Settings
Language
Color Theme
What is secure traveling?
Secure traveling is the practice of protecting your devices and data while on the move. It means avoiding unsafe networks, keeping your devices physically and digitally secure, and staying alert to risks like theft or data leaks, so you can travel with confidence and keep your personal or work information safe.
Which of the following BEST describes what secure traveling is?
Secure traveling is about staying aware of cybersecurity risks when you are away from your usual working environment. Risks include the use of public WiFi, device theft, and data exposure. Secure traveling involves taking practical steps to protect your personal and work information while you’re on the move.
View Options Again
Protecting your data and devices while on the move
Save money by only using public WiFi to stay connected while traveling
Never traveling to reduce the chance of getting hacked
Using a separate device for risky activity so your main one is safe
The Key Safety Principles of Secure Traveling
Traveling can expose you to more than just jet lag; it opens the door to new cybersecurity risks. Stick to secure networks, protect your devices, avoid risky charging stations, and stay alert to prying eyes and unfamiliar environments. Let’s explore these essential travel safety tips and why they matter.
Safe Network Use
Public WiFi may be convenient, but it’s often unsecured and risky. When traveling, avoid using it for sensitive activities. Stick to mobile data or trusted networks, and avoid logging into personal or work accounts over public or unsecured connections.
You're at the airport and want to go online. Which is the safest option for accessing your email?
Even if public WiFi has a password, it’s still shared and easy for attackers to exploit. While not invulnerable, mobile data is much harder to intercept than data sent over a public or untrusted WiFi connection. It’s a safer choice for accessing sensitive information and accounts like email or banking.
View Options Again
Connect to the free airport WiFi
Use your mobile data or a secure hotspot
Ask a stranger for their hotspot password
Join any free WiFi network that seems secure
Device Security
When you're on the move, your devices are easier to lose or steal. Keep them with you whenever you can. Lock your screen whenever you step away. Use encryption to protect stored data, and secure your devices in hotel safes or locked bags when not in use.
Stay Alert In Public Spaces
Traveling often means working in public, where anyone nearby can see your screen. Use privacy filters to block side views and avoid displaying sensitive information in crowded areas. Don’t leave devices or documents open and unattended, and stay alert to who’s nearby.
Where should you store your devices when not in use while traveling?
To reduce the risk of theft, secure your devices in a locked, hidden, or tamper-resistant location when not in use. Hotel safes, lockable bags, or secure storage areas make it harder for opportunistic thieves to access your equipment or sensitive data.
View Options Again
Ask a stranger who looks trustworthy to watch it
Leave your device with reception for safekeeping
In a visible spot for quick access
In a hotel safe or locked bag
Is the following statement True or False:
It’s safe to leave your laptop open and unattended in a public space if you're nearby.
Devices and documents should never be left open or unattended in public, even briefly. It increases the risk of data exposure or theft.
View Options Again
True
False
You’re on a plane and the person next to you keeps glancing at your screen. How do you stop it?
Privacy filters darken your screen from side angles, making it unreadable to anyone sitting next to you. Perfect for crowded spaces like planes.
View Options Again
Stare at them until they stop
Type faster so they can’t keep up
Shrink the font to microscopic size
Use a privacy filter to block side views
Safe Charging Practices
Public USB charging stations can be tampered with to steal data or install malware. To stay safe, avoid using them altogether. Instead, rely on your own charger or bring a portable power bank to charge your devices securely while traveling.
Which of the following is the safest way to charge your device while traveling?
Public USB charging stations can be compromised to steal data or install malware. Using your own charger or a power bank is the safest way to ensure your device charges securely.
View Options Again
Use your own charger or a portable power bank
Use any public USB charging station
Borrow a charger from a stranger nearby
Trust that expensive airport lounges have secure charging ports
Is the following statement True or False:
Being aware of your surroundings can help prevent accidental data exposure in public areas.
Staying aware of your surroundings helps prevent accidental exposure. Someone nearby could easily see or hear sensitive information. A quick glance around can stop a potential security breach.
View Options Again
True
False
Additional Tips To Stay Secure
Common sense goes a long way. Remember the basics. Don’t click dodgy links, and don’t overshare online. Before you travel, back up your data, install updates, and secure your device with a strong PIN or biometric login. A few quick steps now can prevent major issues later.
Before traveling, which of the following is a good cybersecurity practice?
