Do’s and don’ts for feds on vacation

Federal employees are a prime target for hackers and other bad guys when on vacation. Learn 12 tips for keeping you and your federal-issued laptop safe while ou...

It’s summertime and as you head to the beach, the country or overseas you’re thinking less and less about work. But before you check out for some well-deserved rest and relaxation, there are a few things you should know.

As a federal employee you’re a prime target for hackers and you’re even more vulnerable when you’re away from home.

Jerry Irvine, chief information officer and a partner for Prescient Solutions, shared some do’s and don’ts with Federal Drive radio show hosts Tom Temin and Emily Kopp.

Don’t take your laptop or mobile device on vacation if you can help it, Irvine said. “Anytime you travel with those devices, they’re basically another entry point into that network and should be treated as a potential risk. If you do take them, make sure you never let them out of your sight.”

Do use the safe in your hotel room if you have to leave your laptop or cellphone behind. He said it’s normal to think that locked in the car or just in your room is safe, but it’s not. If there’s not a safe in your room, there’s often one behind the front desk.

But physical controls only cover one of the risks, Irvine said.

Do make sure your operating systems are up to date and the latest patches are installed. He said the two most important things in protecting your computers are antivirus and patch-management, according to the Department of Homeland Security.

Don’t use public Wi-Fi or Ethernet ports. Virtual Private Network (VPN) connections are only as strong as their weakest link. Public WiFi and even the Ethernet connections in your hotel room are all sharing the same network access. “Other people are sitting on them and could be running sniffers or performing man-in-the-middle attacks and have rogue access points out there,” Irvine said.

Do use your own 3G or 4G connection by wire-tethering your mobile device or wireless card. Because it’s a point-to-point connection that makes it harder for eavesdroppers.

Do be cautious when logging on to your government email. If you’re connected to your email system, you’re connected to your internal network, Irvine said.

Don’t ever click on any type of URL in an email, even if it’s from someone you know. Never click on it. Instead, go to your browser and do a search on it and click from there.

Do avoid out-of-office emails if you can. Irvine said many organizations are foregoing the auto-reply and instead redirecting email to an employee who is in the office and can cover for the person on vacation. The issue is really phishing emails, he said. Once a potential hacker sees your out-of-office reply, they will target you because you’re less likely to notice.

Do take vacation photos…Don’t post them until you get back. When using social media it’s better to wait until you’re home to share those photos from the road. It’s just one more opportunity for malicious users to attack you, either by your user ID and password, or physically by robbing your home or you on vacation. Irvine said to consider how many ‘friends’ you have. If you have hundreds, you probably don’t know who they all are. Because of that, it’s extremely difficult for social media platforms to be a secure environment.

Do know your destination and when to be extra careful. Irvine used the Sochi Olympics as an example where visitors were hacked within minutes of landing in Russia. The Baltic states are dangerous, said Irvine, but also South America, some European countries and even England. Still he stressed, “Any coffee shop, any public WiFi, is just a breach waiting to happen.”

Do install mobile device management applications on your systems. “They provide you and your agency the ability to encrypt — not only your data — but have a separate encryption scheme for the confidential and private information,” Irvine said. “You have the ability to locate the device and wipe the device in case it’s lost or stolen. It also provides Data Loss Prevention (DLP) applications that will look for emails or documents that have certain keywords or certain classifications and will disallow them from being used in a remote type of environment.”

Do know your agency’s bring-your-own-device policy. If you’re using your personal phone or computer for work make sure you’re in compliance with the rules so you aren’t in for any surprises when you return.

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

    Getty Images/iStockphoto/Andrii Panchykcybersecurity

    Amid rising threats to critical infrastructure, CISA developing ‘physical security’ goals

    Read more