It is difficult to manage without your computer, tablet and phone and therefore we often bring 2-3 devices on a trip. We all need access to our documents and data more than ever before when we are abroad on a business trip.
It is therefore important that you also include your digital security in your risk assessment when planning a trip. Digital threats, by their very nature, rarely recognize national borders, but once you're on your way, you're more exposed than usual.
Both when we are out and at home, we face an increasing threat from cybercrime. The masterminds behind cybercrime are gaining access to ever greater resources, while their methods are becoming ever more sophisticated. In addition, political and economic cyber-espionage can be a relevant threat for someone, and new phenomena such as cyber-harassment and cyber-terrorism have appeared (however, the threat from the latter is assessed as not present in Denmark by the Center for Cyber Security at the Defense Intelligence Service).
One of the biggest threats to organizations' digital security today is the behavior of employees. The participants on our travel safety trainings seem to be very aware that they themselves can be one of the weak links in the chain, especially when they travel abroad. Therefore, we see an increasing demand for knowledge about digital travel security: How should I handle IT security on my computer and smartphone when I take it out into the big world?
Travel&Risk has a close collaboration with the experts on digital security, which is why we can deliver the latest knowledge in the field and translate it into concrete, practical behavior before, during and after the trip. The Cybernauts have a vision for digital travel safety that is close to our general starting point at Travel&Risk: What you learn, has to be very close to your practice, so that it leads to concrete changes in your behavior. If it becomes too complicated or resource-intensive to secure yourself digitally on the journey, then you simply won't do it.
Phishing means using various psychological tricks to deceive the victim by means of a false message. Many people can easily recognize the simple phishing attacks that almost everyone is exposed to: Criminals try to lure you into submitting usernames, passwords etc. to fake websites. But phishing attacks can be so sophisticated and targeted that they can be difficult to recognize and protect against.
Phishing attacks primarily use psychological vulnerabilities to achieve their goals. Part of the defense against them is therefore also a resilience against the stress, which they use, among other things, to bypass our common sense, and which can be more acute when traveling in remote areas. Travel&Risk consider stress management to be an important subject in almost any travel safety training.
Typically, both your computer, your phone and your online profiles are protected by passwords. Although the number has fallen from more than half in 2015, 38 percent of the Danish population still use the same password on several online services, according to a study by Statistics Denmark in 2022. Do you?
Did you know that there are huge databases on the web with billions of passwords from hacked online services? So if you've used your favorite password on a platform that's been hacked, it's probably in an online database accessible to cybercriminals. You can check on the website https://haveibeenpwned.com whether your password might be part of a leak.
We often use so many services today that it is impossible to remember separate passwords for everything. That is why it is smart to use a password manager. It is a simple program that stores individual passwords for each service you use, while you yourself only have to remember a single password, namely the one for your password manager, which stores your passwords safely and encrypted, so that you do not have to remember everything. There are many password managers to choose from. The Cybernauts recommend the 1password service.
Individual needs and risks will always vary, but we have asked the Cybernauts to put together a to-do list with the most important, general advice on what you should do before, during and after the trip:
How do I prepare my digital devices before the trip?
How do I secure myself digitally on the journey?
What should I do when I get home?
At a minimum, you should do the following:
If you want to know more about how to keep intruders away from your data and use secure passwords, send us an email and we will try to help you.