Online Security for the Business Traveler -  Deborah Gonzalez

Online Security for the Business Traveler (eBook)

eBook Download: PDF | EPUB
2014 | 1. Auflage
88 Seiten
Elsevier Science (Verlag)
978-0-12-800201-8 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
13,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today's high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Each of these devices offers new levels of productivity and efficiency, but they also become the weak link in the security chain: if a device is lost or stolen during travel, the resulting data breach can put the business in danger of physical, financial, and reputational loss. Online Security for the Business Traveler provides an overview of this often overlooked problem, explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity. It is an essential reference guide for any travelling business person or security professional. - Chapters are organized by travel stages for easy reference, including planning, departure, arrival, and returning home - Touches on the latest technologies that today's business traveler is using - Uses case studies to highlight specific security issues and identify areas for improved risk mitigation

Deborah Gonzalez, Esq. is the founder of Law2sm, LLC, a legal consulting firm focusing on helping its clients navigate the legal issues relating to the new digital and social media world.Deborah graduated from New York Law School and is licensed to practice law in New York and Georgia.Deborah began her career in the corporate arena working in various positions in the information technology area - from network administrator to manager of the IS department for a top-6 CPA firm in New York City. During her tenure she managed day-to-day IT operations; designed and implemented IT-related training for employees, managers, and IT staff; developed policies and protocols for IT-corporate use; and monitored emerging trends for IT business strategies and management. Deborah used this foundation as a starting point with her legal practice, which is now transporting her beyond the Internet to the social space where the physical and digital dimensions of her clients co-exist and where she can leverage her legal expertise to their benefit. Deborah enjoys engaging with those around her - so social media is a natural fit. But it is her skill in being able to connect the dots to understand the next big paradigm shift in global communication and legal application that makes her a leader in social media and online law. Deborah serves as Chair of the GA Bar Association's Annual Program on Social Media and the Law and serves as a social media legal liaison for social media marketing companies and their clients.In addition, Deborah speaks on legal issues relating to intellectual property, social media and online legal trends and practices, and online risk management in various venues throughout the United States and abroad.Follow her on Twitter: @DGOnlineSec and @Law2sm, or visit www.managingonlinerisk.com or www.law2sm.com.
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today's high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Each of these devices offers new levels of productivity and efficiency, but they also become the weak link in the security chain: if a device is lost or stolen during travel, the resulting data breach can put the business in danger of physical, financial, and reputational loss. Online Security for the Business Traveler provides an overview of this often overlooked problem, explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity. It is an essential reference guide for any travelling business person or security professional. - Chapters are organized by travel stages for easy reference, including planning, departure, arrival, and returning home- Touches on the latest technologies that today's business traveler is using- Uses case studies to highlight specific security issues and identify areas for improved risk mitigation

Front Cover 1
Online Security for the Business Traveler 4
Copyright Page 5
Contents 6
About the Author 8
Online Resources 10
Introduction 12
1 Decision to Travel vs. Digital Alternatives 16
Benefits of Physical Travel 17
Negatives of Physical Travel 19
Cost 19
Time 21
The Green Argument 22
Well-Being 22
Safety and Security 23
Travel Security Plans 24
Corporate Travel Policy 25
Travel Risk Assessment 26
Travel Security Education 26
Digital Travel Alternatives 27
E-mail and Asynchronous Communication 28
Teleconferencing 29
Web Conferencing and Virtual Meetings 30
Mixed Reality 31
2 Planning, Logistics, and Security 34
Purchasing Online and Security 35
Organizing the Plan and Logistics 37
Warnings 38
Luggage and Security 42
Wearables and Security 43
3 Predeparture and Departure 46
Passports, Visas, Online, Oh My 47
Packing and Security 49
Preparing Devices for Secured Travel 50
Securing the Office When You Travel 50
TSA Security 51
Security Beyond the Airports 55
Terminal Security 56
Social Media, Travel, and Security 57
During the Flight Security 59
Travel Stress and Security 59
Airport and Travel Game Apps 60
4 Arrival and Duration 64
Arrivals, Customs, Border Crossings 65
Destination Transportation and Security 66
Hotels and Security 67
Wi-Fi and Public Computers 69
Duration and Data Security 70
Duration and Apps 70
Duration and Health 71
Duration and Staying Legal 73
Anti-Bribery and Anti-Corruption 73
Social Media and Government Censorship 73
The Traveler Tracked 74
Virtual Kidnapping 76
Security Apps for Women Travelers 77
5 Return to Home Base 82
Getting to the Airport on Time 83
Customs and Border Controls 83
Arrive Back in Home Country 84
Back to the Office 85
Follow-Up 86
The Future of Travel Security: Online and Off 87

Chapter 2

Planning, Logistics, and Security


This chapter focuses on planning, logistics, and security once the decision to travel has been made. Risks such as using online sites to purchase flights, acquiring security clothing and luggage, and downloading and using apps on your mobile devices will be explored.

Keywords


Travel purchase; travel plan; logistics; itinerary; organization; travel warnings; travel alerts; luggage; wearable technology; travel documents; passport; cultural norms; business norms; travel insurance; health insurance

No matter how you travel, it’s still you going.

