Agents & Policyholders
Agents & Policyholders
Agents & Policyholders
Small Business Owners
Commercial Property Insurance
Excess & Surplus
Agricultural and Heavy Equipment
Life at AmTrust
Agent Marketing Library
AmTrust PolicyWire Blog
Cyber Security for Travelers
Cyber Security for Travelers
Summary: A proactive strategy when it comes to cyber security for travelers starts with anticipating that your organization will be the victim of a cyberattack. Most businesses create a
data breach response plan
, which of course is an essential element in mitigating costs and damages following an attack, but more importantly, they should understand how they could be at risk in the first place.
A proactive strategy also includes having
cyber liability insurance
Cybersecurity Risks Business Travelers Face
Part of a proactive cybersecurity plan includes making sure employees understand what threats they could be subject to not only on company premises but also when they’re traveling outside of the office. Business travelers can be more vulnerable to a cyberattack than those traveling for pleasure, mainly due to the fact that they often carry laptops, cell phones and tablets with sensitive data on them. Those who travel internationally can be even more at risk due to strict customs regulations that allow officials to inspect electronic devices, including asking for passwords to access hard drives.
Some of the other common cybersecurity risks travelers encounter include:
One laptop is stolen every 53 seconds, and 80% of the cost of a lost laptop is the result of a data breach
. It’s important to keep in mind that
24% of devices are stolen from conferences
. This is why it’s so vital that laptops with sensitive data are never left unattended at a conference or in a hotel room.
Free Wi-Fi offered in airports, restaurants, hotels and other buildings make it convenient for travelers to stay connected and complete tasks while on the road. However, these unsecure networks often allow easy access for cybercriminals to internet-enabled devices.
Publicly accessible computers:
Hotel business centers often provide community computers that anyone can use, such as for quickly printing presentations or checking email. Keep in mind these devices may not have updated operating systems and anti-virus software, making it easy for hackers to infect them with malicious viruses or software.
Be aware of how others may see the screen of your phone or laptop. Working in a place with your back against a wall makes it more difficult for curious onlookers to see your work. If possible, try to avoid working in economy class especially if located on a middle seat or aisle seat. Due to the close proximity of these seats, many people may be able to see your screen easily.
Preventing Data Breaches While Traveling
If you travel frequently for business as many agents do, here are a few of the top cybersecurity tips that can ensure sensitive data stays safe while you’re on the road:
Keep software updated
Keeping your laptop, cell phone and tablets updated with the latest software can help safeguard each device. It allows them to be better defended against malware, as software updates often include patches that cover holes in security you may not have even known about.
Lock down devices
Whenever devices aren’t being actively used, get into the habit of locking them. Should you misplace them or if they are stolen, locking down devices is the first line of defense against a cyberattack.
Leave main devices and/or sensitive data at home
When possible, travel with alternative devices that do not contain sensitive information. At the very least, do not locally store sensitive data on your devices if you’ll be traveling with them. Use the cloud for data storage Keep data stored on the cloud rather than on your devices’ hard drives or desktop where it can be easily accessible to cybercriminals. “I’m a big fan of cloud-based services for storage of files and keeping the amount of local business data on the end-point to the absolute minimum,” says Ian Thornton-Trump, head of cybersecurity at AmTrust International. “In any case, the mobile device should have full-disk encryption enabled – that could be the difference between paying nothing to a regulator or paying a large fine.”
Disable auto-connect and Bluetooth and use free Wi-Fi cautiously
Many devices have a setting that allows them to automatically connect to Bluetooth and Wi-Fi. When Bluetooth is left enabled, hackers nearby may be able to connect to them and steal information from the devices. Always ask your hotel or host what their security protocols are when it comes to the free Wi-Fi they offer, too, as you should never use unencrypted networks. If you absolutely must use free Wi-Fi, do not access sensitive data or your personal accounts while doing so.
Use a virtual private network VPN
A VPN encrypts transmitted data over a Wi-Fi connection to help protect it from being intercepted or tampered with by a cybercriminal. Use a trusted and reputable VPN provider to help mitigate security risks while out of the office.
Update passwords before and after the trip
Creating strong passwords
and updating them regularly can help you avoid a cybersecurity breach both at home and while traveling. Before heading out for a trip, change all passwords, and make sure they are different from what you’ve previously used. When you return from the trip, change them again.
Be careful with physical copies of important documents
You should not only bring along hard copies of the documents needed to travel, but Thornton-Trump also advises: “Take pictures of your important documents like page 2 of your passport, your driver’s license and both sides of your credit cards in the event any of them are lost or stolen. Be situationally aware if you’re bumped into or jostled at any point in your travels, check for your wallet and phone – develop this habit, don’t panic if something is missing. Simply retrace your steps and you may find what you lost.”
Stay mindful with checked baggage and airport security
A lot of laptop cases, backpacks, wallets and laptops – not to mention travel dodcuments – look similar and during security screening you may briefly lose sight of your personal effects. When retriving your items, do a double check to make sure you have your own belongings. This also applies to situations where the overhead bins are full and your baggage maybe checked into the hold. Remember, many roller bags will look the same. It’s a good idea to attach a high visability patch, sticker or ribbon to your bags so if you are separated from them you can quickly identify which items belong to you.
Cyber Liability Insurance from AmTrust Financial
cyber liability coverage
begins working for you right away in the event of a data breach. Small business owners can rest assured that they will receive assistance at every stage of the investigation and throughout the response of a data breach incident from a team of technical experts and data privacy attorneys.
today to learn more.
This material is for informational purposes only and is not legal or business advice. Neither AmTrust Financial Services, Inc. nor any of its subsidiaries or affiliates represents or warrants that the information contained herein is appropriate or suitable for any specific business or legal purpose. Readers seeking resolution of specific questions should consult their business and/or legal advisors. Coverages may vary by location. Contact your local RSM for more information.
Subscribe to PolicyWire for weekly email updates
Articles by Topic
Small Business Advice
Paid Family Leave
New York Paid Family Leave
Business Owner's Policy
Become an Agent
Get A Quote
Apr 7, 2021
Protection from Social Engineering Fraud
Learn how to protect your business from social engineering fraud with the correct cyber liability and commercial crime insurance coverage.
Jan 11, 2021
Creating a Company Data Breach Response Plan
Find out why businesses must create a data breach response plan to avoid the damaging effects of a cybersecurity attack. Learn what to include in your company's cybersecurity policy and more as part of your data breach response plan.
Dec 31, 2020
Nonprofit Cybersecurity Risks: Common Attack Methods
Find out why nonprofits are often the target of cybercriminals, and learn about some of the most common cybersecurity risks for nonprofit organizations.