Skip to content

Cyber Secure Traveling

Travelers rely on technology to enhance vacation and travel experiences including finding entertainment, lodging and dining, sharing photos online, and the many other benefits of being connected. As you embark upon your next adventure, increase your safety by following simple practices to keep your vacation plans free from cybercriminal meddling.  The information provided below is organized in pre-travel and on-the-go recommendations. Several items have reference to National Cybersecurity Alliance content for more details.  Additionally, resources from other organizations are also listed at the bottom of the article.


Traveling with Technology – Preparing

Password Protect Devices

Use a Cloud Based Password Manager

  • Risk: On device password vaults or cached passwords may be accessible if your device is lost.
  • Recommendation: Use a cloud password manager application to store your credentials.

Use Multi-Factor Authentication

  • Risk: A compromised password provides access, significantly increased when user name and passwords are reused.
  • Recommendations: Secure all your accounts, with multi-factor authentication (or MFA).  MFA greatly enhances your account and device security by adding an authentication layer prior to successful account or device access.

Update your software

  • Risk: Vulnerabilities exist in even the most carefully designed software which can be exploited by hackers.
  • Recommendations - Perform regular software updates on all of your devices.  Ensuring you have the latest software not only increases security, but you will also reduce frustrating updates while traveling
  • National Cybersecurity Alliance Information: Software Updates

Backup Data

  • Risk:  Having a single copy of your data on a lost stolen device, even if password protected, can significantly disrupt your life.  Additionally, if your device is compromised by a cyberattack, you may also lose access to files.
  • Recommendation: Perform regular device backups to protect against data loss due to a cyber attack, lost or broken device.  Traveling increases damage and loss likelihood.  Having a reliable and secure backup will enable you to retain your data and in many cases greatly expedite your new device configuration.

Traveling with Technology – On-the-Go

After you follow the cybersecurity recommended preparations, there are best practices you can follow while exploring to keep your devices, data and accounts safe.

Limit Device Connectivity Services

  • Risk: Connection technologies like wireless and bluetooth offer great convenience, but can also be used by malicious actors to attack your device.
  • Recommendation: Turn off wireless and Bluetooth when these features are not being used. 

Limit Public USB Power Stations for Devices

  • Risk: USB charging cables can transmit both power and data.  Hackers can attack your device while it is connected to a power source that they modified.  They may even have modified USB ports on power supplies in restaurants, hotels, airports, public transportation, and other locations.
  • Recommendations
    • Considering bringing along pre-charged battery banks.
    • Use USB 'data blocks' when charging your devices.  Available commercially, GW IT Security also provides free of charge USB-C and USB-A power cable data blocking devices to GW community members, contact infosec@gwu.edu for details.

Think Before Posting

Actively Manage Location Services

  • Risk: Location enhanced apps are extremely helpful for directions, but they can also expose your location in ways that you do not realize.  Additionally, see app permissions for more information on threats to your other data.
  • Recommendation: Disable location services for all apps which is a good everyday practice.  Selectively enable location services for specific apps once you understand how your data is used.

Use Secure Wi-Fi

  • Risk – unscrupulous individuals setup fraudulent WiFi / wireless access points (WAPs) are used to intercept your private communications and data.  In addition to sealing data, they may also successfully compromise your accounts and devices.
  • Recommendation – Don’t connect to public WiFi.  If you absolutely have no option try to use secure, password required access points (those that require a password).  Most importantly, limit your online activity to essential non confidential communications and do not access email or banking services. It is advisable to use virtual private networks (VPN) or your phone’s hotspot feature for more secure internet use.
  • National Cybersecurity Alliance Information: Public Computers and Wi-Fi 

International Travel Planning

In addition to the precautions noted previously, there are some additional considerations when traveling internationally. 

GW Global International Travel Resources 

GW IT Cybersecurity Guidelines 

GW IT provides additional information for faculty and staff on Cybersecurity Guidelines for International Travel. The following highlights will also be useful for all travelers.

  • Consider leaving mobile devices at home, unless absolutely needed.
  • Limit the data you take with you by leveraging GW Box for file storage.
  • If you are not traveling with a clean temporary mobile device, clear all of your browser history, cached passwords, filled forms, and any other local browsing data prior to travel.  
    • Use temporary loaner devices when possible. Equipment rental companies can provide many solutions.  GW Faculty and Staff should contact the GW IT Support Center for availability and additional information.
  • Configure your web browser(s) not to save passwords. This prevents login credentials from being saved in the browser cache. 
  • Install GW’s Virtual Private Network (VPN) before you go and consider having additional commercial VPN subscription(s) as a backup if there are difficulties connecting to your GW VPN account. VPN can help secure your communications and improve privacy when using untrustworthy networks.
  • As applicable, adjust your account access level to  to the lowest privilege level.
    • While traveling, do not use a local system administrator account (or account with administrator rights) as your primary user account. Using non-administrator accounts will help to prevent a large number of infections or compromises.

Traveling to High Cyber-Risk Countries

  • Some countries, such as China, Israel, and Russia, have restrictions on the import and use of encryption tools. If encryption cannot be used, it is recommended that no regulated or restricted data be stored on mobile devices when traveling to countries with these restrictions.
  • Depending on the destination, some VPN providers may be blocked. Do your research and prepare alternates (different subscriptions/services, downloaded and installed). 
  • In some countries, border control agents may request to view your device and will go through your messages, social media, photos, browsing history, and applications. If your political or lifestyle opinions are illegal in the country you are traveling to, take steps to remove apps, photos, or messages, or social media posts that may incriminate you before you cross the international borders. 

Additional Resources

 


unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and  Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


IT Support Questions? For IT support, please contact the Information Technology Support Center at 202-994-GWIT (4948), ithelp[@]gwu.edu, or visit ithelp.gwu.edu