• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

Study Finds Traveling Employees a Serious Cybersecurity Risk

February 24, 2020 by Hector

Home » Blog » Study Finds Traveling Employees a Serious Cybersecurity Risk

A majority of your employees may be exposing your system to threats while traveling, a study found. A threat management firm surveyed 1000 US employees to gauge their understanding of cybersecurity best practices while working remotely. 3 out of 4 of every respondents claimed that they knowingly used public Wi-Fi connections while on company-provided devices, and about 3 out of every 5 said they accessed their work-related emails and devices as well. 1 out of 5 had previously left work devices unattended while traveling.

Vulnerability from Cybersecurity Ignorance

The study highlights a reality among employees concerning cybersecurity best practices while traveling or even working remotely day-to-day. Though about half of those surveyed claimed they knew there were existing guidelines for the use of their devices outside of the office, the other results indicate that either they were unaware of the basic obligations or knowingly ignored them. More often than not, the former accounts for most cybersecurity guideline noncompliance and even those that claimed awareness were actually misinformed.

Traveling Employees are a Hacking Target

Cybersecurity practices while traveling represents a bigger gap than many businesses might realize – some cybercriminals have specifically targeted people in transit. Hackers have gone as far as infiltrating hotel networks to spoof Wi-Fi connections or even install keylogger programs in business center computers. This indicates that attackers are very aware that visitors drop their safeguards while on business travel or vacation and can be more easily exploited.

The rise of socially engineered hacking methodologies creates a danger of cybercriminals leveraging traveling personnel as a dedicated attack vector. Flippant use of social media, GPS-tracking software or any other channels that could provide snippets of personal identifiers permits hackers to build profiles on victims once they are able to piece together enough information.

 

More than Cybercrime

This also supplies hacktivists, nation-state hackers and any other politically-motivated cyber attackers with a means to bring down targets by conducting research into “weak link” employees with system access but less security. Committed surveillance of their social network or other online activity will allow hackers to plan for traveling periods and take advantage of the decreased security awareness to plant malware in their workplace devices.

Throughout 2018, federal agencies noted several private and public organizations fell victim to phishing attacks by Russian-backed hackers, and experts have seen a resurgence of corporate espionage by Chinese cyber actors since the beginning of the trade war. Both groups are aggressively seeking out vulnerabilities in American systems for a mix of monetary and political reasons, and employees of US companies are a primary target.

Educate Your Employees on the Risk

As demonstrated by the survey results, the lack of compliance with organizational cybersecurity practices while traveling likely stems from not having a true understanding of what this means. Ensuring employee buy-in on your security policies requires you to communicate these guidelines in a way that they can understand intimately.

Read through these seven methods for gaining employee buy-in for your cybersecurity practices to help you determine the best way to bring attention to this issue


[fc id=’34’][/fc]

Category: Blog, Cybersecurity, IT Services

Sidebar

Recent Posts

  • How Your ERP Software Impacts Tariff Costs
  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Cargo ship "Tokyo Triumph" loaded with shipping containers in various colors, representing international trade and supply chains affected by tariffs impacting manufacturing operations.

How Your ERP Software Impacts Tariff Costs

Read moreHow Your ERP Software Impacts Tariff Costs
Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand