Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Traveler tips: How to avoid being hacked overseas
Thursday - 1/31/2013, 2:57pm EST
WASHINGTON (AP) - Some tips to help business travelers protect their laptops and mobile devices from spying _ or at least limit the damage of hacking _ while in China or other nations that may want to steal company information:
_Don't take your work or personal laptop. That's the best advice and a precaution used by major companies and agencies of the federal government, said Anup Ghosh, chief financial officer of Invincea, a software security company in Fairfax, Va. Instead, some employers issue traveling laptops that are clean of proprietary corporate or government information and are scrubbed clean after the employee returns from the trip.
_Don't think you can just keep your eye on your equipment. Data can be captured while the laptop is in customs or if you step away from your hotel room briefly. "It takes five minutes or less to capture information from the laptop," Ghosh said. Lock it in a hotel safe. Use an encrypted drive.
_Get a traveling phone as well, such as a pay-per-use phone. If you take your phone, it should be reimaged on return. Use your screen password on your mobile device so if you lose it, no one can pick it up and read your email or other data.
_Be aware of the risk, once in-country, of connecting to public networks. Wireless networks in hotels and coffee shops, for instance, are often compromised and malicious codes can be downloaded into your machine, Ghosh said. Even if you leave home with a clean laptop and it's wiped clean after the trip, someone can still capture what you're typing in emails or your credentials when you're entering them during the trip. Not much can be done about that _ it's just a risk you have to be aware of so you are careful to avoid activities such as logging into your bank to do financial transactions, he said.
_Travel aside, your company should also routinely take steps to limit the types of applications that can run on their systems, regularly update computer programs, and tightly control the number of people who have broad access privileges to the company networks, said Alan Paller, director of research at SANS Institute, a computer-security organization.
(Copyright 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.)