Cybersecurity While Traveling

Essential Security Practices While Traveling For Work or Leisure
Clark Hartsock | Public Health Institute | 21 October 2025
1
PUBLIC HEALTH INSTITUTE

Why Cybersecurity Matters

Public health organizations handle sensitive data that could affect communities worldwide. When we work remotely or travel, we become targets for cybercriminals seeking to access health data, research findings, and organizational systems. On a personal level, travelers carry banking information, family photos, personal communications, and digital access to their entire financial and social lives on devices that become prime targets for identity theft, financial fraud, and privacy violations when security is compromised.
2
PUBLIC HEALTH INSTITUTE

The Cybersecurity Foundation: CIA Triad

C

Confidentiality

Ensuring sensitive health data and research remains accessible only to authorized individuals

I

Integrity

Maintaining the accuracy and reliability of data throughout its lifecycle

A

Availability

Ensuring systems and data are accessible when needed for public health operations

3

Device Preparation

Securing your devices before departure
4
PUBLIC HEALTH INSTITUTE

Prepare Your Devices

Update all devices before traveling
Updated devices have the latest security patches that protect against recently discovered vulnerabilities. Travelers are common targets, so having current security protections is essential.
Enable automatic screen locks with short timeout periods
Travel environments are unpredictable and devices get left unattended more frequently. Shorter lock timeouts ensure your device locks quickly if you're distracted.
Back up important data and verify backups work
Devices are more likely to be lost, stolen, or damaged while traveling. Having recent backups ensures you can continue working and don't lose critical information.
5
PUBLIC HEALTH INSTITUTE

Device Security Essentials

Remove unnecessary sensitive files from travel devices
Only carry the data you actually need for your trip. If your device is compromised or stolen, limiting the sensitive information reduces the potential damage to you or PHI.
Enable remote wipe capabilities on all devices
If your device is stolen, remote wipe allows you to delete all data from anywhere in the world. This prevents thieves from accessing your information and company data.
6

Wi-Fi and Network Security

Protecting your connections safely
7
PUBLIC HEALTH INSTITUTE

Secure Network Connections

Avoid public "Free" Wi-Fi for sensitive activities
Public Wi-Fi networks in airports, hotels, and cafes are favorite hunting grounds for cybercriminals and are easily spoofed. These networks are also often unencrypted and monitored by attackers looking to steal credentials and data.
Use your phone's mobile hotspot instead of public Wi-Fi
Your cellular connection is much more secure than public Wi-Fi. Using your phone as a hotspot gives you a private, encrypted connection for your laptop and other devices.
Always use a VPN when possible
VPNs encrypt all your internet traffic, making it unreadable even if someone is monitoring the network. This is your best defense against network-based attacks while traveling.
8
PUBLIC HEALTH INSTITUTE

Network Safety Practices

Verify Wi-Fi network names with hotel staff
Criminals often set up fake Wi-Fi networks with names like "Hotel_Guest_WiFi" to trick travelers. Always confirm the legitimate network name and password with official staff.
Turn off Wi-Fi auto-connect and Bluetooth when not using them
Auto-connect features can join your device to malicious networks without your knowledge. Disabling these features gives you control over which networks and devices you connect to.
9

Physical Security

Protecting your devices from theft and damage.
10
PUBLIC HEALTH INSTITUTE

Physical Device Protection

Never leave devices unattended
Dishonest people and criminals target unattended electronics. Devices left in cars are particularly vulnerable to theft, and hotel rooms aren't as secure as they appear.
Use hotel safes for backup devices and sensitive documents
While not foolproof, hotel safes provide better security than leaving items in plain sight. Store backup phones, extra laptops, and important documents in the safe when not needed.
Be cautious when charging devices in public areas
USB charging ports in airports and hotels can be compromised with malware that installs when you plug in - or even electrically damage your device. Use your own wall charger or a USB data blocker to prevent data transfer while charging.
11
PUBLIC HEALTH INSTITUTE

Workspace Security

Keep devices with you during security screening
Airport security areas are common places for device theft. Keep your devices visible and retrieve them immediately after screening to prevent theft or tampering.
Use privacy screens in public spaces
Shoulder surfing is common in airports, planes, and hotel lobbies. Privacy screens prevent others from reading your emails, documents, or seeing passwords you enter.
12

Communication Security

Securing your conversations and data sharing
13
PUBLIC HEALTH INSTITUTE

Secure Communication Practices

Avoid discussing sensitive business or travel plans in public areas
Conversations can be overheard by bad actors and we often let our guard down while travelling. Save confidential discussions for private, secure locations.
Be cautious with hotel business centers and public computers
These computers may have keyloggers or malware installed to capture your passwords and data. If you must use them, never access sensitive accounts or enter important passwords.
Use secure messaging apps for sensitive communications
SMS messages can be intercepted, especially when roaming internationally. Apps like Signal or WhatsApp provide end-to-end encryption that protects your messages from interception.
14
PUBLIC HEALTH INSTITUTE

Social Media and Information Sharing

Limit social media posting about travel plans and location
Real-time location sharing alerts criminals that you're away from home and reveals your travel patterns. Post photos and updates after you return home instead of during your trip.
15

International Travel Considerations

Special precautions while abroad
16
PUBLIC HEALTH INSTITUTE

International Travel Security

Research destination country's cyber laws
Some countries have laws requiring you to provide device access to border officials, while others are known for sophisticated cyber surveillance. Understanding these risks helps you prepare appropriately.
Bring minimal devices to high-risk locations
Bringing dedicated travel devices with minimal data reduces your risk exposure in countries with aggressive cyber surveillance or where device inspection is common.
17
PUBLIC HEALTH INSTITUTE

Key Takeaways for PHI Staff

Before You Go

Update devices, back up data, remove unnecessary files, and enable remote wipe capabilities.

Network Safety

Use mobile hotspots or VPNs instead of public Wi-Fi for any sensitive/private activities.

Physical Security

Never leave devices unattended and use privacy screens when in public spaces.

Communication

Use secure messaging apps and avoid discussing sensitive information in public areas.

18

Remember


Travelers are high-value targets for cybercriminals.
Taking these precautions helps protect both your personal information and PHI's sensitive public health data.
19
PUBLIC HEALTH INSTITUTE

Thank You

Questions? Contact Central IT (ithelp@phi.org) or visit PHI's area on Inside PHI (inside.phi.org).
20