Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity News

5 Security Risks Professionals Face While Working on Vacation

By Joseph Carson
ports 2 responsive default security
July 14, 2017

With the summer upon us, everyone is starting to prepare with scheduling their upcoming vacations. As working professionals begin making plans and decide on what to pack and bring with them, it is very likely that their bag will be full of technical gadgets, tablets, smartphones and both personal and work laptops – especially when their vacations include some work that just can’t wait.    

Many of those with demanding jobs know that even when on vacation they must remain connected to the world in more ways than one to answer emails and handle important business matters. With the increased use, online services by these traveling professionals, especially in unknown territory, those traveling can quickly become a target of cyber criminals and hackers. In this case, it is critically important to know how cyber criminals target their victims, what travelers can do to reduce the risk and make it more challenging for the attackers to steal their important company or personal information, identity or money.

So as professionals gear up to gear up to head out on vacation, they should follow the National Cyber Security Alliance’s (NCSA) online security campaign and Stop, Think and then Connect by following these fivebest practices below to stay safe online while traveling:

 

1.)    Don’t lose your data, stay protected and relax.

While on vacation, it is a common place for things to get lost, misplaced or stolen. It can happen in an instance by simply forgetting your laptop on the bus or the taxi, or by being distracted chasing after your children – all while someone else walking away with your tablet or laptop. This can lead to major security risks, whether it’s your personal or company laptop, sensitive data is now at risk. Realistically, this is the last thing you want ruining your vacation. 

Tip #1:  Backup, Update and Encrypt. Before you leave for vacation, make sure you back up all devices and data. Double check that all security updates are applied, and finally check your security settings. For example, ensure your sensitive data is encrypted. 

 

2.)    Beware of social logins and limit the use of application passwords:

Almost every service you sign up for while on vacation now requests s you connect using your social media accounts, to gain access to whatever it is you are trying to do. The problem with using your social media account for these services is that you are providing and sharing personal details about yourself. This means you are giving these services the ability to continuously access your location, updates and personal information. 

Tip #2 - Use unique accounts, rather than social logins as those accounts get compromised, and cyber criminals could cascade to all the accounts using the social login.

 

3.)    Beware of what you do over Public Wi-Fi.

Always assume someone is monitoring your data over public Wi-Fi. Do not access your sensitive data, like financial information over public Wi-Fi.  Do not change your passwords and beware of entering credentials while using public Wi-Fi.  If you have a mobile device with a personal hotspot function use this over public Wi-Fi. During vacations, it can be expensive if you decide to use the highly expensive data roaming options from telecommunication companies so when using public Wi-Fi during vacation always make sure to use it with caution, securely and with the following tips in mind. 

Tip #3: Do not use a public Wi-Fi network without VPN. Instead, use your cell network (3G/4G/LTE) when security is important.  When using public Wi-Fi, ask the vendor for the correct name of the Wi-Fi Access point and whether it has security., It is common for hackers to publish their own Wi-Fi SID with similar names. Disable Auto Connect Wi-Fi or Enable Ask to Join Networks. Many hackers will use Wi-Fi access points with common names like “Airport” or “Cafe” so your device will auto connect without your knowledge. Do not select to remember the Wi-Fi network.  Use the latest web browsers as they have improved security for fake websites, this prevents someone from hosting their own websites like Facebook waiting for you to enter your credentials. Do not click on suspicious links even via social chats like videos that contain your photos and beware of advertisements that could direct you to compromised websites. Use a least privileged user or standard user while browsing, as this will significantly reduce the possibility of installing malicious malware.

 

4.)    Beware of Credit Card Skimmers.

It is going to be common at some point during your vacation that you are going to need to take out cash from an ATM. As simple as it may appear, this can sometimes be a very damaging experience if caution is not taken. Cyber Criminals have targeted popular tourist locations for credit card skimmers. Credit Card skimmers are very small devices which steal your credit card number and PIN code, even though it requires physical access these are still very popular scams.

Tip #4: When on vacation or traveling, I usually find myself in l need of visiting an ATM to take out cash, which is actually my biggest concern while travelling. My tip is to use an ATM inside rather than an outside ATM. The reason behind that is because, the ATMs inside are less likely to be compromised and difficult for those shoulder surfers. Before placing your card into the ATM, check the card slot and PIN pad for any signs of tampering. Keep all receipts, and when you return home from your vacation change your credit card pin number and check your transactions. Try to use a credit card versus a debit card as you have better protection from fraud. These tips will help keep your money in your pocket and not put it into the cyber criminal’s pocket.     

 

5.)    Before “clicking,” stop, think and check if it is expected, valid and trusted.

We are a society of clickers; we like to click on things (like hyperlinks for example). Always be cautious of receiving any messages with a hyperlink. Before clicking, ask yourself – “Was this expected?”, “Do I know the person who is sending this?”. On occasions, check in with the actual person on if they actually did send you an email before you aimlessly click on something in which might be malware, ransomware, a remote access tool or a virus that could steal or access your data. Nearly 30 percent of people will click on malicious links, and we need to be more aware and cautious.    

Tip #5: Before clicking, stop and think. Check the URL, make sure the URL is using HTTPS, also that this URL is coming from a legitimate source. Discover where the hyperlink is taking you before you click on it as you might get a nasty surprise.       

 

Stay safe while on vacation with these best practices and avoid becoming the next victim of cybercrime. Vacations should be a time to relax and following these steps will help prevent you from vacation disasters.

KEYWORDS: cyber threats cybercrime travel cybersecurity travel security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joseph Carson is a cybersecurity professional with more than 25 years' experience in enterprise security and infrastructure. Currently, Carson is the Chief Security Scientist & Advisory CISO at Thycotic. He is an active member of the cybersecurity community and a Certified Information Systems Security Professional (CISSP). Carson is a cybersecurity adviser to several governments, critical infrastructure organizations, and financial and transportation industries, and speaks at conferences globally.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Russia and Cyberattacks

    Debunking the 5 Myths of Sophisticated Cyber Attacks

    See More
  • internet of things

    Understanding the needs of IoT security

    See More
  • cloud-enews

    Securing cloud access when everyone is now a privileged user

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing