“A Travelers Guide To Protecting Your Data”

  • 0

“A Travelers Guide To Protecting Your Data”

Dear Blast Readers,


When you hear the word “summer”, what is the first thing you think of? Vacation? Travel? Did you know that most people wont leave home without their smartphones, tablets, and/or computers? Have you ever wondered how traveling can compromise your digital security?


People tend to think of vacations as a time to get away and un-plug from the world, both the digital world and physical world. But, it is not realistic to believe that you will NEVER go online while traveling. Yes, it is fun to post pictures and status updates on your social media accounts in real time. But, did you know that by doing so, there is a possibility you are opening yourself, and your digital devices, to cyber criminals?


When traveling, public Wi-Fi might seem like a great thing. It allows you to check your email, work, and post updates to your social media accounts. But, as convent as it is, connecting to public Wi-Fi can also be dangerous. Cyber Criminals can take over public networks, and logging onto a corrupted network allows cyber criminals access to your:

  • Personal details
  • Credit card numbers
  • Passwords


The data that you, as a traveler, bring wherever you go is valuable and desired. It is important that while traveling you do everything in your power to keep your digital information safely out of the reach of cyber criminals.


How? Here are a few tips.

  • Only Use Secure Wi-Fi Networks. When connecting to a public network, consider using a Virtual Private Network, or VPN. This will ensure that your confidential information stays private. A VPN will also ensure that your data goes directly from your device to the network that you are connecting to.
  • Update Your Devices. Updating the software on your devices, as well as the applications updates, is important. Even though the constant update reminder can be annoying, it is your devices way of protecting you and your data.
  • Do Not Use Public Computers. Never use public computers when logging into to banking, email and social media accounts. This means computers in hotel business centers, as well as in-room iPads. Crooks can install keylogging software to track your keystrokes.
  • Secure Your Mobile Devices. Set a PIN for your devices. Setting a PIN can protect your device from unauthorized users.
  • Use Cash Whenever Possible. Using cash whenever possible while traveling keeps your credit/debit card safe from fraudsters. But, if you are to use your credit/debit cards, be cautious.
  • Backup all your devices. Before going on your trip, whether it is for business or vacation, it is a good idea to back up your mobile devices. This allows you to be able to retrieve your information if lost, in case of emergency, or stolen.
  • Critical information should be stored in a different location. When traveling, it is a good idea to store any critical and private information temporarily in a different location. Examples of different locations are: Flash Drives, Mobile Devices, or Cloud Storage.
  • Make sure your computer’s firewall is enabled. Enabling your computer’s firewall helps stop hackers from getting into your system, as well as keeping viruses from spreading and safeguards outgoing computer traffic.


If you have any questions about Digital Security, Hacking, Cyber Security, Computer Forensics, or Mobile Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.

  • 0


Dear Blast Readers,

Imagine you’re a jewel thief. You have cased many museums and jewelry shops and have identified the score of a lifetime. The day finally comes, you lower yourself from the ceiling, and the alarms have been cut. All that is left to do is reach out and grab your prize. Suddenly when your hand honeypot blast graphicreaches this magnificent jewel, your hand passes right through the jewel. In reality this priceless gem is a hologram. The police storm the room and you’re on your way to jail in hand cuffs.  Similar to this hologram, there are digital “Honeypots” which are used to capture cyber criminals.

Honeypots sense, deflect, or in some cases counteract unauthorized connections. Honeypots are set up in a way that makes them alluring to hackers. Just as the hologram of the jewel drew in the thief, honeypots draw in hackers with the promise of an easy score. These honeypots appear on networks as poorly defended computer systems.  On these systems the administrator that set up the honeypot advertises this system as having valuable data.

The three main components of a Honeypot, include:

  1. A Computer connected to a network
  2. A weak or non-existent firewall
  3. Possibly valuable Data

These three factors are set up to simulate a real-life situation that would draw a hacker’s interest. Once the hacker has gained access to the Honeypot system, the administrator maintaining the honey pot can record information such as the user, attack method, and IP address. This information can be vital in actually tracking down and catching a hacker. An IP lookup can provide the Internet Service Provider of the hacker. This information can be provided to authorities that can then subpoena the Service Provider and obtain a physical street address.

If the system administrator for the honey pot has a counter attack protocol set up, he or she can infect the hacker’s system with malicious software. This infection can go as far as encrypting the hackers system rendering it unusable. This type of counterattack should be only attempted by ethical hackers and other trained cyber security professionals. The ramifications of such a counter attack can leave a company in more danger then less, especially if the counter attack is unsuccessful.

Honeypots help in understanding the threats that the network system faces. For more information on honeypots or how to protect your computer against intruders, give our office a call at (954) 727-1957 or go and visit out website at www.FDS.Global