If your device is lost or stolen, remote erase lets you wipe it from anywhere, protecting your data from falling into the wrong hands. Backups ensure you can still recover what you need.
View Options Again
Use the same password for all accounts
Enable auto-login for convenience
Leave your firewall disabled to reduce lag
Backup your data and enable remote erase in case your device is lost or stolen
Which of the following can help improve cybersecurity before you travel?
Updating your system fixes known vulnerabilities, MFA adds a layer of protection, and strong lock screen settings help keep your device secure if lost or stolen.
View Options Again
Updating your device’s operating system
Turning on multi-factor authentication (MFA)
Setting strong lock screen security (like a PIN or biometric login)
All of the above
The Importance of Secure Traveling
Secure traveling means more than flipping your laptop closed. It’s about avoiding risky WiFi, protecting your devices, charging safely, and staying alert in public spaces. These simple habits help keep both you and your organization safe from costly security breaches.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Language translation for this training module has been disabled and explicitly set to the following language
[88, "Language translation for this training module has been disabled and explicitly set to the following language", "Language translation for this training module has been disabled and explicitly set to the following language"],
Secure-Traveling
[89, "Secure-Traveling", "Secure-Traveling"],
What is secure traveling?
[90, "What is secure traveling?", "What is secure traveling?"],
Secure traveling is the practice of protecting your devices and data while on the move. It means avoiding unsafe networks, keeping your devices physically and digitally secure, and staying alert to risks like theft or data leaks, so you can travel with confidence and keep your personal or work information safe.
[91, "Secure traveling is the practice of protecting your devices and data while on the move. It means avoiding unsafe networks, keeping your devices physically and digitally secure, and staying alert to risks like theft or data leaks, so you can travel with confidence and keep your personal or work information safe.", "Secure traveling is the practice of protecting your devices and data while on the move. It means avoiding unsafe networks, keeping your devices physically and digitally secure, and staying alert to risks like theft or data leaks, so you can travel with confidence and keep your personal or work information safe."],
Which of the following BEST describes what secure traveling is?
[92, "Which of the following BEST describes what secure traveling is?", "Which of the following BEST describes what secure traveling is?"],
Using a separate device for risky activity so your main one is safe
[93, "Using a separate device for risky activity so your main one is safe", "Using a separate device for risky activity so your main one is safe"],
Never traveling to reduce the chance of getting hacked
[94, "Never traveling to reduce the chance of getting hacked", "Never traveling to reduce the chance of getting hacked"],
Protecting your data and devices while on the move
[95, "Protecting your data and devices while on the move ", "Protecting your data and devices while on the move "],
Save money by only using public WiFi to stay connected while traveling
[96, "Save money by only using public WiFi to stay connected while traveling", "Save money by only using public WiFi to stay connected while traveling"],
Secure traveling is about staying aware of cybersecurity risks when you are away from your usual working environment. Risks include the use of public WiFi, device theft, and data exposure. Secure traveling involves taking practical steps to protect your personal and work information while you’re on the move.
[97, "Secure traveling is about staying aware of cybersecurity risks when you are away from your usual working environment. Risks include the use of public WiFi, device theft, and data exposure. Secure traveling involves taking practical steps to protect your personal and work information while you’re on the move. ", "Secure traveling is about staying aware of cybersecurity risks when you are away from your usual working environment. Risks include the use of public WiFi, device theft, and data exposure. Secure traveling involves taking practical steps to protect your personal and work information while you’re on the move. "],
The Key Safety Principles of Secure Traveling
[98, "The Key Safety Principles of Secure Traveling ", "The Key Safety Principles of Secure Traveling "],
Traveling can expose you to more than just jet lag; it opens the door to new cybersecurity risks. Stick to secure networks, protect your devices, avoid risky charging stations, and stay alert to prying eyes and unfamiliar environments. Let’s explore these essential travel safety tips and why they matter.
[99, "Traveling can expose you to more than just jet lag; it opens the door to new cybersecurity risks. Stick to secure networks, protect your devices, avoid risky charging stations, and stay alert to prying eyes and unfamiliar environments. Let’s explore these essential travel safety tips and why they matter.", "Traveling can expose you to more than just jet lag; it opens the door to new cybersecurity risks. Stick to secure networks, protect your devices, avoid risky charging stations, and stay alert to prying eyes and unfamiliar environments. Let’s explore these essential travel safety tips and why they matter."],
Safe Network Use
[100, "Safe Network Use", "Safe Network Use"],
Public WiFi may be convenient, but it’s often unsecured and risky. When traveling, avoid using it for sensitive activities. Stick to mobile data or trusted networks, and avoid logging into personal or work accounts over public or unsecured connections.
