Summer Travel Cyber Security Tips For Government Employees
Vacationing as a government employee brings special security concerns. Follow these precautions to protect your devices and data on the beach and beyond.
Government Data + Maps: 10 Great Examples
(Click image for larger view and slideshow.)
Vacation season is in full swing and so are hackers looking for opportunities to pounce when you're relaxed and your guard is down, especially if as a government employee you might possess extra-valuable information.
The cyber risks begin even before you leave for vacation. Don't be one of those people who announces his travel plans on social media. This information is easily accessed by malicious users hoping to break into your home or work systems to gain access to proprietary and confidential information via remote systems while you are away. This is particularly true for government employees whose systems might be dormant or used by others in their absence.
Resisting the urge to share your travel plans via social media is just the first step in mitigating cyber security risks. Here are some additional tips for government employees who are hitting the road for some needed downtime:
When planning a vacation, you should only use websites of known companies. Unfamiliar discount websites can be malicious sites set up to infect you and steal confidential and classified data. Using unknown sites and applications, especially while at work, can hurt the security and performance of governmental systems.
Never click on links or attachments containing coupons or discounts in emails received from a travel companies or other marketers. Phishing emails contain viruses or redirect you to sites in order to get IDs and passwords. Governmental organizations and agencies are favorite phishing targets. Instead, you should go directly to the website to review promotions and offers.
When logging into a website with a user ID and password, make sure it's an "HTTPS" site. Never enter any personal information, especially credit card data, into a website whose URL starts with "HTTP" because it's not as secure. Instead use a payment company or service such as PayPal, Amazon, or Google. Services do not pass your financial information but instead take the payment and transfer money from their systems, protecting your data. Governmental organizations might also provide purchasing cards or purchase orders for authorized travel.
Notify your credit card companies of your travel dates and locations so they can watch for unauthorized activity and alert you of any usage outside of your travel areas. You should also set up multi-form factor authentication on your accounts. This will send separate emails or
Security Job #1 For FedsThe 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - itís rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of October 9, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."