Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/23/2018
08:00 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

8 Security Tips for a Hassle-Free Summer Vacation

It's easy to let your guard down when you're away. Hackers know that, too.
2 of 9

1. Make Use of a VPN
When people travel, they are more likely to use public networks at the airport and at familiar places, such as Starbucks or Panera Bread. Assuming your company has installed a corporate VPN program on your work computer, be sure to have the VPN enabled. If you are a sole proprietor and travel frequently for work, think about installing VPN software on your main work laptop.
Bottom line: Only access a public network with a VPN. When you are not using the network, turn off Wi-Fi, Bluetooth, and autoconnect.
Image Source: Shutterstock via Minerva Studio

1. Make Use of a VPN

When people travel, they are more likely to use public networks at the airport and at familiar places, such as Starbucks or Panera Bread. Assuming your company has installed a corporate VPN program on your work computer, be sure to have the VPN enabled. If you are a sole proprietor and travel frequently for work, think about installing VPN software on your main work laptop.

Bottom line: Only access a public network with a VPN. When you are not using the network, turn off Wi-Fi, Bluetooth, and autoconnect.

Image Source: Shutterstock via Minerva Studio

2 of 9
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Patrick Ciavolella
50%
50%
Patrick Ciavolella,
User Rank: Author
7/23/2018 | 8:26:06 AM
Basic items too often forgotten
Great read, and all very interesting items that are often forgotten when "vacation mode" kicks in.  Updating passwords, or simply change them before you leave and once you return in my case, is a great tactic that is almost never used by the general population.  Physical Security is a big item people often forget about.  Posts made on Social Media stating you are out of town and gone until a certain date open the door for home security and theft, but are almost never thought about in the moment.  
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/25/2018 | 11:31:53 PM
Re: Not just for vacations
@REISEN: You wouldn't believe how frequently people I barely know (if not strangers) send PDFs to me. Legitimate ones. But I refuse to open them without some sort of verification, because they should know better, period.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
6/25/2018 | 8:18:16 AM
Re: Not just for vacations
Public Wife is a danger of course but always more dangerous is the User accessing stupidly on the network, whether corporate protected or wide open pubic.  The basics are easy - never open attachments unless WELL known and verified.  Watch web browsing always.  Watch activity.  SCAN system upon boot always.  If suspect, shut down immed.  Sys restore if you want.  Simple, easy things. 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/23/2018 | 6:33:10 PM
Not just for vacations
These tips are important outside of the vacation context too. For my own part, I don't access public Wi-Fi period except in the rarest of circumstances with the least circumstantial risk.
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
The Flaw in Vulnerability Management: It's Time to Get Real
Jim Souders, Chief Executive Officer at Adaptiva,  8/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-18560
PUBLISHED: 2019-08-21
The content-audit plugin before 1.9.2 for WordPress has XSS.
CVE-2017-18565
PUBLISHED: 2019-08-21
The updater plugin before 1.35 for WordPress has multiple XSS issues.
CVE-2019-15110
PUBLISHED: 2019-08-21
The wp-front-end-profile plugin before 0.2.2 for WordPress has XSS.
CVE-2019-15111
PUBLISHED: 2019-08-21
The wp-front-end-profile plugin before 0.2.2 for WordPress has a privilege escalation issue.
CVE-2019-15112
PUBLISHED: 2019-08-21
The wp-slimstat plugin before 4.8.1 for WordPress has XSS.