[101, "Public WiFi may be convenient, but it’s often unsecured and risky. When traveling, avoid using it for sensitive activities. Stick to mobile data or trusted networks, and avoid logging into personal or work accounts over public or unsecured connections. ", "Public WiFi may be convenient, but it’s often unsecured and risky. When traveling, avoid using it for sensitive activities. Stick to mobile data or trusted networks, and avoid logging into personal or work accounts over public or unsecured connections. "],
You're at the airport and want to go online. Which is the safest option for accessing your email?
[102, "You're at the airport and want to go online. Which is the safest option for accessing your email? ", "You're at the airport and want to go online. Which is the safest option for accessing your email? "],
Connect to the free airport WiFi
[103, "Connect to the free airport WiFi ", "Connect to the free airport WiFi "],
Join any free WiFi network that seems secure
[104, "Join any free WiFi network that seems secure ", "Join any free WiFi network that seems secure "],
Ask a stranger for their hotspot password
[105, "Ask a stranger for their hotspot password ", "Ask a stranger for their hotspot password "],
Use your mobile data or a secure hotspot
[106, "Use your mobile data or a secure hotspot", "Use your mobile data or a secure hotspot"],
Even if public WiFi has a password, it’s still shared and easy for attackers to exploit. While not invulnerable, mobile data is much harder to intercept than data sent over a public or untrusted WiFi connection. It’s a safer choice for accessing sensitive information and accounts like email or banking.
[107, "Even if public WiFi has a password, it’s still shared and easy for attackers to exploit. While not invulnerable, mobile data is much harder to intercept than data sent over a public or untrusted WiFi connection. It’s a safer choice for accessing sensitive information and accounts like email or banking.", "Even if public WiFi has a password, it’s still shared and easy for attackers to exploit. While not invulnerable, mobile data is much harder to intercept than data sent over a public or untrusted WiFi connection. It’s a safer choice for accessing sensitive information and accounts like email or banking."],
Device Security
[108, "Device Security ", "Device Security "],
When you're on the move, your devices are easier to lose or steal. Keep them with you whenever you can. Lock your screen whenever you step away. Use encryption to protect stored data, and secure your devices in hotel safes or locked bags when not in use.
[109, "When you're on the move, your devices are easier to lose or steal. Keep them with you whenever you can. Lock your screen whenever you step away. Use encryption to protect stored data, and secure your devices in hotel safes or locked bags when not in use.", "When you're on the move, your devices are easier to lose or steal. Keep them with you whenever you can. Lock your screen whenever you step away. Use encryption to protect stored data, and secure your devices in hotel safes or locked bags when not in use."],
Stay Alert In Public Spaces
[110, "Stay Alert In Public Spaces", "Stay Alert In Public Spaces"],
Traveling often means working in public, where anyone nearby can see your screen. Use privacy filters to block side views and avoid displaying sensitive information in crowded areas. Don’t leave devices or documents open and unattended, and stay alert to who’s nearby.
[111, "Traveling often means working in public, where anyone nearby can see your screen. Use privacy filters to block side views and avoid displaying sensitive information in crowded areas. Don’t leave devices or documents open and unattended, and stay alert to who’s nearby.", "Traveling often means working in public, where anyone nearby can see your screen. Use privacy filters to block side views and avoid displaying sensitive information in crowded areas. Don’t leave devices or documents open and unattended, and stay alert to who’s nearby."],
Where should you store your devices when not in use while traveling?
[112, "Where should you store your devices when not in use while traveling?", "Where should you store your devices when not in use while traveling?"],
In a visible spot for quick access
[113, "In a visible spot for quick access ", "In a visible spot for quick access "],
In a hotel safe or locked bag
[114, "In a hotel safe or locked bag ", "In a hotel safe or locked bag "],
Ask a stranger who looks trustworthy to watch it
[115, "Ask a stranger who looks trustworthy to watch it ", "Ask a stranger who looks trustworthy to watch it "],
Leave your device with reception for safekeeping
[116, "Leave your device with reception for safekeeping", "Leave your device with reception for safekeeping"],
To reduce the risk of theft, secure your devices in a locked, hidden, or tamper-resistant location when not in use. Hotel safes, lockable bags, or secure storage areas make it harder for opportunistic thieves to access your equipment or sensitive data.
