{"id":17593,"date":"2017-04-12T05:00:38","date_gmt":"2017-04-12T12:00:38","guid":{"rendered":"http:\/\/www.yardi.com\/blog\/?p=17593"},"modified":"2020-12-24T22:12:13","modified_gmt":"2020-12-25T06:12:13","slug":"protected-portability","status":"publish","type":"post","link":"https:\/\/www.yardi.com\/blog\/protected-portability\/","title":{"rendered":"Travel Tech"},"content":{"rendered":"<p>For many international business travelers, crossing a border means more than just a<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-17597\" src=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/03\/shutterstock_97354238-300x200.jpg\" alt=\"shutterstock_97354238\" width=\"362\" height=\"241\" \/> stamp in their passport. It\u00a0also means\u00a0making sure cell phones and laptops stay secure. Whether it\u2019s an intrusion from foreign hackers or the evermore-invasive surveillance of customs officials, protecting sensitive data \u2013 both personal and business \u2013 has never been more complicated. As a result, more and more jet-setting corporate employees are making sure to secure their devices before their trip and while on the move.<\/p>\n<p>\u201cAlthough mobile devices can facilitate connecting back to headquarters and maintaining workflow, the risk for exploitation of these devices and the information accessed can greatly increase on overseas travel,\u201d warns the US Department of State Overseas Security Advisory Council (OSAC).<\/p>\n<p><strong>Before Departure<\/strong><\/p>\n<p>The OSAC\u2019s best practices guide for traveling with mobile devices suggests several steps business travelers should take before stepping out the front door. As a matter of course, all nonessential devices should simply be left at home. Data can also be kept local through a backup on an external hard drive or a secure cloud-based service.<\/p>\n<p>For travelling devices, it\u2019s important to make sure all software and apps are up-to-date. That means upgrading passwords with stronger variables and initiating file encryption with tools provided by BitLocker, TrueCrypt or Apple Firevault. Bluetooth and GPS should also be disabled and available firewalls enacted.<\/p>\n<p><strong>During Travel<\/strong><\/p>\n<p>Once you\u2019re on the road, there are plenty of ways for your device to be compromised. In addition to maintaining physical control whenever possible, the best way to protect your device in transit is to power down before entering customs. As an added step, <a href=\"https:\/\/www.wired.com\/2017\/02\/guide-getting-past-customs-digital-privacy-intact\/\" target=\"_blank\" rel=\"noopener\">Wired<\/a> recommends disabling any biometric access \u2013 like Apple\u2019s TouchID \u2013 and sticking to PIN accessibility.<\/p>\n<p>It\u2019s good practice to disable automatic Wi-Fi connections and use a VPN. Public Wi-Fi networks should be avoided, along with unfamiliar websites. File-sharing options and unknown apps and devices should also be shunned. Free apps in particular can often be loaded with malware programmed to collect information or allow third-party access to your data. Apps may ask for additional permissions, a common tactic used by cybercriminals to bypass native security. For example, the GPS and locational services not only track your whereabouts, they can also be used to launch location-based attacks.<\/p>\n<p>It\u2019s worth noting that device security involves more than just online interference. As the OCAS report points out, in worst case scenarios, this location information can be exploited for kidnapping and extortion purposes.<\/p>\n<p>As a matter of course, travelers should avoid clicking on links included in text or email unless you specifically asked for the information, as email addresses and phone numbers can be spoofed by third parties hoping to gain access to your device. Finally, passwords should never default to \u201cremember me\u201d on any online accounts or apps like Facebook and Dropbox which provide easy access to criminals and government officials of detailed personal information.<\/p>\n<p>\u201cSo many of the common functions that make mobile phones user-friendly are the same functions used by malicious actors to exploit them,\u201d states the OCAS report.<\/p>\n<p>\u201cBetter understanding of the risks to these every-day mobile features can help employees use their phones more safely and effectively while aboard.\u201d<\/p>\n<p><strong>After the Trip<\/strong><\/p>\n<p>If you suspect your device has been compromised, the first step upon your return is to change all your passwords and scan your device for malware. Never plug your device into personal or business networks until you ensure your system has not been compromised. According to OCAS, some of the common signs that a device has been hacked include latency, a frequently drained battery, increased data usage, and appearing or disappearing apps. Though these issues may be typical to international service providers, if the issues continue once you\u2019ve returned home, it\u2019s time to consider the possibility you\u2019ve been hacked.<\/p>\n<p>If you suspect there has been an intrusion, a remote-swipe of the device is probably your best option. Intended to allow users to remotely erase sensitive data from lost or stolen devices, remote-swipe works like a \u201cvirtual kill switch.\u201d If the phone is turned off (either on purpose or due to a dead battery), isn\u2019t within range of a cell tower or has had its network connections disabled, a remote-swipe may not be possible. Nevertheless, this extreme solution can allow employees and businesses mitigate some of the damage if the device is compromised.<\/p>\n<p><strong>What Companies Can Do<\/strong><\/p>\n<p>While employees provide the first line of defense against mobile-device hacking, OCAS identifies several best practices employers to secure sensitive business data. Providing loaner phones and laptops allows employers to silo important critical information. According to OCAS, only 31 percent\u00a0of employers surveyed for the report currently provide loaner devices for overseas travel. Additionally, only 41 percent\u00a0of employees use separate devices for work and personal use. With IP theft costing the US private sector upwards of <a href=\"http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-economic-impact-cybercrime2.pdf\" target=\"_blank\" rel=\"noopener\">$250 billion<\/a> annually, a $300 smart phone or $1000 laptop seems like a bargain.<\/p>\n<p>With loaner devices, the lack of long-term storage limits access to only the specific needed for the trip, instead of opening to the door to the company\u2019s archives to prying eyes. Additionally, loaner devices make remote wiping and resets easy and efficient without the risk of deleting an employee\u2019s personal information.<\/p>\n<p>For employees, loaner devices work best if no personal data is included \u2013 that means making sure to avoid linking personal social media accounts or even enabling iTunes or iCloud. Even\u00a0using a Kindle reader app could make your Amazon accounts vulnerable to third-party infiltration.<\/p>\n<p>Another option does away with local data storage altogether. Using SaaS allows employees to access sensitive data through an app rather than store it on their device. While accessing files through a browser comes with its own set of security concerns, the SAAS model guarantees important files won\u2019t go missing along with that stolen laptop or hacked cell phone.<\/p>\n<p>Ultimately, the strongest protection requires a partnership between companies and their employees. As Evan Tomlin, Vice President of Mobile Strategy at Tangoe, <a href=\"http:\/\/www.nojitter.com\/post\/240172381\/6-best-practices-for-ensuring-enterprise-mobile-device-security\" target=\"_blank\" rel=\"noopener\">explains<\/a>, \u201cSecurity is one of the highest priorities in life, business, and government, but a common perception is that responsibility lies elsewhere.\u201d<\/p>\n<p>\u201cSecurity should be a shared effort in the business environment,\u201d he concludes, \u201cbut all too often companies design and build solutions in response to security &#8220;theater,&#8221; rather than addressing practical use cases with realistic solutions.\u201d<\/p>\n<p>\u201cSecurity is a balance among pragmatism, usability, and business requirements. If you don&#8217;t achieve balance, your policy is in jeopardy.\u201d<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As custom officials demand expanded access and hackers improve their tactics, international business travelers are racing to protect their devices.<\/p>\n","protected":false},"author":103,"featured_media":17597,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_s2mail":"yes","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[1640,99,1907,320,1908],"class_list":["post-17593","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-cybersecurity","tag-data-security","tag-international-travel","tag-phone-security","tag-security-best-practices"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Yardi Blog<\/title>\n<meta name=\"description\" content=\"As custom officials demand expanded access and hackers improve their tactics, international business travelers are racing to protect their devices.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Travel Tech\" \/>\n<meta property=\"og:description\" content=\"As custom officials demand expanded access and hackers improve their tactics, international business travelers are racing to protect their devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yardi.com\/blog\/protected-portability\/\" \/>\n<meta property=\"og:site_name\" content=\"Yardi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-12T12:00:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-25T06:12:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/03\/shutterstock_97354238.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cutright Elizabeth\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cutright Elizabeth\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yardi.com\/blog\/protected-portability\/\",\"url\":\"https:\/\/www.yardi.com\/blog\/protected-portability\/\",\"name\":\"Travel Tech - Yardi Corporate Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/protected-portability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/protected-portability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/03\/shutterstock_97354238.jpg\",\"datePublished\":\"2017-04-12T12:00:38+00:00\",\"dateModified\":\"2020-12-25T06:12:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d\"},\"description\":\"As custom officials demand expanded access and hackers improve their tactics, international business travelers are racing to protect their devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/protected-portability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yardi.com\/blog\/protected-portability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/protected-portability\/#primaryimage\",\"url\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/03\/shutterstock_97354238.jpg\",\"contentUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/03\/shutterstock_97354238.