E-Book, Englisch, 88 Seiten
Gonzalez Online Security for the Business Traveler
1. Auflage 2014
ISBN: 978-0-12-800201-8
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
E-Book, Englisch, 88 Seiten
ISBN: 978-0-12-800201-8
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Deborah Gonzalez, Esq. is the founder of Law2sm, LLC, a legal consulting firm focusing on helping its clients navigate the legal issues relating to the new digital and social media world.Deborah graduated from New York Law School and is licensed to practice law in New York and Georgia.Deborah began her career in the corporate arena working in various positions in the information technology area - from network administrator to manager of the IS department for a top-6 CPA firm in New York City. During her tenure she managed day-to-day IT operations; designed and implemented IT-related training for employees, managers, and IT staff; developed policies and protocols for IT-corporate use; and monitored emerging trends for IT business strategies and management. Deborah used this foundation as a starting point with her legal practice, which is now transporting her beyond the Internet to the social space where the physical and digital dimensions of her clients co-exist and where she can leverage her legal expertise to their benefit. Deborah enjoys engaging with those around her - so social media is a natural fit. But it is her skill in being able to connect the dots to understand the next big paradigm shift in global communication and legal application that makes her a leader in social media and online law. Deborah serves as Chair of the GA Bar Association's Annual Program on Social Media and the Law and serves as a social media legal liaison for social media marketing companies and their clients.In addition, Deborah speaks on legal issues relating to intellectual property, social media and online legal trends and practices, and online risk management in various venues throughout the United States and abroad.Follow her on Twitter: @DGOnlineSec and @Law2sm, or visit www.managingonlinerisk.com or www.law2sm.com.
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Online Security for the Business Traveler;4
3;Copyright Page;5
4;Contents;6
5;About the Author;8
6;Online Resources;10
7;Introduction;12
8;1 Decision to Travel vs. Digital Alternatives;16
8.1;Benefits of Physical Travel;17
8.2;Negatives of Physical Travel;19
8.2.1;Cost;19
8.2.2;Time;21
8.2.3;The Green Argument;22
8.2.4;Well-Being;22
8.2.5;Safety and Security;23
8.3;Travel Security Plans;24
8.4;Corporate Travel Policy;25
8.5;Travel Risk Assessment;26
8.6;Travel Security Education;26
8.7;Digital Travel Alternatives;27
8.7.1;E-mail and Asynchronous Communication;28
8.7.2;Teleconferencing;29
8.7.3;Web Conferencing and Virtual Meetings;30
8.7.4;Mixed Reality;31
9;2 Planning, Logistics, and Security;34
9.1;Purchasing Online and Security;35
9.2;Organizing the Plan and Logistics;37
9.3;Warnings;38
9.4;Luggage and Security;42
9.5;Wearables and Security;43
10;3 Predeparture and Departure;46
10.1;Passports, Visas, Online, Oh My;47
10.2;Packing and Security;49
10.3;Preparing Devices for Secured Travel;50
10.4;Securing the Office When You Travel;50
10.5;TSA Security;51
10.6;Security Beyond the Airports;55
10.7;Terminal Security;56
10.8;Social Media, Travel, and Security;57
10.9;During the Flight Security;59
10.10;Travel Stress and Security;59
10.11;Airport and Travel Game Apps;60
11;4 Arrival and Duration;64
11.1;Arrivals, Customs, Border Crossings;65
11.2;Destination Transportation and Security;66
11.3;Hotels and Security;67
11.4;Wi-Fi and Public Computers;69
11.5;Duration and Data Security;70
11.6;Duration and Apps;70
11.7;Duration and Health;71
11.8;Duration and Staying Legal;73
11.8.1;Anti-Bribery and Anti-Corruption;73
11.8.2;Social Media and Government Censorship;73
11.9;The Traveler Tracked;74
11.10;Virtual Kidnapping;76
11.11;Security Apps for Women Travelers;77
12;5 Return to Home Base;82
12.1;Getting to the Airport on Time;83
12.2;Customs and Border Controls;83
12.3;Arrive Back in Home Country;84
12.4;Back to the Office;85
12.5;Follow-Up;86
12.6;The Future of Travel Security: Online and Off;87
Planning, Logistics, and Security
This chapter focuses on planning, logistics, and security once the decision to travel has been made. Risks such as using online sites to purchase flights, acquiring security clothing and luggage, and downloading and using apps on your mobile devices will be explored.
Keywords
Travel purchase; travel plan; logistics; itinerary; organization; travel warnings; travel alerts; luggage; wearable technology; travel documents; passport; cultural norms; business norms; travel insurance; health insurance
No matter how you travel, it’s still you going.