[117, "To reduce the risk of theft, secure your devices in a locked, hidden, or tamper-resistant location when not in use. Hotel safes, lockable bags, or secure storage areas make it harder for opportunistic thieves to access your equipment or sensitive data. ", "To reduce the risk of theft, secure your devices in a locked, hidden, or tamper-resistant location when not in use. Hotel safes, lockable bags, or secure storage areas make it harder for opportunistic thieves to access your equipment or sensitive data. "],
It’s safe to leave your laptop open and unattended in a public space if you're nearby.
[118, "It’s safe to leave your laptop open and unattended in a public space if you're nearby. ", "It’s safe to leave your laptop open and unattended in a public space if you're nearby. "],
Devices and documents should never be left open or unattended in public, even briefly. It increases the risk of data exposure or theft.
[119, "Devices and documents should never be left open or unattended in public, even briefly. It increases the risk of data exposure or theft. ", "Devices and documents should never be left open or unattended in public, even briefly. It increases the risk of data exposure or theft. "],
You’re on a plane and the person next to you keeps glancing at your screen. How do you stop it?
[120, "You’re on a plane and the person next to you keeps glancing at your screen. How do you stop it?", "You’re on a plane and the person next to you keeps glancing at your screen. How do you stop it?"],
Type faster so they can’t keep up
[121, "Type faster so they can’t keep up ", "Type faster so they can’t keep up "],
Stare at them until they stop
[122, "Stare at them until they stop ", "Stare at them until they stop "],
Use a privacy filter to block side views
[123, "Use a privacy filter to block side views", "Use a privacy filter to block side views"],
Shrink the font to microscopic size
[124, "Shrink the font to microscopic size", "Shrink the font to microscopic size"],
Privacy filters darken your screen from side angles, making it unreadable to anyone sitting next to you. Perfect for crowded spaces like planes.
[125, "Privacy filters darken your screen from side angles, making it unreadable to anyone sitting next to you. Perfect for crowded spaces like planes. ", "Privacy filters darken your screen from side angles, making it unreadable to anyone sitting next to you. Perfect for crowded spaces like planes. "],
Safe Charging Practices
[126, "Safe Charging Practices ", "Safe Charging Practices "],
Public USB charging stations can be tampered with to steal data or install malware. To stay safe, avoid using them altogether. Instead, rely on your own charger or bring a portable power bank to charge your devices securely while traveling.
[127, "Public USB charging stations can be tampered with to steal data or install malware. To stay safe, avoid using them altogether. Instead, rely on your own charger or bring a portable power bank to charge your devices securely while traveling.", "Public USB charging stations can be tampered with to steal data or install malware. To stay safe, avoid using them altogether. Instead, rely on your own charger or bring a portable power bank to charge your devices securely while traveling."],
Which of the following is the safest way to charge your device while traveling?
[128, "Which of the following is the safest way to charge your device while traveling?", "Which of the following is the safest way to charge your device while traveling?"],
Use your own charger or a portable power bank
[129, "Use your own charger or a portable power bank ", "Use your own charger or a portable power bank "],
Use any public USB charging station
[130, "Use any public USB charging station ", "Use any public USB charging station "],
Borrow a charger from a stranger nearby
[131, "Borrow a charger from a stranger nearby ", "Borrow a charger from a stranger nearby "],
Trust that expensive airport lounges have secure charging ports
[132, "Trust that expensive airport lounges have secure charging ports", "Trust that expensive airport lounges have secure charging ports"],
Public USB charging stations can be compromised to steal data or install malware. Using your own charger or a power bank is the safest way to ensure your device charges securely.
[133, "Public USB charging stations can be compromised to steal data or install malware. Using your own charger or a power bank is the safest way to ensure your device charges securely.", "Public USB charging stations can be compromised to steal data or install malware. Using your own charger or a power bank is the safest way to ensure your device charges securely."],
Being aware of your surroundings can help prevent accidental data exposure in public areas.
[134, "Being aware of your surroundings can help prevent accidental data exposure in public areas.", "Being aware of your surroundings can help prevent accidental data exposure in public areas."],
Staying aware of your surroundings helps prevent accidental exposure. Someone nearby could easily see or hear sensitive information. A quick glance around can stop a potential security breach.
