{"id":656,"date":"2012-11-21T10:01:30","date_gmt":"2012-11-21T15:01:30","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=656"},"modified":"2020-02-26T15:06:01","modified_gmt":"2020-02-26T15:06:01","slug":"how-to-stay-secure-while-traveling-abroad","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-stay-secure-while-traveling-abroad\/656\/","title":{"rendered":"How to Stay Secure While Traveling Abroad"},"content":{"rendered":"<p>Smartphones and tablets make it possible for business travelers to stay connected to their corporate networks while on the road as never before. But, like any other platform, these mobile technologies are also vulnerable to hackers, meaning it\u2019s important to protect yourself \u2013 and your devices \u2013 while you\u2019re on the move. These eight tips will help you do just that.<\/p>\n<ol>\n<li><strong>Talk to Your IT Department<\/strong>: They\u2019ll have some strategies and tools that will allow you to access the most important, and sometimes sensitive, corporate documents without exposing them to attackers. Make sure you meet with them well in advance of your trip, as these workarounds might take a little time to put together.<\/li>\n<li><strong>Leave Your Phone at Home<\/strong>: This may sound counterintuitive, but your mobile device most likely contains sensitive data. Prepaid phones, preferably those that don\u2019t store data, are a cheaper, safer alternative.<\/li>\n<li><strong>Switch Your SIM Card<\/strong>: The SIM card is the removable chip in your phone that stores all of your personal \u2013 and sensitive \u2013 information. Buying a new one to use during your trip (most international airports will have kiosks that sell them) will protect some of your data in case the phone is lost or stolen. Much of the phone\u2019s data is held in internal storage, however, so this won\u2019t protect that information.<\/li>\n<li><strong>Don\u2019t Trust Wi-Fi<\/strong>: Avoid open or public Wi-Fi connections at all costs \u2013 hotel and public networks are easy prey for hackers looking to steal information or monitor communication. If an Internet connection is a must, have your company set you up with a VPN (Virtual Private Network) that will connect you to a server back home, (see Step 1) or a 4G card for your laptop.<\/li>\n<li><strong>Try Google Voice<\/strong>: Using a free VOIP connection (Voice Over IP \u2013 aka, phone via the Internet) offers security that digital communications in a foreign country cannot. Google Voice is a great option, and having your conversations handled on their infrastructure is far more secure than a foreign telecommunications network, which could be subject to hacking or surveillance. \u00a0Some governments have been known to <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/syrian-government-using-skype-spyware-monitor-rebels-050412\" target=\"_blank\" rel=\"noopener nofollow\">use Skype to eavesdrop<\/a> on users, as well.<\/li>\n<li><strong>Watch the Signal<\/strong>: If you\u2019re traveling in a country that has 3G service and your mobile device suddenly switches to 2G, you may be in danger. That\u2019s because 2G is far easier to eavesdrop on, and would-be hackers will often try to force a phone onto 2G communication to steal data.<\/li>\n<li><strong>Lock Your Doors<\/strong>: Nothing beats physical security. Always be sure to lock your hotel door and, when possible, store valuables in an in-room safe. Once hackers have physical possession of a device it is game over, unless you have security software such as <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/mobile-security\" target=\"_blank\" rel=\"noopener\">Kaspersky Mobile Security<\/a> or <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/tablet-security\" target=\"_blank\" rel=\"noopener\">Kaspersky Tablet Security<\/a> on the device. Both of these offer the ability to remotely lock and wipe lost or stolen devices.<\/li>\n<li><strong>Get Sneaky<\/strong>: For the truly paranoid, get creative in your phone conversations. Asking \u201cHow are the kids?\u201d could be a clever way of asking \u201cHow\u2019s the new super-secret microprocessor prototype design coming along?\u201d and could leave any eavesdroppers in the dark. Hopefully your top-secret scientist is playing along.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Smartphones and tablets make it possible for business travelers to stay connected to their corporate networks while on the road as never before. But, like any other platform, these mobile<\/p>\n","protected":false},"author":32,"featured_media":662,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[173,78,97,174],"class_list":{"0":"post-656","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-google-voice","9":"tag-hackers","10":"tag-security-2","11":"tag-wi-fi"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-stay-secure-while-traveling-abroad\/656\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-stay-secure-while-traveling-abroad\/656\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-stay-secure-while-traveling-abroad\/656\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-to-stay-secure-while-traveling-abroad\/656\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-stay-secure-while-traveling-abroad\/656\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/how-to-stay-secure-while-traveling-abroad\/450\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-stay-secure-while-traveling-abroad\/656\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-stay-secure-while-traveling-abroad\/656\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/google-voice\/","name":"google voice"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=656"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/656\/revisions"}],"predecessor-version":[{"id":18661,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/656\/revisions\/18661"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/662"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}