{"id":28253,"date":"2019-05-21T06:00:12","date_gmt":"2019-05-21T12:00:12","guid":{"rendered":"https://www.webroot.com/blog/?p=28253"},"modified":"2023-12-01T08:01:12","modified_gmt":"2023-12-01T15:01:12","slug":"a-cybersecurity-guide-for-digital-nomads","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/05\/21\/a-cybersecurity-guide-for-digital-nomads\/","title":{"rendered":"A Cybersecurity Guide for Digital Nomads"},"content":{"rendered":"\n<p>Technology has unlocked a new&nbsp;type&nbsp;of worker, unlike any we have seen before\u2014the digital nomad. Digital nomads are people who use technologies like&nbsp;WiFi, smart devices, and cloud-based applications to work from wherever they please. For some digital nomads, this means their favorite coffee shop or co-working space.&nbsp;For others, it means an idyllic beach in Bali&nbsp;or countryside public house. One thing remains true wherever a digital nomad may choose to lay down their temporary roots: They are at a&nbsp;<a href=\"https:\/\/threatpost.com\/remote-workers-security\/143153\/\" target=\"_blank\" rel=\"noreferrer noopener\">higher cybersecurity risk<\/a>&nbsp;than a traditional worker.&nbsp;So&nbsp;what risks should they look out for?&nbsp;<\/p>\n\n\n\n<h2>Public&nbsp;Wifi<\/h2>\n\n\n\n<p>Without a doubt, public\u00a0WiFi\u00a0is\u00a0one of the main cybersecurity\u00a0hazards\u00a0many digital nomads\u00a0face. The massive and unresolved flaw in the\u00a0WPA2 encryption\u00a0standard used by\u00a0modern\u00a0WiFi\u00a0networks means that anyone connecting to a public network is putting themselves at risk. All public\u00a0WiFi\u00a0options\u2014including\u00a0WiFi\u00a0provided by hotels, cafes, and airports\u2014poses the risk of not being\u00a0secure. How can a digital nomad be digital if their main\u00a0source of\u00a0internet connectivity is a cybersecurity\u00a0minefield?\u00a0\u00a0<\/p>\n\n\n\n<p>When connecting to public&nbsp;WiFi&nbsp;as a digital nomad, it is crucial to keep your web traffic hidden behind a&nbsp;virtual&nbsp;private&nbsp;network (VPN). A quality VPN app is simple to set up on&nbsp;your mobile devices\u2014including laptops and smart phones\u2014and uses a strong encryption protocol to prevent hackers and other snoops from stealing important personal information such as account passwords, banking information, and private messages.&nbsp;VPNs&nbsp;will&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.webroot.com\/blog\/2018\/12\/13\/what-separates-webroot-wifi-security-from-other-vpns\/\" target=\"_blank\">keep your data encrypted and secure<\/a>&nbsp;from&nbsp;prying eyes, regardless of&nbsp;locale.<\/p>\n\n\n\n<h2>Device Theft<\/h2>\n\n\n\n<p>Physical device theft is a very real risk for digital nomads, but one that can&nbsp;largely&nbsp;be&nbsp;avoided. The first and most obvious step&nbsp;to doing so&nbsp;is to&nbsp;<em>never&nbsp;<\/em>leave your devices unattended, even if your seatmate at the coffee shop seems trustworthy. Always be mindful of your device visibility; keeping your unattended devices and laptop bags locked away or out of sight in your hotel room is often all it takes to prevent&nbsp;theft. Purchasing a carrying case with a secure access passcode or keyed entry&nbsp;can&nbsp;also&nbsp;act as an additional deterrent&nbsp;against&nbsp;thieves looking for an easy mark.&nbsp;<\/p>\n\n\n\n<p>If your device is stolen, how can you prevent the damage from spiraling? Taking a few defensive measures can save digital nomads major headaches. Keep a device tracker enabled on all of your devices\u2014smartphones, tablets, and laptops. Both Apple and Android have default services that will help you locate your missing device.&nbsp;&nbsp;<\/p>\n\n\n\n<p>But this will only help you find your property; it won\u2019t prevent anyone from accessing the valuable data within.&nbsp;That\u2019s&nbsp;why all of your devices&nbsp;should&nbsp;have a lock screen enabled, secured with either a pin or a biometric ID,&nbsp;such as your fingerprint. If you believe these efforts have failed and your device is compromised, enabling multi-factor authentication on your most sensitive accounts should help reduce the effect of the breach.