Best practices at a glance

Travel checklist

beforeAvoid unnecessary1Find the local legislation2Back up your data !3
currentlyBe discreet4Avoid leaving your documents 5Avoid connecting to external networks or equipment6notify in case loss or theftt7
imminentTransfer or Backup8Attach your removable key with your keychain9
afterRenew the passwords you use when you travel10If in doubt, have your equipment checked by your safety officer.11
Table 1

Before your departure:

  1. Avoid unnecessary data transport  ↩︎ (S1)
  2. Find out about the legislation in your destination country ↩︎ (S2)
  3. Backup the data you take with you ↩︎ (S3)

During your arrival and stay:

  1. Use discretion ↩︎ (S4)
  2. Avoid leaving your documents and equipment unattended ↩︎ (S5)
  3. Avoid connecting to external networks or equipment ↩︎ (S6)
  4. Inform your security officer in the event of loss or theft ↩︎ (S7)

Before your return:

  1. Transfer your data to your secure space or to a physically encrypted USB key  ↩︎ (S8)
  2. Keep your removable secure usb key with your home keychain ↩︎ (S9)

After your return:

  1. Renew the passwords you use when you travel ↩︎(S9)
  2. If in doubt, have your equipment checked by your safety officer.  ↩︎(S10)

Travel security Swiss knife

Notebook screen filter

or how to protect yourself from prying eyes

USB Storage key with physical encryption

In the event of loss of your computer (theft or forgetting), prefer a constant backup of your data on this type of media during your trip

In the event of loss of your key (theft or loss), consider that your data is protected from unsolicited access.

USB Data Blocker

Said the usb condom : If you plan to download from public equipment or on a computer that is not yours, you will need this type of gadget, with it the current passes well between you and the rest of the world, but not your data. (plug or cable)

Authentication USB Key or Smartcard, Passkey, SmartKey,..

Part of the Multi-factor Authentication process
Or
what I am or Do: no
what I know: no
what I own: yes

Combined with your password, or part of your physical attributes, the key protects access to your machine account, or to various access accounts to services or institutional sites.

Don’t communication your phone anymore !

This type of key is ideal for no longer having to communicate your phone number to sites that ask you for it under the pretext of ensuring your security


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

EN