Safe Travel Tips
  • The Author

Keep your digital information safe

You are here:Home » Blog » Advice » Keep your digital information safe
Keep your digital information safe

I’ll bet you didn’t know you could buy underwear with zippockets big enough to hold a smartphone or a portable camera.  The Travel section of the Telegraph has a great article with good instructions on how to protect your digital resources.

In addition to the advice in the article, there are some other considerations.

Watch for the potential for theft at the security checkpoint at the airport. Be deliberately slow going through security to allow the person in front of you to complete most of the security path and then move through while you keep your eyes on your bag throughout the security screening process. This will minimize the chance for theft of your bag or laptop on the far end of the security point. If you’re a business or government traveler, your laptop computer is valuable to a thief and you may be specifically targeted strictly for its value. It may be important enough to justify them purchasing a ticket to get into the secure area to steal it.

A common theft technique involves a two-person team that will work to delay you during the security process. Person number one moves through and waits for your bag to appear on the other end of the belt. Person number two is in front of you and delays your movement in some manner. Person number one grabs your bag or laptop from the other end of the belt. The far end of the security process is an area with less focus for the security agents as they are normally facing the people coming into the checkpoint. Once the thief has your bag, they can quickly exit the secure area, which is normally just around the corner from the entry point and out of view of most security staff. By the time you notice your bag is gone, the thief is out of the terminal and impossible to locate.

If the computer is stolen, you can assume everything on it is open for exploitation. If a qualified thief gets your laptop, they will get to your files. Don’t be fooled into believing that passwords for logging into the operating system (e.g., Windows) cannot be broken. A different hard drive, such as a thumb drive, can be used to launch a different operating system on the computer to control it. Once the alternative operating system is installed, then all of the files on the computer can become visible and accessible.

A good precaution is to encrypt your files. Free file encryption software is available on the Internet for both e-mail and documents. Many of them offer adequate protection for routine use. You can also use the software to encrypt files while you’re offline and then go online only long enough to upload the document as an attachment.

Instead of writing personal information into the e-mail itself, you could type everything into a document, encrypt it, and then attach it to the e-mail. This minimizes your vulnerability with only a minimal increase in time spent.

A better solution is to keep files off your computer whenever possible. Save your files on a password-protected file server, so you can access them via the Internet. Thumb drives are convenient, but they are also easily lost, damaged, or stolen. If you use a thumb drive, encrypt it and then guard it carefully.

There are other minimum steps to protect your computer (either traveling or at home):

  1. Install a professional antivirus program that includes a firewall.
  2. Make sure home wireless routers are secure by using Wi-Fi Protected Access (WPA) instead of Wired Equivalent Protection (WEP). The user manual for your router can provide information on how to set it up. If you need help, call someone. The cost will be worth the risk mitigation.
  3. If you think there is a chance you might have a keylogger already hiding on your computer, use anti-keylogging software to locate and remove it.
  4. Set new passwords for each online account, and change the passwords frequently. Follow common password rules with a mixture of upper and lower case, special characters, and numbers. Never use full words you can find in a dictionary.
  5. Never open junk e-mails.
  6. If you don’t know who sent you an attached file or why they sent it, then don’t click on it, regardless of how interesting it might seem.
  7. Turn on your pop-up blocker.
  8. Turn file sharing off.
  9. Disconnect from the Internet (wireless or wired) whenever you’re not actively using it.
  10. Don’t use the same password for multiple sites. If one site is hacked and they get your personal information and your password, they will have access to everything else.

Share this:

  • Tweet
  • Email

Related

Tags

communicationscomputersecurity

About Steve Harmon

Steve Harmon

For more than 30 years, Steve was an intelligence community professional who traveled and lived throughout Europe, Asia, the Middle East, Sub-Saharan Africa, and Central America. He now uses his experiences and formal training to help people overcome their reluctance to travel by giving them the solid, reliable information they can use to plan effectively, reduce risk, react to danger, and return home safe.

Leave a Reply Cancel reply

Recent Posts

  • Some techniques to deal with your captors and return home safely…

    Some techniques to deal with your captors and return home safely…

    January 7, 2021
  • A cool app for currency exchange rates

    A cool app for currency exchange rates

    November 15, 2020
  • So, you’ve been arrested overseas…  Now what?

    So, you’ve been arrested overseas… Now what?

    July 4, 2020
  • Special considerations for traveling with children

    Special considerations for traveling with children

    May 27, 2020
  • Avoiding a common hotel credit card scam

    Avoiding a common hotel credit card scam

    March 16, 2020

Recent Comments

    Categories

    • Advice (16)
    • Information (13)
    • News (11)
    • Tools (6)

    Top Posts

    • Some techniques to deal with your captors and return home safely...

    Categories

    • Advice
    • Information
    • News
    • Tools
    back up
    © Copyright 2022 Safe Travel Tips
    • MySafeTravelTips.com
    • The Author
    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.