&nbsp;&nbsp;<\/p>\n\n\n\n<p>However, if you cannot recover your device, remotely wiping it will prevent any additional data from being accessed. If you have a device tracker enabled, you will be able to remotely wipe your sensitive data with that software.&nbsp;If&nbsp;you\u2019re&nbsp;using a&nbsp;data backup solution, any lost files will be recoverable once the status of your&nbsp;devices is secure&nbsp;<\/p>\n\n\n\n<h2>Lower&nbsp;Your&nbsp;Risk<\/h2>\n\n\n\n<p>Being a digital nomad means that you\u2019re at a higher risk for a breach, but that doesn\u2019t mean you can\u2019t take steps to lower that risk. These best practices could drastically reduce the risk incurred by leading a digitally nomadic lifestyle.&nbsp;<\/p>\n\n\n\n<ul>\n<li><strong>Toggle off<\/strong>. Remember to always turn off&nbsp;WiFi&nbsp;and Bluetooth connectivity after a session. This will prevent&nbsp;accidental&nbsp;or nefarious&nbsp;connections that could compromise your security.&nbsp;<\/li>\n\n\n\n<li><strong>Mindfulness<\/strong>. Be aware of your surroundings and of your devices. Forgetting a device might be an acceptable slip&nbsp;up&nbsp;for most, but for a digital nomad it can bring&nbsp;your lifestyle&nbsp;to a grinding halt.&nbsp;<\/li>\n\n\n\n<li><strong>Be prepared<\/strong>. Secure your devices behind&nbsp;<a href=\"https:\/\/www.webroot.com\/us\/en\/home\/sem\/vpn-wifi-security?rc=5340&amp;sc=701F0000000etVr&amp;gclid=CjwKCAjw-ZvlBRBbEiwANw9UWgS0EDQW8j19k-FZU0SS54SJOeXAEapu4F4apBSOWDhuztv1BwE6choC5Z0QAvD_BwE\" target=\"_blank\" rel=\"noreferrer noopener\">a trusted VPN<\/a>&nbsp;before beginning any remote adventures. This will encrypt all of your web traffic, regardless of where you connect.&nbsp;&nbsp;<\/li>\n\n\n\n<li><strong>Stop the spread<\/strong>. In case of a device or account breach, strong passwords and multi-factor authentication will help minimize the damage.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>A staggering&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.forbes.com\/sites\/elainepofeldt\/2018\/08\/30\/digital-nomadism-goes-mainstream\/\" target=\"_blank\">4.8 million Americans<\/a>&nbsp;describe themselves as digital nomads, a number that won\u2019t be going down anytime soon. With remote work becoming the&nbsp;new norm, it\u2019s more important than ever that we take these cybersecurity measures seriously\u2014to protect not just ourselves, but&nbsp;also&nbsp;our businesses&nbsp;and&nbsp;clients. Are you a digital nomad making your way through the remote-work landscape? Let us know your top tips in the comments below!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology has unlocked a new&nbsp;type&nbsp;of worker, unlike any we have seen before\u2014the digital nomad. Digital nomads are people who use technologies like&nbsp;WiFi, smart devices, and cloud-based applications to work from wherever they please. For some digital nomads, this means their favorite coffee shop or co-working space.&nbsp;For others, it means an idyllic beach in Bali&nbsp;or countryside [&hellip;]<\/p>\n","protected":false},"author":90,"featured_media":28269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2985],"tags":[23439],"yst_prominent_words":[24487,3615,24491,24493,24485,3517,16963,24481,24483,24497,24501,24503,16739,5017,5375,18907,3527,24495,24489,5371],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28253"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=28253"}],"version-history":[{"count":7,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28253\/revisions"}],"predecessor-version":[{"id":32331,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28253\/revisions\/32331"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/28269"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=28253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=28253"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=28253"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=28253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}