Archives - Travel Safety


Avoid charging your phone at public stations

Public charging stations are becoming more common in airports, train stations and malls. While they may be convenient, they’re also a potential security risk. Hackers can compromise these outlets, so that when you plug into them, they gain access to all of your phone’s data.

Stop auto connecting when traveling

Watch out for some mobiles devices that may request and connect to available wireless networks or Bluetooth devices automatically. Instant connection like this may open the way for cybercriminals to remotely access your devices. Many times you can deactivate these settings so that you actively select when to connect to a safe network.

Keep it locked when traveling

Lock your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. Set your devices to lock after a short time and use strong PINs and passwords. In a world where we are constantly connected, cybersecurity […]

Traveling — back up your information first

When you’re traveling—whether domestic or international—it is always important to practice safe online behavior and take proactive steps to secure Internet-enabled devices. Back up your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory […]

Tips for traveling more safely

“Going on a big #trip for two weeks! Hello #Cancun” might seem like something cool to post to your social media feeds, but in reality it opens you up to some real risks. Broadcasting the fact that you won’t be home for a specific amount of time could increase the chances of someone vandalizing your […]

Be careful of using public computers when traveling

Hotels, libraries, and cafes may sometimes provide computers that people can use. Nevertheless, travelers cannot trust that these computers are secure. They may not be running the latest operating systems or have modernized anti-virus software. Cybercriminals may have infected these devices with malicious viruses or installed malicious software.