—Jeff Goldblum1
The decision to travel has been made, and the authorization given. Now planning begins in earnest. Depending on your schedule and resources, this may be the least enjoyable part of the experience. Planning business travel can be tedious, time consuming, and frustrating. Online web sites and mobile apps often promise an easy, convenient, cost-conscious way to set your agenda. But buyer beware! Digital tools can lead to security and safety risks—from lost devices to socially engineered hacking attacks that target you and your data. A rule of thumb is to consider potential security risks you may face at each step in planning and finalizing your itinerary. Here’s something else to remember: If you are not the one planning the trip, review plans presented to you with security in mind. Better yet, discuss security with the person planning your trip before they begin making travel arrangements. This chapter discusses some of the risks of online travel purchasing, the protection certain apparel and luggage offer, and reliable online resources and apps that provide valuable information to assess and mitigate potential problems
Purchasing Online and Security
How many TV, radio, and Internet commercials bombard us daily touting online travel web sites, as a great way to obtain high-quality transportation and lodging at a fabulous price? Some of the more common and popular sites are (more can be seen in Table 2.1):
• Expedia http://www.expedia.com
• Kayak http://www.kayak.com
• Orbitz http://www.orbitz.com
• Priceline http://www.priceline.com
• Travelocity http://www.travelocity.com
Table 2.1
Travel Saving Apps and Web Sites
| WhichAirline | iOS & Android | http://www.whichairline.com | Free |
| Google Flight Explorer | iOS & Android | www.google.com/flights | $3.99 |
| ThePointsGuy.com | Web site | http://thepointsguy.com | Free |
| Altimeter | Web site | http://appadvice.com/appguides/show/altimeter-elevation-apps | Free |
| What’s App | iOS & Android | http://www.whatsapp.com | Free |
| Google’s Field Trip | iOS & Android | https://play.google.com/store/apps/details?id=com.nianticproject.scout&hl=en | Free |
| Hitlist | iOS & Android/Facebook | http://www.hitlistapp.com | Free |
| Momondo | iOS & Android/Facebook | http://www.momondo.com | Free |
Each makes the same claim: the lowest price available for your desired destination and at your desired comfort or luxury level. Just put in your travel information and … voila! Suddenly you have lists to scroll through and select from. You even have the option of registering on the site, of saving the itinerary that you select, and returning to the site for additional statistics on your travel data, all neatly accumulated and formatted. But the data is also saved. At this point, a security-minded person should ask, saved where? This is an important question because you have no control of the security of the location where your data is saved (on the cloud, in a remote server). Access to that data (whether authorized or not) is also out of your control. You have to trust that these web sites have put into place appropriate security controls to protect your information—from financial information used to purchase travel services to personally identifiable information such as user IDs and passwords.
A few questions to ask before using one of these web sites:
1. Has your company authorized employees to use these sites for business travel? Or, does your company use a specific travel management company?
2. Does the web site adhere to PCI Data Security Standards (DSS) from the Security Standards Council? https://www.pcisecuritystandards.org/security_standards/
3. Does the web site have a secured portal for transactions, usually identified with a “https”?
4. Does the web site have security policies (sometimes found on their Terms of Use page)?
5. Does the web site have security disclaimers?
6. Has the web site been breached before?
Even though the travel web sites I listed relate to air travel, keep in mind that the same security concerns exist for any transportation web site—Amtrak (railroad), Greyhound (buses), Carnival Cruise lines (ships), etc. If you plan, book, and save purchases for travel or related items such as rentals for cars, bikes, canoes, etc., online, it is important to give careful consideration to security controls that may or may not exist.
Business travelers should also have the same security concerns about privacy and protection of personal and financial data when making lodging arrangements. There are a variety of web sites that provide information about hotel rooms, hotel direct web sites, or web sites that offer the option of being able to share a couch or room in a private home. These include:
Security professionals emphasize the importance of strong passwords for travel accounts as a first step to protect yourself and your data. Strong passwords reduce the risk of a security breach because they include an unpredictable mix of symbols, numbers, and upper and lowercase letters. You can increase password strength by not sharing the password among your other accounts. In addition, using biometrics or two-factor verification that require additional information in order to access your account is also highly recommended. Another strategy is to create a temporary e-mail address and password to be used only for a particular instance of business travel and then terminate the e-mail and password once the travel is completed. You could also create an e-mail and password only for travel.
Organizing the Plan and Logistics
It’s been said that the only thing tougher than managing employee travel is handing out assigned parking spaces in the company lot.2
Purchasing services is just one step in business travel. Travel logistics communications such as tickets and lodging confirmations are usually electronic and tend to be distributed to the parties who need to know by electronic means such as e-mail or mobile apps. Organizing all the information about a trip in one location is a time management strategy that has security implications. An example is the iPhone’s Passport app. Just one of a wide collection of travel-related apps, Passport “keeps things like airline boarding passes, movie tickets, and gift cards all in one place, letting you scan your iPhone or iPod touch to check-in for a flight, get into a movie, redeem a coupon, and more.3” Table 2.2 lists some others.
Table 2.2
Travel Itinerary and Organization Apps
| TripIt | iOS & Android | https://www.tripit.com | Free |
| TripCase | iOS & Android | http://travel.tripcase.com | Free |
| WorldMate | iOS & Android | https://www.worldmate.com | $3.99 |
| GateGuru | iOS & Android | http://www.gateguru.com | Free |
| Awesome Note | iPhone | http://www.bridworks.com/anote/eng/ | $3.99 |
Having all of the information about a business trip in one place is convenient but also provides a hacker with a one-stop shop. When you couple this reality with the ubiquitous use of mobile devices, it’s easy to understand why corporate risk management is placing growing importance on mobile security.
Critical security questions to consider regarding apps and mobile devices before taking a business trip include:
1. Does your company have a policy for mobile security?
2. Does your company have lists of approved and/or prohibited apps?
3. Does your company...




