Archives - Travel Tech Tips


Turn off Bluetooth

Bluetooth connections are so commonly used now that it isn’t always something you may think of turning off when you’re not using a peripheral device. While Bluetooth security is excellent, it’s still vulnerable to infiltration. Leaving Bluetooth active while not connected to a device may present an opportunity for bad actors in your immediate vicinity. […]

Verify you’re using HTTPS on shared networks

It may be only one letter, but there’s a big difference between HTTP and HTTPS in a URL. HTTPS encrypts all page and form data on the site in your using, making it crucial when employing sensitive applications like online banking. If you’re using Wi-Fi in a cafe, hotel or school, scanning for HTTPS is […]

Protect your personal data when you’re not at home

Even if you’re not home and using your devices, hackers could still break their way into your network or crack your computer. One way to ensure this doesn’t happen is to disconnect the device from your internet connection entirely. Without a network connection, they can’t access your device or steal your data. But you can […]

Be sure to lock all your mobile devices

You lock the front door to your house, and you should do the same with your tablets and smartphones. Employ strong passwords to lock down your tablet and phone. Securing your devices keeps prying eyes out and can help protect your information in case your devices are ever lost or stolen.

Do not conduct sensitive transactions on a public shared device

Even though computers available at libraries, college campuses and other public locations are convenient resources for low-risk activities like browsing the web or collaborating on documents. They’re less not to good for conducting online banking or shopping transactions, because you can’t be sure they’re totally secure. Bets staying with your own devices and networks for […]

Don’t use public USB ports

Nowadays it’s not uncommon to find publicly available USB ports for charging phones and other devices. But did you know that malicious hackers can take advantage of these charging locations? Hackers can install malware or viruses and steal your information through these public USB ports. Instead, use one of your own chargers and plug it […]