Add Cybersecurity Planning to Vacation Prep

by Jon Lober | NOC Technology

Lock your doors—and your data—before leaving.

Red flags for travel related scams

When you leave for vacation, you probably make sure the stove is turned off and set your thermostat to “away” mode. If you feel a bit antsy about an empty house, you might also give your neighbors the heads-up and leave that light on in the living room (even if you know you that you’re not fooling anyone). 

 

Unfortunately, now you have something else to worry about. Summertime scammers. 

 

Though summer might give you the chance to get away from your office, it gives cybercriminals the chance to get into your accounts. As normal business and personal routines become disrupted, we become more likely to fall for scams. You, nor your colleagues, nor your employees, are immune. 
 

In a previous post, we looked at some common summertime scams. Now we are going to look at some ways to protect you, your family, and your business from common seasonal frauds. 

 

Red Flags

Travel-related scams have become increasingly diverse throughout the years. As you research your next trip, keep your antennas up for the following red flags that could indicate that you might be planning your next headache instead of your next vacation.  

 

  1. Payment requests through Western Union, Venmo, direct deposit, crypto, or an escrow account. Only pay through credit cards on mainstream sites.   
  2. Anything that seems too good to be true probably is. Free trips or incredible deals are far more likely to be a phisherman’s lure than an actual enjoyable time.   
  3. Sob stories or pushing for immediate payment once you have made a reservation.  
  4. Free vacation offers are never free. They will either charge you later or steal your personal information.  
  5. Requests to navigate away from a mainstream, reputable travel site for payment or further information.  
  6. Scant or general details about a deal. If someone offers a “five-star” stay at a “luxury” resort but cannot or will not give you further information about the specifics, you should be alarmed.  
  7. Emails requesting financial transactions from your boss while they are on vacation including changes in payment details, deposits, transfers, or gift card purchases.  

 

Summertime Cybersecurity Tips

Scammers are constantly inventing new ways to steal your information and hard-earned money. Here are a few ways to foil their attempts.   

 

  1. Use a reputable VPN when you travel. Good VPNs (Virtual Private Networks) can save you from many of the common hacking techniques that bad actors use to steal your information when you are traveling. You should even consider using one when planning your trip. Using a VPN while you plan can prevent the advertising overlords behind the internet from learning your travelling intentions, which could in turn be used by hackers in a targeted scam. 
  2. Avoid using untrusted networks while you travel; stick to cellular data if you can. If you absolutely must use a public network at some point while you travel, use a reputable VPN in conjunction with an incognito or private browsing tab to access the internet.  
  3. Do not use free convenience services while traveling. Avoid free Wi-Fi, free public charging stations, and free VPNs.
  4. Stay up to date with current cybersecurity awareness training. Ongoing awareness training combined with penetration attempts and phishing simulations can keep the most vulnerable portions of your business at their sharpest. A trustworthy MSP should be able to do this for you or make a recommendation.
  5. Avoid including personal details about your vacation in emails or social media posts. Written communication and unnecessary details about your trip can be used to fuel a BEC attempt. Consider how you configure your OOO (out of office) replies to make sure that they are not an additional source of information for cybercriminals. 
  6. Only book travel through reputable, mainstream websites. Make sure all communication and payment stay on the official website and refuse any attempts to be drawn offsite for additional information or alternate payment types. These requests are the digital version of being lured down a dark alley towards a mugger.
  7. Pick up the phone and call your boss if you are ever asked to carry out a financial transaction while they are away on vacation. Refuse to carry out any such requests until you speak with them live on the phone. Though such a call could frustrate them in the moment, once they realize that you have avoided a financial catastrophe, we can assure you that they will be glad that you called.   
Brace your business against these top five cyber threats to SMBs
By Jon Lober April 29, 2025
Are you taking unnecessary risks with your data?
Missouri Sheltered Workshops can empower human potential through AI
By Jon Lober April 24, 2025
Embracing the potential of both AI and humans
Tech upgrades that will boost employee safety in sheltered workshops
By Jon Lober April 15, 2025
At NOC Technology, we've worked with Missouri sheltered workshops for over seven years, and I've witnessed firsthand how the right technological implementations can transform sheltered workshop environments. Today, I'd like to share some insights on leveraging modern technology to create safer workspaces while maintaining the dignity and privacy of all participants. The Unique Safety Challenges of Sheltered Workshops Sheltered workshops provide valuable employment opportunities for individuals with disabilities, but they also present unique safety considerations. Workers may have varying levels of physical mobility, cognitive processing, and sensory perception—all of which can impact how they respond to traditional safety measures. Additionally, the production environments often involve machinery, tools, and materials that require careful monitoring and management. The Role of Smart Technology in Safety Advancements in smart technology provide real-time safety monitoring, immediate alerts for potential hazards, and improved emergency response times. Let’s explore some key technologies and their benefits in sheltered workshop environments. Personalized Alert Systems Traditional emergency alarms can be overwhelming for individuals with sensory sensitivities. Smart alert systems can deliver personalized notifications through: Vibrating wristbands that alert workers without auditory overload Visual notification systems with customizable colors and patterns Tablet-based communication for workers who benefit from visual cues Location-specific alerts that only notify those in affected areas We recently implemented a multi-modal alert system at a workshop in central Missouri that reduced anxiety-related incidents during emergency drills by 65% . Environmental Monitoring Maintaining optimal environmental conditions is crucial for both safety and productivity: Temperature and humidity sensors that automatically adjust HVAC systems Air quality monitors that detect potentially harmful particulates Noise level monitoring to prevent sensory overload Automated ventilation systems that activate when chemical levels exceed thresholds These systems not only protect workers but also provide documented compliance with OSHA regulations. Enhanced Supervision through Smart Cameras Security cameras have evolved beyond simple surveillance. Modern systems can: Detect unusual patterns that might indicate a worker in distress Monitor restricted areas without constant staff presence Identify when machinery is being used incorrectly Alert supervisors to potential safety hazards Important note: All camera systems should be implemented with strict privacy protocols and transparent policies. Workers and guardians should be fully informed about what is being monitored and why. In many cases, audio cannot be recorded, and the camera system must be configured to meet this requirement. Wearable Safety Technology Wearable devices offer personalized safety monitoring without stigmatization: Fall detection pendants that automatically alert staff Location tracking that helps locate workers in emergency situations Biometric monitoring for workers with health conditions Proximity sensors that prevent accidental entry into hazardous areas These wearables can be designed to look like standard ID badges or watches, preserving dignity while enhancing safety. Implementation Best Practices Successfully integrating smart technology into sheltered workshops requires careful planning: Involve all stakeholders: Workers, guardians, and staff should participate in selecting and implementing new technologies. Prioritize simplicity: Choose solutions that require minimal training and maintenance. Phase in gradually: Introduce new technologies in stages to allow everyone time to adapt. Balance automation with human oversight: Technology should supplement, not replace, trained staff. Respect privacy: Collect only essential data and maintain strong security protocols.
More Articles