Contributors

Tips to stay cyber safe while travelling

Today is World Tourism Day. Let's take a look at the Government of Canada's ''Tips to stay Cyber Safe While Travelling''.
More and more travelers are bringing their electronic gadgets, like phones, tablets and laptops, with them. Getting some work done or chatting with friends doesn’t stop just because we’re away from our offices and homes.

Unfortunately, cyber-based threats can significantly increase when you are travelling, and devices can easily be compromised or stolen. When you travel, protect yourself by being cyber aware.

Let’s take a look at the Government of Canada‘s tips to stay cyber safe while travelling.

International laws and regulations on digital information

  • If you access your email in another country, do you know whether its government is watching you?
  • Is the risqué novel that you saved on your e-reader or iPad considered pornographic in the country you are visiting?
  • Will the downloaded music on your MP3 player and the torrent movies on your laptop or tablet cause you intellectual property and digital asset problems when you are entering a foreign country?
  • Can some countries compel you to provide them with the data on your iPad or laptop? What if the data is corporate intellectual property?

You are subject to the laws governing intellectual property, digital information and encrypted data in the countries that you visit. What is considered legal in one country may not necessarily be considered legal in another. The legislation may extend beyond the data to the hardware and the format in which it is stored. If you are not familiar with the laws covering intellectual property, digital information and encrypted data in your destination country, contact the embassy or mission of your destination country before you leave on your trip abroad.

Border agents are legally entitled to conduct search and seizure actions against anyone entering or leaving their countries.

Do not take any data into another country that you are not prepared to lose.

Read more >

Tips to stay cyber safe while travelling

  • Always use a password on your device.
  • Write your name on a visible or accessible part of your device. For example, set up a screen saver that lists your name and local address so that the device can be returned to you if someone finds it.
  • Avoid charging your phone on computers or devices that you do not control, such as hotel docking stations. Malicious software could be stored on devices that could be transferred when your device is connected. Use your personal computer or a direct-to-wall-socket charging port to charge your phone.

Read more >

Wireless (or “Wi-Fi”) access

You can connect your cellphone, smart phone, laptop or tablet to the Internet at wireless access points, sometimes free of charge, at coffee shops, in hotels or at airports during your travels. These highly unsecure networks are accessible to everyone.

People intending to steal identities and personal information may establish free Internet access points that are made to look trustworthy. They can name an access point or Wi-Fi network anything, even adding a single letter to the name of a trusted network.

Read more >

Shared or public computers

A malware family known as “keylogger” is commonly used to steal personal information. Keyloggers are covert software applications or physical devices attached to computers that capture any information that is entered into the device. Always be sceptical of the security of an unfamiliar network or device; use free computing resources with the assumption that any information you enter could be seen by an unauthorized third party.

Bluetooth access

Bluetooth is a short-range radio frequency connection between two devices, such as the technology that allows you to make hands-free phone calls while driving. With Bluetooth, the user has to allow another device to connect to his or her device before an exchange of data can take place. Once the secure relationship is confirmed, data can flow freely between the two devices with little or no user confirmation.

Read more >

Leave a comment

%d bloggers like this: