HACKED

With the continued news reports of  data breaches of high profile businesses, most recently Target, Adobe, Lexis Nexis, and Apple, I thought I would provide you a few thoughts to add to your risk management “New Year’s resolutions” (I know you have them…). Since most of you know I travel quite frequently, both domestically and internationally, I use the wait time at airports, hotels, etc. to work.  I thought the article in the last issue of Executive Travel magazine is a good reminder to all of us on electronic “travel security” and how not to be duped by the growing sophistication of the hackers who prey on the weary business traveler.

First, I have to tell you, last year I got a Verizon “hot spot” providing (secure) 4G WiFi wherever we are allowing us to connect to up to 5 devices. Best investment I made! It’s terrific and I am actually using now to write this blog!

The recent article in Executive Travel Magazine raises the point that there is as much critical data on our phones and laptops as our office computers and, often, the security of those devices is “thinner” than the security for our offices and networks. Business travelers are carrying email, address books, and files on their mobile devices and laptops which significantly increases the threat of data breach.

The article also offers some simple but effective tips that can increase your mobile security and help prevent against events that will negatively impact your company’s Total Cost of Risk (TCoR):

  • Passcode protect your mobile devices – Ensure your phone, tablet and laptop require a passcode to login when locked.   Having your device “lock” after 5 or 10 minutes of being idle is good risk mitigation practice as well
  • Avoid public WiFi – Hackers can setup phony public hotspots and gain access to your data. If possible, use your own mobile hotspot or use the software available on most smartphones to convert your phone to a mobile hotspot
  • Never use a public computer – Stay away from checking company email, bank information, and accessing your company server from public  PCs in hotel business centers, coffee shops, etc…
  • Never leave a mobile device unattended – Lock mobile devices and laptops in the hotel room safe and don’t take your eyes off your device in public places
  • Implement Mobile Device Management (MDM) software – Having your mobile device enrolled on MDM software will allow your IT staff to remotely locate, and secure your mobile device. In addition, compliance to company best practices can be monitored via  MDM
  • Reevaluate what you travel with – The best security policy when traveling is not bringing critical devices and data with you

Data and network breaches can paralyze a business by causing significant financial and reputational damage.  With the world changing as rapidly as it is, taking a few minutes to examine your own personal data security, data best practices and updating your New Year’s resolution list is a good way to start 2014. Call me if you want to discuss or would like to speak to our IT Advisors on security measures that might be helpful to your Company.

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to our articles

blog posts form
Form Submission Response

Dear [field id="name"],

Thank you for subscribing to The ALS Group articles! We are so excited to have you on board and look forward to providing you with valuable insights, risk management advice, and industry news.

As a subscriber, you will be the first to receive our latest blog posts straight to your inbox. In addition to the blog content, we have a wealth of resources on our website that we believe will be useful to you.

If you have any questions or require any risk management advice, please contact Albert Sica, Managing Principal, at [email protected] or at 732-395-4251.

Thank you,

The ALS Group

Skip to content