You can learn how you can innovate by watching the On-Demand Sessions from the Low-Code/No-Code Summit and You can increase your efficiency by learning new skills and scaling citizen developers. Watch now.


Many are looking forward to the holidays. remote Workers, already at increased risk from cyberattacks, will travel to book holiday vacations. travel To visit your family and friends. This will likely exacerbate IT teams’ anxiety about cybersecurityThis was already increased by the pandemic and The effects of this event. According to a Ponemon Institute survey, 65% of respondents believed that the Ponemon Institute was responsible for their aftereffects. IT and security professionals said they found it easier to protect an organization’s confidential information when staff were working in the office.

Security risks can arise whether employees are working remotely, on vacation or at conferences. There are security pitfalls with all types of work. remote worker, an organization’s attack surface grows larger. While working remotely, some employees lose their cyber security. Some people find that traveling can lead to fatigue. and Poor decision-making can lead to poor security decisions. This is a problem. 76% of CEOs You will admit that you have bypassed security protocols in order to get things done quicker. 

While technology has made significant strides in protecting us from ourselves, working remotely can quickly go south if we don’t take basic cybersecurity precautions. This article provides a list of security best practices. for remote work and travel. You will find that not all tips are applicable to every situation. However, it is vital to know your current situation. and Future surroundings: Assess their relative risk and Protect your credentials and devices by taking precautions and confidential data.

Here are some examples tips To improve your security during remote work Or travel.

Event

Intelligent Security Summit

Learn the critical role of AI & ML in cybersecurity and Industry specific case studies December 8. Register for Get your free pass today.


Register Now

This is the first step: Lock your SIM card 

No trip or trip Lock your SIM card. SIM-jacking (or SIM-swapping, unauthorized port-out or “slamming”) is a real and Contact your wireless provider to report underreported crimes where threat actors pretend to be you and “port over” Your SIM card to their (their). “new phone.” Imagine someone stealing your entire online life, including your social media accounts.

This means that your phone number now belongs to them. All password resets will now be processed through this portal. Threat actor Take into account how many work credentials, social media accounts and Apps can access your phone number and the horror of this crime is quickly apparent. If you haven’t already done so, lock down your SIM card with your wireless provider.

Here’s some information about Verizon’s “Number Lock” feature.

Cybersecurity tips for remote and traveling workers

All data should be backed up every day. Traveling? Leave the backup at home and store it in the cloud.

You should use a password-protected WPA3-enabled Wi Fi (preferably WPA3) network.

Make a strong password with uppercase and lower case letters, distinctive characters, and Multiple characters. Never keep passwords on your phone or in your pocket, even in the notes section. In an ideal world, your employer would use a password management program., but chances are they’re not. According to SpecOps’ 2022 Weak Password Report54% of companies don’t have a password manager. Even more troubling, 48% of organizations don’t have user verification for Contact the IT service desk.

Patch and Update all your devices, apps included. Do the exact same for The browsers and everything else you’re running on those devices. Apple released the August 2022 announcement that unpatched iPads, iPhones were available. and Threat actors may be able to take control of Macs. Before you go into unfamiliar territory, ensure that all information is correct.

Here’s how to update every app on your iPhone and iPad if you don’t have them set to automatically update — all at once:

iPhone

Go to the App Store.
Click here “Apps.”
Click on Account (upper left).
Click “Update All.”

Additional to the updating and Before you start patching everything, ensure that your browsers have the most stringent security settings. If you don’t want to mess with settings, consider downloading Mozilla Firefox Focus and Make it yours travel browser. Firefox Focus will purge the cache automatically after each use, so there are no breadcrumbs for you to exploit.

Use 2-factor authentication (2FA), everywhere and With everything. Always opt for the best method to receive your authentication code. for token over text as it’s much more secure. Black Hat 2022 was the venue where a Swedish research team demonstrated how insecure and vulnerable text authentications can be. Hackers can steal your login credentials and phone number, text-based authentication simply won’t protect you.

You should update your Zoom software. Ivan Fratric, security researcher at Google Project Zero, showed how a bug in Zoom 4.4 (an earlier version) could be exploited. remote code execution by exploiting the XMPP code in Zoom’s Chat function. Fratric was then able to spoof message content once the payload was activated. He was also able impersonate anybody. work with. What could go wrong with this? 

Security and travelLeaving your home office

Digital nomads need to pack light, regardless of whether they are heading to Las Vegas, Starbucks, or anywhere else. Don’t bring unnecessary items. You only need the necessary items to complete your job. This will not compromise your personal data. IBM recommends that employees traveling with their laptops have a lock to secure them to the workstation. A physical one-time password (OTP), authenticator is also recommended. Google and other companies require that employees use them. Without the device, employees cannot access any information.

Don’t leave sensitive data behind. Don’t bring devices containing personally identifiable information (PII) or confidential company documents. Do you use a particular laptop for Online banking and signing mortgage docs? It’s best to leave it at home. You want to take it with you? work Are you going on holiday with your computer? Reconsider. Think about what could happen to your career if confidential company information is stolen. Of course, taking your laptop on a business trip is expected, but just make sure it’s free of your personally identifiable information.

Protect your passport with RFID blocking devices and Credit cards starting at “contactless crime.” Groceries are more convenient with contactless payments and Toll booths can pose a problem for threat actors using radio frequency identification (RFID), which can make them difficult to use. If an RFID scanner is misused, hackers can walk right past a group without being detected. and Unmask-identifiable card information

This can be avoided by using RFID blockers, which are basically card envelopes. “sleeves”) that protect payment cards, room keys and Passports that are protected from radio frequency attacks or skimming attacks There are entire categories of walletsBags and RFID-equipped purses. Fortunately, more modern RFID chips make pulling off this caper much more difficult — but not impossible.

Use a privacy screen for your laptop and phone.

Turn off Wi-Fi and Bluetooth when traveling to a secure location. and Near Field Communication (NFC) On your smartphone, tablet and laptop. It is possible to experience funny things while traveling to China, or even an unsecure Starbucks. 

Use a password-protected hotspot instead of hotel Wi-Fi. Use a VPN to pair with hotel Wi-Fi. 

Bluetooth devices such as yours should be avoided remote Keyboard and mouse and AirPods.

Use a VPN wherever you are. According to Cloudwards, 57% of respondents say they don’t need a VPN for Personal use and 22% say they don’t need one for work.

Encrypt text messages and Chats and Telegram, Signal and other encryption-based communication platforms. Assume that third parties can read unencrypted applications.

Wrapping up

As you can see most cybersecurity Front-end preparation is important when you travel. Like everything else security-related, it’s crucial to keep systems, software and Browsers are updated and patched. Traveling abroad? Be aware that not all places are home to the free. Know where you’re going and What their privacy laws are in your area.

When working remotely or travelling, it is important to keep your profile low. Don’t take any chances or unnecessary risks.

Roy Zur is CEO of ThriveDX’s enterprise division.

VentureBeat’s mission It is to become a digital city square for Technical decision-makers need to be informed about the transformative potential of enterprise technology and transact. Check out our briefings.