[135, "Staying aware of your surroundings helps prevent accidental exposure. Someone nearby could easily see or hear sensitive information. A quick glance around can stop a potential security breach.", "Staying aware of your surroundings helps prevent accidental exposure. Someone nearby could easily see or hear sensitive information. A quick glance around can stop a potential security breach."],
Additional Tips To Stay Secure
[136, "Additional Tips To Stay Secure", "Additional Tips To Stay Secure"],
Common sense goes a long way. Remember the basics. Don’t click dodgy links, and don’t overshare online. Before you travel, back up your data, install updates, and secure your device with a strong PIN or biometric login. A few quick steps now can prevent major issues later.
[137, "Common sense goes a long way. Remember the basics. Don’t click dodgy links, and don’t overshare online. Before you travel, back up your data, install updates, and secure your device with a strong PIN or biometric login. A few quick steps now can prevent major issues later. ", "Common sense goes a long way. Remember the basics. Don’t click dodgy links, and don’t overshare online. Before you travel, back up your data, install updates, and secure your device with a strong PIN or biometric login. A few quick steps now can prevent major issues later. "],
Before traveling, which of the following is a good cybersecurity practice?
[138, "Before traveling, which of the following is a good cybersecurity practice?", "Before traveling, which of the following is a good cybersecurity practice?"],
Enable auto-login for convenience
[139, "Enable auto-login for convenience ", "Enable auto-login for convenience "],
Backup your data and enable remote erase in case your device is lost or stolen
[140, "Backup your data and enable remote erase in case your device is lost or stolen ", "Backup your data and enable remote erase in case your device is lost or stolen "],
Use the same password for all accounts
[141, "Use the same password for all accounts ", "Use the same password for all accounts "],
Leave your firewall disabled to reduce lag
[142, "Leave your firewall disabled to reduce lag", "Leave your firewall disabled to reduce lag"],
If your device is lost or stolen, remote erase lets you wipe it from anywhere, protecting your data from falling into the wrong hands. Backups ensure you can still recover what you need.
[143, "If your device is lost or stolen, remote erase lets you wipe it from anywhere, protecting your data from falling into the wrong hands. Backups ensure you can still recover what you need.", "If your device is lost or stolen, remote erase lets you wipe it from anywhere, protecting your data from falling into the wrong hands. Backups ensure you can still recover what you need."],
Which of the following can help improve cybersecurity before you travel?
[144, "Which of the following can help improve cybersecurity before you travel? ", "Which of the following can help improve cybersecurity before you travel? "],
Updating your device’s operating system
[145, "Updating your device’s operating system", "Updating your device’s operating system"],
Turning on multi-factor authentication (MFA)
[146, "Turning on multi-factor authentication (MFA) ", "Turning on multi-factor authentication (MFA) "],
Setting strong lock screen security (like a PIN or biometric login)
[147, "Setting strong lock screen security (like a PIN or biometric login) ", "Setting strong lock screen security (like a PIN or biometric login) "],
All of the above
[148, "All of the above ", "All of the above "],
Updating your system fixes known vulnerabilities, MFA adds a layer of protection, and strong lock screen settings help keep your device secure if lost or stolen.
[149, "Updating your system fixes known vulnerabilities, MFA adds a layer of protection, and strong lock screen settings help keep your device secure if lost or stolen.", "Updating your system fixes known vulnerabilities, MFA adds a layer of protection, and strong lock screen settings help keep your device secure if lost or stolen."],
The Importance of Secure Traveling
[150, "The Importance of Secure Traveling ", "The Importance of Secure Traveling "],
Secure traveling means more than flipping your laptop closed. It’s about avoiding risky WiFi, protecting your devices, charging safely, and staying alert in public spaces. These simple habits help keep both you and your organization safe from costly security breaches.
[151, "Secure traveling means more than flipping your laptop closed. It’s about avoiding risky WiFi, protecting your devices, charging safely, and staying alert in public spaces. These simple habits help keep both you and your organization safe from costly security breaches. ", "Secure traveling means more than flipping your laptop closed. It’s about avoiding risky WiFi, protecting your devices, charging safely, and staying alert in public spaces. These simple habits help keep both you and your organization safe from costly security breaches. "],
[152, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.