exploited by cybercriminals.

Multi-factor authentication (MFA) is another essential layer of security that organizations should strongly encourage. By requiring an additional verification step, MFA makes it significantly harder for unauthorized users to gain access, even if login credentials are compromised. As noted in an ISACA Now blog post, MFA is also an important safeguard against AI-driven credential-hacking.

Finally, a clear and concise policy outlining travel-related cybersecurity practices should be established and communicated to all employees. This policy should provide guidance on connecting to the company network remotely, specify approved devices and applications, and outline the steps employees should take in case of device loss or a suspected data breach.

The busy travel season presents heightened cybersecurity risks due to increased travel and remote work. By embracing a multi-faceted approach that combines technological solutions (MDM/EMM, VPNs), implementing a comprehensive employee education program, and establishing stringent policies, organizations can effectively protect their sensitive data and mitigate the elevated risks associated with the busy travel season. Vigilance, preparedness and a proactive cybersecurity strategy are crucial for protecting the organization during this period of increased vulnerability.

KEYWORDS: organizational risks remote workforce travel cybersecurity work from home

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigro headshot

Pam Nigro is the Vice President of Security and Security Officer at Medecision. She also is an ISACA Board Director and was the 2022-23 ISACA Board Chair. Image courtesy of Nigro

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Remote worker

    Securing remote work for holiday travelers

    See More
  • cybersecurity-laptop

    National Security Agency Releases Cybersecurity Guidance for Remote Workers

    See More
  • Ribbon of data

    Quantum Computing: A Call to Action for Security Professionals

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • June 6, 2012

    Basic Remote Connection for AXIS Camera Companion

    In this webinar, you will learn how to setup basic forwarding rules and Network address translation (NAT) in a router. We will also show you how to setup remote connection using AXIS Camera Companion.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing