Travels and holidays: cyber-security for you and your devices

Travels and holidays: cyber-security for you and your devices

Picture the scene: it’s august, we are locked and loaded, excited and full of desire of travelling and enjoying our deserved vacations. Yet there is a lurking danger that we do not always consider and that we often forget about: computer security for our devices and us.

The need of connection to social networks and, generally, to the web makes us lose sight of the importance of privacy by underestimating the meaning of a safe travel.

Whatever the destination is, the importance is to connect to smartphones or tablets to verify: flights, departures, city maps, check-in of the accommodation, social networks’ stories and you name it.

This is how our attention falters a little and we tend to focus on other things. Travelling safely is possible with little and simple precautions.

That’s why we have drafted a little funny list of advices on how to monitor computer security for you and your devices.

THE PASSCODE, I.E., YOU SHALL NOT PASS!

It may be old-fashioned, but the dear old pass-code (if it is well wondered and it is not your date of birth) can make a cybercriminal on duty stop wanting to lose time decoding it to withdraw your sensitive information from your smartphone.

APP AND USEFUL SERVICES, I.E., I WILL FIND YOU

It may seem useless, but still we advise you to take in consideration the idea of using Find my iPhone services for iPad, in addition to iPhone. If you have and Android you can choose Device Manager.

CREATE MORE PROTECTION LAYERS, I.E., 50 SHADES OF CYBERSECURITY

Update your devices to implement their security: an outdated and lacking in appropriate antivirus system is fallacious and an easy prey to cybercriminals. You should implement the authentication on two factors to add one more step to log in.  Deactivate the options of geolocation of your apps: connecting to many different networks leaves a trail of precious information. Close the hotspot access of your smartphone. Choose the use of a VPN and avoid networks that don’t need a passcode to enter.

PUBLIC COMPUTERS, I.E., REAR WINDOW (OF YOUR INBOX AND YOUR C/C)

Let’s be realists: it is cool to connect from info points and public computers; we do it in a casual, practical and quick way. It is so fast that we forget to logout from inbox and social networks’ windows. Not to mention the malwares that can spy the user like keylogger, capable of registering everything you tape, even your access password to your online bank account.

It’s great to travel, to live experiences and sometimes the unforeseen, better if they don’t regard our cybersecurity and our devices’.

RELATE POSTS

Enter your keyword