Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 21 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Security tips for workers on the road

by The Gurus
November 16, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

As a remote worker, how can you better protect yourself and your personal information on your travels?  In an ideal world, there would be magical tips to 100% safeguard you from cyberattacks, but, unfortunately, it is very difficult to prevent.  There is no way to know what the next breach target is or when it could occur.  The only guarantee you have is that another breach will happen, and the odds are that your personal, or professional, data is at risk. There are steps you can take to reduce the impact when any of your information does get taken.  You can go to extremes – cancel all credit cards, just use cash, close all your social media and online accounts, but nobody wants to live that way either.  The key is balancing the risks.  Talking to many of the ‘road warriors’ within LANDESK, I put together some tips and tricks to mitigate the impact if our information becomes exposed whilst working on the move.
Change Your Credit Cards
Hotels and retailers have been among the most commonly breached organisations and as a road warrior, your card details may be in their system. To ensure that your card number doesn’t fall into the wrong hands, report that your card has been stolen, lost or is missing to the issuing company at least annually. This allows you to receive a new credit card number and invalidates the old one. This will prevent the risk of credit card information breaches from the hotel chains and retailers you may frequent. By changing your credit card number, the information stolen in these breaches is useless and cannot harm you.
Don’t Trust the Wi-Fi
You never know what or who is observing traffic on public Wi-Fi or if the connection you are on has been compromised. Public Wi-Fi can be easily hijacked – even hotel Wi-Fi can be easily breached. To protect yourself, limit your use of any public wireless environments. When you do go online at the airport or a coffee shop, login immediately to your corporate network before connecting to email or opening your browser. If your employer is wise to security practices, using your corporate VPN will provide an additional layer of encrypted protection from prying eyes.
Be Sure Your Computer is Up to Date
Computers that are running older operating environments or applications are more at risk to security vulnerabilities. If your computer is due for a system upgrade, contact your corporate helpdesk to request necessary patches and security updates. By keeping your system and your applications current, you can easily prevent known security breaches from penetrating your computer and the corporate systems it may connect to.
Restrict Your Privileges 
On the road, you may not need access to all the same applications and resources you use when in the office. Endpoint systems – such as your laptop, tablet and smartphone – are the easiest way in for most cyber threats and malware. One thing you can do to defend against such risks is restricting your use of privileged accounts while working on the go. There are solutions that will automate the control of your privilege accounts and application use based on policies including environment context, such as when working outside the corporate network. This can prevent troublesome cyberattacks from penetrating your computer and compromising your entire corporate network.
Slow Down!
Finally, make sure to take your time when travelling. Appreciate you are on the move – don’t answer emails whilst walking and double check everything you click on, appreciating that you are not in the office. The key here is to adjust your work/life balance and be aware of where and how you work.
 
By Simon Townsend at Landesk

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

NHS patients being put 'at risk' because of cybersecurity flaws

Next Post

IT Pros Admit Unauthorised Access, Malware and DoS Attacks are Top Three Cloud Security Concerns Today

Recent News

Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023
TikTok to be banned from UK Government Phones

TikTok to be banned from UK Government Phones

March 17, 2023
New AT&T Cybersecurity USM Anywhere Advisors Service Helps to Establish and Maintain Threat Detection and Response Effectiveness

Should Your Organization Be Worried About Insider Threats?

March 17, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information