Archives - Travel Tech Tips


Turn off your Bluetooth feature when you’re not using it

Just like Wi-Fi, Bluetooth is a technology common to many types of devices that sends information wirelessly. Unfortunately, this information isn’t encrypted. It’s best to only turn Bluetooth on when you’re planning to use it, and then turning it off when you’re done.

Safeguard your data from capture

Networks without passwords do not encrypt your connection. Accordingly, it’s possible for other connected users to spy on your activity, including any password you type. Don’t view your bank balance or log into any accounts tied to a debit/credit card while on public Wi-Fi. Cellular is much safer in these cases.

Reduce the damage caused by malware by frequently backing up your data

Sometimes, the only way to repair a device that’s infected with malware is to completely wipe the storage drive and reinstall the operating system or perform a factory reset. This will destroy all the data inside and the malware with it. Unfortunately, it’s impossible to predict when malware will compromise your device, so you should […]

Be aware of options for remote device wipe

Losing a device is never fun. Your losing an essential tool while also possibly putting your data at risk, too. Services like Find My iPhone for Apple and Total Defense Mobile Security for Androidprovide some recourse, since they allow you to remotely wipe the device, erasing its contents and settings so that no one else […]

Back up the data on your device before traveling

Many applications allow you to set up regular automated backups of your data, which is great for day-to-day data preservation. But when you’re traveling — particularly abroad — this could be costly or ineffective due to connectivity or restrictions on your plan. To ensure you have a reliable account of your data before you go […]

Don’t connect to rental cars

If you hire vehicles when traveling — for leisure or business — avoid using the connectivity features in the car. Whether it’s Bluetooth for your phone or music, or synced GPS maps, you’re opening up your personal device to exchange data with an unknown entity that has been used by an unknown number of strangers. […]