Cybersecurity Travel Tips

Cybersecurity Border Crossing and Travel Tips

When traveling or crossing through border controls there are a few cybersecurity tips and best practices you should follow.

Join our newsletter:
The below tips do not apply to any one country. The below tips are recommended by the Committee to Protect Journalists and the Electronic Frontier Foundation. Because you don't have anything to hide doesn't mean that you shouldn't value your own privacy.

Backup Your Devices

Before traveling backup any devices you will be taking across the border. Cloud backups are a great option because you can access them anywhere you have an internet connection. If you backup your devices to an external hard drive then leave it at home and make sure that it is encrypted.

Reduce the Data You Carry

If you have sensitive information on your devices remove it before going through a border crossing.

Encrypt Your Devices

You should always encrypt your devices regardless of whether or not you are traveling. However, if you plan to travel and haven’t encrypted your devices you need to do so. That way if the device is lost, stolen, or seized no one but you has access to the device.

Power Off Devices at Border Crossings

When you power off a device it will require a password when it is powered back on. For mobile devices, this may also include a sim card pin. A powered-off device is also not sending any signals out that can be intercepted. You may turn your devices back on after leaving the border crossing area.
Border Agent

Do not Use Biometric Locks/Authentication

Avoid using biometric authentication to access your devices. A border agent may force you to use your finger or scan your face to unlock your device. Using a strong password or pin code is much more secure.

Logout of All Accounts On Your Devices

Before going through a border crossing sign out of all accounts on your devices. This includes your email, social media, and any financial sites you are logged into. If your device is seized or the border agents force you to unlock your device they will potentially have access to all the services you were logged into.

Be Polite and Respectful

Always be polite and respectful to border agents and other officials. Follow their instructions to the best of your ability and never lie to them.
 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 NIST SP 800-171 & CMMC Compliance App

NIST SP 800-171 & CMMC Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.