We are all dependent on portable devices for our work and our social lives.
Using them in public settings, especially airports, planes and trains provides the perfect opportunity for criminals to access your information – and they don’t even need your passwords. Recent trips of mine have confirmed how the best cyber security arrangements count for once employees leave their taxis and enter airports to get on planes.
As restrictions are starting to relax, we are seeing commuting for both work and personal reasons start to increase again. After two years of working from home, people are seizing the opportunity for face-to-face meetings with clients, peers and employees.
Working from home has seen its own privacy challenges with more people using their own networks and devices that are typically outside the company’s firewall. We saw an increased number of fraudulent activities from identity theft, hacking accounts and phishing – the list goes on.
The restart of business travel brings with it the privacy challenges of using portable devices on the move.
It is important to know the modus operandi for how perpetrators access your information.
Information theft usually occurs out of sight. It will happen outside of your peripheral view. Due to most people’s lack of interest in the environment around them, for example on a plane, they can be particularly vulnerable.
As soon as businesspeople start traveling, perpetrators have easier access to you and the information you are carrying.
One method is via social engineering (malicious activities accomplished through human interactions) and another is from observing your screen and perhaps utilising some type of surveillance method (video, imagery, eavesdropping).
Follow Mario Bekes Here:
Mario Bekes – Web Site
Mario Bekes – LinkedIn
Mario Bekes – YouTube
Mario Bekes – Instagram
Mario Bekes – radio talk show “Business Insights”
Mario Bekes – Books
Purchase “Blood-Soaked Soil” latest book