Article

Ten Electronic Devices Security Tips When Traveling Abroad

Topic: Identity TheftBy Dovell BonnettPublished Recently added

Legacy signals

Legacy popularity: 3,038 legacy views

Cyber Warefare – Safeguard Your Electronic Devices.

When employees travel abroad here are ten electronic devices security tips I pulled from a recent New York Times article, “Traveling Light in a Time of Digital Thievery” by Nicole Perlroth. Nicole discusses electronic devices security policies and practices of the State Department, Google, Bookings Institution, and McAfee executives when traveling to China and Russia.

However, because Cyber Warfare has no geographical boundaries I suggest these electronic devices security tips be used whenever anyone travels anywhere overseas; or, depending on the circumstance, travel anywhere.
Ten Electronic Devices Security Tips When Traveling Abroad

1. Leave personal cell phones and laptops at home.
2. Bring a burn phone (prepaid, disposable cell phone) and a loaner laptop dedicated for travel only.
3. Erase the EEPROM, Flash and hard drive memory of both devices before leaving the country and immediately after returning. As a personal side note, never plug this laptop into any network before first wiping it and use a very good wipe program.
4. Disable all Bluetooth and Wi-Fi functionality from all devices. This includes ear pieces.
5. Never let your phone or laptop out of your site.
6. In meetings, don’t just turn off your phone but also remove the battery. It is possible that the microphone can be turned on remotely. So, be sure you have a phone that you can get to the battery. An iPhone is not a good choice when traveling.
7. Connect to the internet through secure, encrypted channels.
8. Use a password manager so you don’t have to remember or type them. I recommend a smartcard password manager over a USB thumb drive because of the added security smartcards offers.
9. If customs or any outsider has touched or turned on your computer, do not plug it into the company network without first scrubbing it.
10. Your company needs to have an electronic device security travel policy, employee re-training before every trip, and all devices returned to IT before the employee is allowed back into the building.

Cyber attackers are clever in hiding what they do, but the number one behavior they rely on is employee carelessness. Scott Aken, a former F.B.I. agent who specialized in counterintelligence and computer intrusion made a great summation, “We’ve already lost our manufacturing base. Now we’re losing our R.& D. base. If we lose that, what do we fall back on?”

Article author

About the Author

Dovell Bonnett has been creating security solutions for computer users for over 20 years. In order to provide these solutions to consumers as directly, and quickly, as possible, he founded Access Smart. With each of his innovations, the end user — the person sitting in front of a computer — is his No. 1 customer.

This passion, as he puts it, to “empower people to manage digital information in the digital age” also led him to write the popular Online Identity Theft Protection for Dummies. Within the pervasive nature of our e-commerce and e-business community, personal information, from credit card numbers to your pet’s name, is more easily accessed, and identity theft and fraud has become an issue that touches every consumer.

Further reading

Further Reading

4 total

Article

It is probably no surprise to most adults that identity theft is one of the fastest growing types of fraud. But what may be more alarming is that people in the 18 to 29 age range are the fastest growing group of victims. One need not look too far to figure out why. Today’s young people ...

Related piece

Article

On a daily basis, consumers are barraged by offerings from companies claiming they can turn their dismal credit histories around and help them achieve higher credit scores. For a fee, they promise to clean up a consumer’s credit report so they can obtain a car loan, a home mortgage or ...

Related piece

Article

The emergence of the World Wide Web as a global, around the clock marketplace has opened a multitude of new opportunities to businesses which have never before been seen. Computers and global communication networks have brought vendors, customers and markets together in new and beneficial ways. Along with all of the benefits which business has gained from the information age come some downsides. New crimes have not been created by new technology, but rather new technology has given new tools to criminals to commit the same crimes as they always have.

Related piece

Article

Dealing with a collection agency can be a stressful experience. Not only are some debt collectors rude, but endless demanding telephone calls and letters can shake even the toughest individual. The stress and confusion that debt collectors can cause often results in consumers making mistakes that can result in future financial or legal difficulties. Here are 5 mistakes to avoid when dealing with a debt collector; 1. Conducting Business over the Telephoner

Related piece