Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurity News

Checklist: 24 Steps for Data Security While Traveling Abroad

When traveling overseas, there is already plenty of work to do in terms of planning, packing and then actually traveling.

By Edward Yakabovicz
Overseas and Secure
March 1, 2014

When traveling overseas, there is already plenty of work to do in terms of planning, packing and then actually traveling. When we travel, the data we carry and our Internet habits can put our individual privacy and data security at risk. As an example, the U.S. State Department's Bureau of Consular Affairs 2014 Sochi Olympics advisory states: “Travelers should be aware that Russian Federal law permits the monitoring, retention and analysis of all data that traverses Russian communication networks, including Internet browsing, email messages, telephone calls and fax transmissions.” This article addresses some best practices that can be taken before, during, and after travel to secure data – both your personal data and corporate data – and protect your individual privacy.

 

Before Traveling:

1)         Limit or minimize any data taken to include removable media such as CDs, DVDs and thumb drives.

2)         Consider a company-owned “loaner” cellphone, laptop and/or tablet to limit the loss of both corporate and personal data if the device is lost, stolen or confiscated by officials.

3)         Perform a full device back up and secure with a strong password. Store it in a secure location while you are away.

4)         Inform banks and credit card companies of travel plans to include dates, locations and any special instructions. International transactions are typically flagged as fraud, and purchases may be delayed or your card cancelled without advanced travel notice.

5)         Consider using virtual credit card numbers that offer one-time use and are disposable, yet will display on the credit card bill.

6)         Pack only essential ID, credit and debit cards. Leave the others in a secure location.

7)         Update data protection software such as operating systems, anti-malware, anti-virus, security patches and others prior to departure.

8)         Install full-disk encryption on laptops.

9)         Use the U.S. State Department website (www.state.gov) to prepare and familiarize yourself with:

a.      Information on the country of travel.

b.      Export control laws concerning sensitive equipment, software and technology (that includes encryption).

c.      Security testing/hacker tools are also forbidden and illegal in some countries.

10) Update or configure device passwords by:

a.      Configuring the use of at least four-digit passwords (longer if supported).

b.      Changing all passwords on all devices and use different passwords on each.

c.      Configuring automatic wiping settings to wipe the device’s data after a pre-determined number of passcode entry failures.

 

While on Travel:

1)         You have no reasonable expectation of privacy in some countries.

a.      Phone calls, electronic communications and even hotel rooms may be monitored as a standard practice. Sensitive or confidential conversations, transactions or data transfer should be kept to a minimum until you return home.

b.      Be prepared to turn on and off devices, and present all removable media for customs officials. You may be asked to decrypt data for inspection at international borders. In some countries, withholding your password is a criminal offense.

2)         Use the same rules for your personal and company devices to separate acceptable social networking communications versus sensitive transactions. Understand there is a difference between sharing a photo on social networking versus connecting to your bank or credit card company.

3)         Use safe ATMs in public areas during daylight. Cover PIN entry and cash output as much as possible.

4)         Determine the availability and cost of purchasing a local cellphone, or buy local SIMs. Prepaid local phones limit costs by not working after exceeding a maximum number of minutes. They are cheaper for local calls and have better connectivity. Buying local SIMs, especially PAYG, adds a level of anonymity, which may be good for privacy/security.

5)         Use trusted VPN connections as much as possible. If you don’t have a VPN available, use HTTPS connections as much as possible.

6)         Connections in cyber cafes, public areas and hotels can be safe with a VPN, but should otherwise be considered insecure and probably monitored by unsavory agents. Physical PCs in such places may contain keystroke logging or other malicious methods to gather your information.

7)         Do not loan your device to anyone, or attach unknown devices such as thumb drives. Thumb drives are notorious for computer infections.

8)         Disable device illicit access via wireless technologies by:

a.      Using airplane mode to disable or suspend all connectivity.

b.      Disabling Wi-Fi when not in use. Wi-Fi ad-hoc mode or unsecure file sharing enables direct access to devices.

c.      Disabling Bluetooth when not in use (or set it to “hidden,” not "discoverable”). Consider rental car Bluetooth PBAP (Phone Book Access Profile)  functionality loads the entire address book, while Bluetooth (Personal Area Network) functionality enables connections with other Bluetooth devices.

9)         Report lost or stolen devices as soon as possible to whomever it concerns. This might include your company, mobile provider, hotel, airline, insurance company and/or local authorities. Local authorities have a better chance to find stolen property if it is reported stolen as soon as you know it is missing.

 

Upon Returning Home:

1)         Return the loaner device(s).

2)         Have all devices, media and thumb drives reviewed for malware, unauthorized access or other corruption. Do not connect it to a trusted network until you have tested it for malware.

3)         If the device is found to be compromised, reformat it and rebuild it from trusted sources/media. Then restore data from backups taken before the trip.

4)         After ensuring your devices are secure and not compromised, change all business and personal passwords. If possible, change the passwords for things like corporate accounts, banks, etc., using a device other than the one you traveled with.

5)         Inform your bank or credit card companies of your return and review transactions.

6)         Continue to monitor your business and personal financial institution transitions for unauthorized or unapproved use.

 

These practices may seem cumbersome, but they provide essential protections to ensure data security and privacy while traveling abroad. Depending on the industry, company or affiliations, there could be even more restrictions, so it is best to check with your company’s legal or IT department before travel. Regardless of business or personal travel, protect all of your electronic devices with the same level of vigilance because there are no reasonable expectations of privacy in many countries today.

 

About the Author:

 Edward P. Yakabovicz, CISSP, CIPP/IT, CIPM, is a Principal Information Assurance Engineer for the Center of Cyber Security Innovation at Lockheed Martin Corporation. He has 25 years of business experience within top five financial corporations, the U.S. Government, and Lockheed Martin global customers. As a subject matter expert in cybersecurity and privacy, he currently holds a master’s degree in Information Assurance from Norwich University and is currently an Information Assurance Doctorate student at Capitol College in Maryland. Yakabovicz’s most recent experience includes being a co-author of the International Association of Privacy Professionals (IAPP) Certified Information Privacy Manager (CIPM) certification textbook. 

KEYWORDS: intellectual property protection International cyber security international security mobile device security travel security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • portable hard drive enclosure

    Keeps Data Secure while Traveling

    See More
  • hands holding cell phone

    55% of employees solely use mobile device for work while traveling

    See More
  • cyber security network

    Active directory cyber hygiene checklist: 11 steps to securing AD

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing