Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Ask The Experts

10:00 AM
Kurtis Minder
Kurtis Minder
Ask the Experts
Connect Directly

Should I Have a Security Travel Policy to Protect Devices and Sensitive Data?

Mobile devices are lost or hacked while in transit far too frequently. Here are some steps to protect your business.

Question: Should I have a security travel policy to protect devices and sensitive data, particularly when our staff are crossing international borders?

Kurtis Minder, CEO of GroupSense: Absolutely, unless you don't mind constantly losing those devices. According to a Ponemon Institute and Dell study, 12,000 laptops are lost each year in airports alone. Laptops, mobile phones, and other devices are also frequently left in cabs, bars, ballparks — you name it. And the passwords people use on their laptops are easily cracked because most people use the same passwords across multiple accounts, so some simple credential stuffing will give bad people access to your system. We saw this happen when Disney+ launched, and the same approach can be used to gain access to your laptop and all of the systems and accounts on it.

What should a travel policy include? First of all, rigid requirements around disk encryption, VPN use, and secure communications (encrypted messaging, calling, etc.) should be standard for international travel. Further, for some countries, policy may dictate that corporate devices or devices containing corporate or client information cannot be taken. In this case, the company may offer "burner" devices specially configured for the team member and the trip mission.

Related Content:


Kurtis Minder is the co-founder and CEO of GroupSense, an enterprise digital risk protection company. He is also a frequent contributor to the start-up community and serves as an advisor and mentor to growing companies. He arrived at GroupSense after more than 20 years in ... View Full Bio


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Building Cybersecurity Strategies in Sub-Saharan Africa

Filmed for Dark Reading News Desk at Black Hat Virtual.

LAURA TICH: We have that imbalance, where the big organizations are more protected, where the smaller ones -- which are the most common businesses in the region -- they are least protected... Sometimes they do get the tools, they do get the funding to buy some critical tools, but there's a lack of skills to handle or people who understand how to work those tools. So there are a lot of factors that contribute to our growth -- or lack thereof -- in the cybersecurity industry.


Name That Toon: 'Rise' and Shine
Flash Poll