—Jeff Goldblum1

The decision to travel has been made, and the authorization given. Now planning begins in earnest. Depending on your schedule and resources, this may be the least enjoyable part of the experience. Planning business travel can be tedious, time consuming, and frustrating. Online web sites and mobile apps often promise an easy, convenient, cost-conscious way to set your agenda. But buyer beware! Digital tools can lead to security and safety risks—from lost devices to socially engineered hacking attacks that target you and your data. A rule of thumb is to consider potential security risks you may face at each step in planning and finalizing your itinerary. Here’s something else to remember: If you are not the one planning the trip, review plans presented to you with security in mind. Better yet, discuss security with the person planning your trip before they begin making travel arrangements. This chapter discusses some of the risks of online travel purchasing, the protection certain apparel and luggage offer, and reliable online resources and apps that provide valuable information to assess and mitigate potential problems

Purchasing Online and Security


How many TV, radio, and Internet commercials bombard us daily touting online travel web sites, as a great way to obtain high-quality transportation and lodging at a fabulous price? Some of the more common and popular sites are (more can be seen in Table 2.1):

• Expedia http://www.expedia.com

• Kayak http://www.kayak.com

• Orbitz http://www.orbitz.com

• Priceline http://www.priceline.com

• Travelocity http://www.travelocity.com

Table 2.1

Travel Saving Apps and Web Sites

WhichAirline iOS & Android http://www.whichairline.com Free
Google Flight Explorer iOS & Android www.google.com/flights $3.99
ThePointsGuy.com Web site http://thepointsguy.com Free
Altimeter Web site http://appadvice.com/appguides/show/altimeter-elevation-apps Free
What’s App iOS & Android http://www.whatsapp.com Free
Google’s Field Trip iOS & Android https://play.google.com/store/apps/details?id=com.nianticproject.scout&hl=en Free
Hitlist iOS & Android/Facebook http://www.hitlistapp.com Free
Momondo iOS & Android/Facebook http://www.momondo.com Free

Each makes the same claim: the lowest price available for your desired destination and at your desired comfort or luxury level. Just put in your travel information and … voila! Suddenly you have lists to scroll through and select from. You even have the option of registering on the site, of saving the itinerary that you select, and returning to the site for additional statistics on your travel data, all neatly accumulated and formatted. But the data is also saved. At this point, a security-minded person should ask, saved where? This is an important question because you have no control of the security of the location where your data is saved (on the cloud, in a remote server). Access to that data (whether authorized or not) is also out of your control. You have to trust that these web sites have put into place appropriate security controls to protect your information—from financial information used to purchase travel services to personally identifiable information such as user IDs and passwords.

A few questions to ask before using one of these web sites:

1. Has your company authorized employees to use these sites for business travel? Or, does your company use a specific travel management company?

2. Does the web site adhere to PCI Data Security Standards (DSS) from the Security Standards Council? https://www.pcisecuritystandards.org/security_standards/

3. Does the web site have a secured portal for transactions, usually identified with a “https”?

4. Does the web site have security policies (sometimes found on their Terms of Use page)?

5. Does the web site have security disclaimers?

6. Has the web site been breached before?

Even though the travel web sites I listed relate to air travel, keep in mind that the same security concerns exist for any transportation web site—Amtrak (railroad), Greyhound (buses), Carnival Cruise lines (ships), etc. If you plan, book, and save purchases for travel or related items such as rentals for cars, bikes, canoes, etc., online, it is important to give careful consideration to security controls that may or may not exist.

Business travelers should also have the same security concerns about privacy and protection of personal and financial data when making lodging arrangements. There are a variety of web sites that provide information about hotel rooms, hotel direct web sites, or web sites that offer the option of being able to share a couch or room in a private home. These include:

• Airbnb https://www.airbnb.com

• Hotels.com http://www.hotels.com

• Trivago http://www.trivago.com

Security professionals emphasize the importance of strong passwords for travel accounts as a first step to protect yourself and your data. Strong passwords reduce the risk of a security breach because they include an unpredictable mix of symbols, numbers, and upper and lowercase letters. You can increase password strength by not sharing the password among your other accounts. In addition, using biometrics or two-factor verification that require additional information in order to access your account is also highly recommended. Another strategy is to create a temporary e-mail address and password to be used only for a particular instance of business travel and then terminate the e-mail and password once the travel is completed. You could also create an e-mail and password only for travel.

Organizing the Plan and Logistics


It’s been said that the only thing tougher than managing employee travel is handing out assigned parking spaces in the company lot.2

Purchasing services is just one step in business travel. Travel logistics communications such as tickets and lodging confirmations are usually electronic and tend to be distributed to the parties who need to know by electronic means such as e-mail or mobile apps. Organizing all the information about a trip in one location is a time management strategy that has security implications. An example is the iPhone’s Passport app. Just one of a wide collection of travel-related apps, Passport “keeps things like airline boarding passes, movie tickets, and gift cards all in one place, letting you scan your iPhone or iPod touch to check-in for a flight, get into a movie, redeem a coupon, and more.3Table 2.2 lists some others.

Table 2.2

Travel Itinerary and Organization Apps

TripIt iOS & Android https://www.tripit.com Free
TripCase iOS & Android http://travel.tripcase.com Free
WorldMate iOS & Android https://www.worldmate.com $3.99
GateGuru iOS & Android http://www.gateguru.com Free
Awesome Note iPhone http://www.bridworks.com/anote/eng/ $3.99

Having all of the information about a business trip in one place is convenient but also provides a hacker with a one-stop shop. When you couple this reality with the ubiquitous use of mobile devices, it’s easy to understand why corporate risk management is placing growing importance on mobile security.

Critical security questions to consider regarding apps and mobile devices before taking a business trip include:

1. Does your company have a policy for mobile security?

2. Does your company have lists of approved and/or prohibited apps?

3. Does your company...

Erscheint lt. Verlag 23.8.2014
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Wirtschaft Betriebswirtschaft / Management Wirtschaftsinformatik
ISBN-10 0-12-800201-8 / 0128002018
ISBN-13 978-0-12-800201-8 / 9780128002018
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 2,0 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 2,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
39,92