Do not use WEP or WPA (encryption broken in seconds to minutes)
Hotel or conference wifi logins are no more secure than open wifi connections
Ensure that open, free public connections (e.g. coffee shops) are not imposters
Hotels and conference wired connects have no significant security advantage over wireless
Man-in-the-middle attacks (e.g. altered wall socket connections) and corrupted host are still risks
USB power stations are subject to "juice jacking"
User plugs in their device to a power station (or friendly associates laptop) to charge
Altered station or laptop can access data on the device
Consider using a "USB Condom" (e.g. CyberStop) or set the device USB configuration to charge only
Scott (2016) Cyber Security While Traveling, Pluralsight.com
Images: Related links to external sites (from Bing)
These images are a random sampling from a Bing search on the term "Computer Security." Click on the image (or right click) to open the source website in a new browser window. Search Bing for all related images
FPnotebook.com is a rapid access, point-of-care medical reference for primary care and emergency clinicians. Started in 1995, this collection now contains 6491 interlinked topic pages divided into a tree of 31 specialty books and 722 chapters. Content is updated monthly with systematic literature reviews and conferences.
Although access to this website is not restricted, the information found here is intended for use by medical providers. Patients should address specific medical concerns with their physicians.
This page was written by Scott Moses, MD, last revised on 1/15/2017 and last published on 5/10/2017.