Digital travel safety

DIGITAL SELF-DEFENCE FOR TRAVELERS

It is difficult to manage without your computer, tablet and phone and therefore we often bring 2-3 devices on a trip. We all need access to our documents and data more than ever before when we are abroad on a business trip.

Therefore, it is important that you also include your digital security in your risk assessment when planning a trip. Digital threats, by their very nature, rarely recognize national borders, but once you're on your way, you're more exposed than usual.


Both when home and away, we face an increasing threat from cybercrime. The masterminds behind cybercrime are gaining access to ever greater resources, while their methods are becoming ever more sophisticated. In addition, political and economic cyber-espionage can be a relevant threat for someone, and new phenomena such as cyber-harassment and cyber-terrorism have appeared (however, the threat from the latter is assessed as not present in Denmark by the Center for Cyber Security at the Defense Intelligence Service).


Digital security is about behavior
One of the biggest threats to organizations' digital security today is the behavior of employees. The participants on our travel safety training seem to be very aware that they themselves can be one of the weak links in the chain, especially when they travel abroad. Therefore, we see an increasing demand for knowledge about digital travel security: How should I handle IT security on my computer and smartphone when I take it out into the big world?


Phishing is the most common attack
Phishing means using various psychological tricks to deceive the victim by means of a false message. Many people can easily recognize the simple phishing attacks that almost everyone is exposed to: Criminals try to lure you into submitting usernames, passwords etc. to fake websites. But phishing attacks can be so sophisticated and targeted that they can be difficult to recognize and protect against.


Phishing attacks primarily use psychological vulnerabilities to achieve their goals. Part of the defense against them is therefore also a resilience against the stress, which they use, among other things, to bypass our common sense, and which can be more acute when traveling in remote areas. Travel&Risk consider stress management to be an important subject in almost any travel safety training.


Take good care of your passwords

Typically, both your computer, your phone and your online profiles are protected by passwords. Although the number has fallen from more than half in 2015, 38 percent of the Danish population still use the same password on several online services, according to a study by Statistics Denmark in 2022. Do you?


Did you know that there are huge databases on the web with billions of passwords from hacked online services? So if you've used your favorite password on a platform that's been hacked, it's probably in an online database accessible to cybercriminals. You can check son the website https://haveibeenpwned.com whether your password might be part of a leak.


We often use so many services today that it is impossible to remember separate passwords for everything. That is why it is smart to use a password manager. It is a simple program that stores individual passwords for each service you use, while you yourself only must remember a single password, namely the one for your password manager, which stores your passwords safely and encrypted, so that you do not have to remember everything.

Authoritives


In many countries, authorities now have the power to inspect your digital devices when you cross the border. The purpose is to protect national security, prevent smuggling, or identify illegal content. Unlike domestic searches, border checks often require less legal justification, allowing authorities to review photos, messages, and app data without a warrant. Inspections of your equipment can often be carried out without reasonable suspicion.


For professionals with confidential data or journalists protecting their sources, this situation is particularly concerning. Although most countries have guidelines, the details vary greatly, creating a complex landscape for international travelers.


How to prevent your data from being compromised by border authorities:


  • Limit the data on your devices: Consider removing unnecessary personal information, documents, and photos from your device.
  • Use encrypted cloud storage: Store sensitive data securely in a cloud service, and disconnect your device from the cloud before crossing the border. You can reload the data once you arrive at your destination.
  • Use a “travel device”: Travel with a dedicated device that contains only the necessary information, reducing the risk of exposing personal data.
  • Log out of sensitive accounts: Log out of or temporarily remove apps and accounts that contain sensitive information, such as banking or work-related accounts.

Digital hygiene before, during, and after travel

Individual needs and risks will always vary, but we have compiled a checklist with the most essential, universal tips for what you should do before, during, and after your trip:


Before travel:

  • Install updates for your operating system, software, and antivirus programs
  • Take a full backup of your computer, phone, tablets, etc.
  • Install a password manager and change passwords on your computer, phone, and online accounts
  • Enable two-factor authentication on your online accounts
  • Activate full-disk encryption on your computer and phone
  • Clean up your computer and mobile device. Delete documents, contacts, and files you don’t need
  • Check your destination’s cybersecurity and internet freedom conditions online at https://ncsi.ega.ee/ and https://freedomhouse.org


During travel:

  • Never leave your equipment out of sight
  • Be aware of phishing attack risks
  • Use only your own devices and never log into your online accounts on unfamiliar equipment
  • Avoid open public Wi-Fi hotspots and charging stations
  • Completely power off your computer and phone when crossing borders and checkpoints
  • Use encrypted channels and never send sensitive information via open channels such as email or SMS
  • Use a VPN to protect your internet traffic
  • Regularly send sensitive data home in encrypted form and delete it from your device


After returning home: 

At minimum, you should:

  • Change passwords on devices and online accounts used during the trip
  • Clean compromised equipment, possibly by reinstalling from scratch
  • Report security incidents such as phishing attacks, confiscated equipment, and similar

PICTURES FROM OUR COURSES

DJI_0734_1
IED/UXO awareness
Travel Safety Awareness
IMG_5942
IMG_6697
IMG_5928
IMG_5909
_C4A4233
20251008_0020
IMG_6699
20251008_0015
Røverihåndtering
Interaktiv undervisning
20251008_0060
Privatlivspolitik

OK
unsplash