Archives - Travel Tech Tips

Be cautious before you connect public Wi-Fi hotspots

Like on an airplane or in an airport, hotel, train/bus station or café — be sure to confirm the name of the network and exact login processes with appropriate staff to ensure that the network is legitimate. Cybercriminals can easily create a similarly named network hoping that users will overlook which network is the valid […]

Don’t give away too much info in your out-of-office reply

You might have set up an email auto responder for anyone who messages you while you’re on vacation or otherwise not checking your workplace email. Don’t reveal too much information in these messages, as it might tip off someone to your whereabouts and facilitate theft or vandalism at your home.

Consider bringing along a rechargeable battery pack

Not being able to use your mobile device on the go can be a major hindrance, particularly if you need it for GPS or communicating your whereabouts. A portable, rechargeable battery pack is not only a good solution for staying charged, it also keeps you safer by lessening the need to use potentially risky public […]

Be careful with public charging stations and other ports

Airports, buses and other venues may feature publicly available USB ports you can use to charge your devices. Unless you desperately need a recharge, it’s best to avoid plugging in, as you might be putting your phone or tablet at risk of surveillance and malware infection.

Tips for traveling more safely

“Going on a big #trip for two weeks! Hello #Cancun” might seem like something cool to post to your social media feeds, but in reality it opens you up to some real risks. Broadcasting the fact that you won’t be home for a specific amount of time could increase the chances of someone vandalizing your […]

Be careful of using public computers when traveling

Hotels, libraries, and cafes may sometimes provide computers that people can use. Nevertheless, travelers cannot trust that these computers are secure. They may not be running the latest operating systems or have modernized anti-virus software. Cybercriminals may have infected these devices with malicious viruses or installed malicious software.