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yardi.com\/blog\/protected-portability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yardi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Travel Tech\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\",\"url\":\"https:\/\/www.yardi.com\/blog\/\",\"name\":\"Yardi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yardi.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d\",\"name\":\"Cutright Elizabeth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g\",\"caption\":\"Cutright Elizabeth\"},\"description\":\"Elizabeth Cutright is an award-winning writer and editor with over 20 years of experience in journalism, publishing and online content creation. A film school grad with a law degree from the University of San Diego, outside of work Elizabeth can usually be found in the pool, on a hiking trail, or sampling Santa Barbara\u2019s latest vintage.\",\"url\":\"https:\/\/www.yardi.com\/blog\/author\/elizabeth-cutright-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Yardi Blog","description":"As custom officials demand expanded access and hackers improve their tactics, international business travelers are racing to protect their devices.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Travel Tech","og_description":"As custom officials demand expanded access and hackers improve their tactics, international business travelers are racing to protect their devices.","og_url":"https:\/\/www.yardi.com\/blog\/protected-portability\/","og_site_name":"Yardi Blog","article_published_time":"2017-04-12T12:00:38+00:00","article_modified_time":"2020-12-25T06:12:13+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/03\/shutterstock_97354238.jpg","type":"image\/jpeg"}],"author":"Cutright Elizabeth","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cutright Elizabeth","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yardi.com\/blog\/protected-portability\/","url":"https:\/\/www.yardi.com\/blog\/protected-portability\/","name":"Travel Tech - Yardi Corporate Blog","isPartOf":{"@id":"https:\/\/www.yardi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yardi.com\/blog\/protected-portability\/#primaryimage"},"image":{"@id":"https:\/\/www.yardi.com\/blog\/protected-portability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/03\/shutterstock_97354238.jpg","datePublished":"2017-04-12T12:00:38+00:00","dateModified":"2020-12-25T06:12:13+00:00","author":{"@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d"},"description":"As custom officials demand expanded access and hackers improve their tactics, international business travelers are racing to protect their devices.","breadcrumb":{"@id":"https:\/\/www.yardi.com\/blog\/protected-portability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yardi.com\/blog\/protected-portability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/protected-portability\/#primaryimage","url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/03\/shutterstock_97354238.jpg","contentUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/03\/shutterstock_97354238.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.yardi.com\/blog\/protected-portability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yardi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Travel Tech"}]},{"@type":"WebSite","@id":"https:\/\/www.yardi.com\/blog\/#website","url":"https:\/\/www.yardi.com\/blog\/","name":"Yardi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yardi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d","name":"Cutright Elizabeth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g","caption":"Cutright Elizabeth"},"description":"Elizabeth Cutright is an award-winning writer and editor with over 20 years of experience in journalism, publishing and online content creation. A film school grad with a law degree from the University of San Diego, outside of work Elizabeth can usually be found in the pool, on a hiking trail, or sampling Santa Barbara\u2019s latest vintage.","url":"https:\/\/www.yardi.com\/blog\/author\/elizabeth-cutright-2\/"}]}},"jetpack_featured_media_url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/03\/shutterstock_97354238.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/17593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/users\/103"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/comments?post=17593"}],"version-history":[{"count":8,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/17593\/revisions"}],"predecessor-version":[{"id":27701,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/17593\/revisions\/27701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media\/17597"}],"wp:attachment":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media?parent=17593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/categories?post=17593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/tags?post=17593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}