Book description
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today’s high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Each of these devices offers new levels of productivity and efficiency, but they also become the weak link in the security chain: if a device is lost or stolen during travel, the resulting data breach can put the business in danger of physical, financial, and reputational loss.
Online Security for the Business Traveler provides an overview of this often overlooked problem, explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity. It is an essential reference guide for any travelling business person or security professional.
- Chapters are organized by travel stages for easy reference, including planning, departure, arrival, and returning home
- Touches on the latest technologies that today's business traveler is using
- Uses case studies to highlight specific security issues and identify areas for improved risk mitigation
Table of contents
- Cover image
- Title page
- Copyright
- About the Author
- Online Resources
- Introduction
- Chapter 1. Decision to Travel vs. Digital Alternatives
- Chapter 2. Planning, Logistics, and Security
-
Chapter 3. Predeparture and Departure
- Passports, Visas, Online, Oh My
- Packing and Security
- Preparing Devices for Secured Travel
- Securing the Office When You Travel
- TSA Security
- Security Beyond the Airports
- Terminal Security
- Social Media, Travel, and Security
- During the Flight Security
- Travel Stress and Security
- Airport and Travel Game Apps
- Chapter 4. Arrival and Duration
- Chapter 5. Return to Home Base
Product information
- Title: Online Security for the Business Traveler
- Author(s):
- Release date: August 2014
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780128002018
You might also like
book
Asset Protection through Security Awareness
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection …
book
Configuration Management for Senior Managers
Configuration Management for Senior Managers is written to help managers in product manufacturing and engineering environments …
book
Bring Your Own Devices (BYOD) Survival Guide
Where end-users once queued up to ask the IT department for permission to buy a new …
book
Building an Enterprise-Wide Business Continuity Program
Drawing on over two decades of experience creating continuity plans and using them in actual recoveries, …