One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1501807
Date de publication 2020-01-17 14:00:00 (vue: 2020-01-17 16:09:04)
Titre Journey to security: Data safety for travelers
Texte fingerprint image Image source: Pixabay Note:This blog was written by an independent guest blogger. In today’s world, we enjoy incredible mobility that our ancestors could only dream of. In a matter of hours or, at most, days, we can go from one continent to another. At the same time, our lives depend on the security of all sorts of our private data: from our credit card information to our browsing habits. But if at our homes we can be sure that we have taken sufficient security measures and protected our systems, things get muddier when we travel. There is no way to tell if cybersecurity employed by an airport or hotel you use is enough to protect your sensitive data. However, there are ways to increase your safety by following several simple tips. 1.       Don’t trust public USB charging stations While their convenience is hard to overestimate when your battery charge is running low, public USB charging stations should not be treated as safe. The threat when the data on your device is stolen or infected through a USB cord when you connect the device to a charging station is called juice jacking. It may not be the most widespread type of malware injection but it is better to avoid any possibility of it nevertheless. This threat can be mitigated by getting a USB data blocker that allows charging your device while blocking any data transfer to or from it. Alternatively, just charge your device at a socket. 2.       Mind your physical security It’s not every time when personal information gets stolen that some complex hacking techniques are involved. Quite often, stealing access to sensitive data only requires a more traditional set of criminal skills. If you travel to a highly-populated city and especially if you use public transportation there, your chances of running into pickpocketers are going to be very high. Therefore, it’s a good idea to take some preemptive measures to battle this possibility. If your device is small (like a smartphone), try to keep it in an inside pocket, if possible. This way, you will make it almost unreachable to any thief. On the other hand, if your device is bigger (like a laptop) and you carry it around in a bag, be sure not to put the bag down in any circumstances. Hold it tightly so that no criminal can snatch it from your hands. 3.       Be prepared in case your device is stolen Sadly, no matter what precautions you take, there’s still a possibility that your device may be stolen. It only takes a criminal one lucky attempt to do so while you have to succeed in protecting yourself constantly. This is why you need to have a plan B. Set up a screen locker for your smartphone. Ideally, it should be done with a password because those are the hardest to crack but it comes at a price of having to enter it every time you need to access your smartphone. However, in the unfortunate event if your device does get stolen, the perpetrators won’t be able to access it and your personal information. Another option is setting up a biometric authentication procedure to unlock your phone. In most cases, using your fingerprint is the most convenient route to take. Similarly, your other devices should also be
Envoyé Oui
Condensat “with able about access account actor add additional advice airport all allow allows almost also alternatively ancestors another antivirus any are around attempt authentication avoid bad bag banned battery battle because before benefits better between bigger biometric blocker blocking blog blogger both browsing business but cafĂ© called can card careful carry case cases censor chances changing charge charging choice circumstances citizens city civil clients comes complex compromised concern: connect constantly continent control convenience convenient cord could countries crack credit criminal critical customers: cybersecurity dangerous data data: date days depend device devices does doing don’t done down dream ease ease” easy eat email employed endangering enjoy enough enter enterprise environment especially even event every example factor find fingerprint first fixing follow following former free from get gets getting going good guard guest habits hacking hand hands hard harder hardest have having heavily high highly hold homes hotel hotspots hours however idea ideally image include increase incredible independent infected information injection inside internet involved isn’t it’s its jacking job journey juice just keep laptop latter law lead less like likely lives local locker low lucky make makes making malware manner many matter may means measures media mfa mfa’s mind mitigated mobility more most mouth much muddier multi need networks nevertheless not note:this nowadays obtain off offers often one only operating opinion oppressive option other out overestimate part password patching perfectly perpetrators personal phone physical pick pickpocketers piece pixabay plan pleasure pocket point populated positive possibility possible post posting precautions preemptive prepared price private problems procedure protect protected protecting protection providers public put quite reason regime released requires risk route running sadly safe safety same screen secret security security: see sensitive services set setting several should similar similarly simple simply skills small smartphone snatch social socket software some somehow sorts source: state station stations stay stealing steps stolen succeed such sufficient sure surfing system systems take taken takes taking techniques tell thanks then there’s therefore thief things think those though threat through tightly time tips today’s token traditional transfer transportation travel travelers traveling travelling treated trust try twice two type unfortunate unlock unreachable update updates usb use using valid very vulnerabilities want way ways what when whether which why widespread will won’t word world worthwhile written your yourself
Tags Malware Threat Patching Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: