Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementCybersecurity News

Five Typical Cyber Attack Techniques Used Against Business Travelers

By Matthew Bradley
Cybersecurity Leadership Images
July 23, 2018

Business travel, especially international business travel, can put organizations and their employees at risk for cyberattacks. In 2017, International SOS found that 75 countries were impacted by cybersecurity attacks between the months of January and September alone. Protecting a mobile workforce is challenging for any business; risk mitigation plays an integral role in keeping both personal and business information secure while on assignment.   

Cybersecurity is generally built around three main principles: Confidentiality, keeping data private and preventing unauthorized access to data; Integrity, confidence that data has not been modified or manipulated by an outside source; and Availability of Data, the ability to access required data when you need it. Business travelers can put these three principals at risk by simply transferring data through non-encrypted channels.

Although business travelers encounter several points of cybersecurity vulnerability while traveling, such as use of Wi-Fi hotspots in public places, use of USB chargers that can download and execute malware, and eavesdropping, there are a number of steps organizations can take to asses travel risk and keep company information and devices secure. The first step for a business to protect against cyberattacks, is to understand the techniques used against business travelers. Typical cyberattack techniques include:

  1. Theft or Loss of Devices: Theft or loss of laptops is the number 1 threat faced by business travelers. Travelers leave laptops at airport security, in taxis and have them stolen from hotel lobbies and rental cars. Loss of laptop can be loss of data, which can be as damaging as any remote attempts to access the network
  2. Data Breach: Theft of data due to limited security measures, potentially leads to leaks of sensitive, reputation-damaging information
  3. DDoS (Distributed Denial of Service): The use of a large number of infected devices that lead to slow or unresponsive web-facing devices and applications
  4. Ransomware: When malware is downloaded to a device that encrypts data until ransom is paid. This technique is often used as a smokescreen for deeper network intrusions. Travelers could be affected by this if they download and execute software that contains the ransomware code
  5. Unauthorized Access: The use of stolen credentials or brute force attacks such as guessing usernames and passwords, to gain access to a network or device that has a high threat score due to its potential for privilege escalation and lateral movement. The threat for travelers here is people “shoulder surfing” while travelers are entering their usernames and passwords while connecting remotely. This could happen on the plane, in the hotel lobby or in a coffee shop.

One of the most effective ways companies can mitigate cyberattack risks is to use a Virtual Private Network (VPN) to access data remotely. Organizations can implement VPN's for their employees as part of its travel risk management program. Those traveling for pleasure can also implement VPN’s as a precautionary measure to prevent theft of personal information.

Use of screen protectors, storing data in a cloud instead of on a laptop, encrypting files on a hard drive, and removal of unnecessary files on devices, are also great precautionary measures to ensure cybersecurity. If possible, businesses should encourage travelers to avoid connecting to non-secure networks such as public Wi-Fi hotspots and to disable their Wi-Fi and Bluetooth capabilities while traveling. By not using a secure network, company data is put at higher risk and online accounts are more vulnerable, also putting employees at risk for identity theft.  

Over the last year, concerns about information security while traveling for business or on assignment have increased. In 2017, reports predicted that corporate information theft will cost businesses between $2.1 trillion in 2019 and $6 trillion by 2021. This serves as proof that business travelers are more and more vulnerable to cyber and physical information security threats. It is crucial for organizations to implement preventive programs to teach their travelers and expats how to identify potential cyber and information security threats, and how they can reduce exposure to risk of data theft, within their travel risk management programs. Effective prevention will help ensure information, whether it’s business critical, sensitive personal, or otherwise confidential information is safe and protected from cyber threats.

KEYWORDS: cyber security cybercrime employee training employee travel

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Matthew bradley

Matt Bradley, Vice President of Global Security Solutions at OnSolve. A veteran security operations expert for more than two decades, Bradley brings deep first-hand knowledge of security operations management and understanding of the critical challenges facing organizations the future. Most recently, Bradley served as Regional Security Director for the Americas at International SOS and Control Risks, where he led the security services business and advised key executives on risk management solutions. Prior to International SOS and Control Risks, Bradley worked in Honduras as the Security Director for Tigo Honduras where he handled all matters relating to physical security; health, safety and environment; crisis management; and fraud investigation, and as first as a General Manager for I Solution Security, where he advised on security matters for the Honduran President, Minister of Security, and Minister of National Emergency Commission. Previously, Bradley led a distinguished 14-year career with the Central Intelligence Agency (CIA).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cybersecurity for Travelers - Security Magazine

    The Crucial Role Prevention Plays Against 2020’s Top Business Travel Threats

    See More
  • airport-enews

    Security Around the Clock: Hotel Safety for the Mobile Workforce

    See More
  • SEC1020-Business-Feat-slide1_900px

    Mitigating the risks of business travel during the pandemic

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing