Cybersecurity tips for Airport travelers

As the popular travel days of the year come near, most of the holiday travelers start creating mental checklists for navigating occupied airports on their journey home- mostly with their excellent mobile devices in hands and laptops in bags. Here is some tips to keep the smartphones, tablets, and laptops safe while spending time at the airport. 

Be smart before you leave home 

  1. Make sure that you have locked all your devices, whether tablets, smartphones, Macs or the PCs.
  2. Use either a touch ID or create complexed and robust passwords.
  3. Try to use a combination of a minimum of eight letters, numbers and special characters.
  4. Update all the Operating Systems and the apps to the latest versions for protecting your devices from all kind of vulnerabilities.
  5. Print as many travel documents at home as possible like the boarding passes and the baggage tags.
  6. The lesser automated kiosks you use an airport, the better it is because these can be hacked.
  7. Protect your laptops and smartphones with security software.
  8. Turn off the Bluetooth and Wi-Fi auto-connect features in your device’s settings for preventing auto connecting to either as you traverse the airport.
  9. Turn off file sharing too.
  10. Download a VPN app to protect your information if you have decided to use public Wi-Fi at the airport.

Try to bring your own charger

The most prominent risk to the mobile devices at the airports always involves popular charging stations. If your flight is delayed and the battery of your device is low, availability of free charging station is still tempting. Below are two reasons why you should not use it:

  1. You can fall victim to a charging station; a hacker could access all the sensitive information of yours like the photographs, emails and much more.
  2. Juice Jacking can happen if you use a USB port at charging station.

Lucia Mandela is a self-professed security expert; she has been making the people aware of the security threats. Has passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at

Leave a Reply

Disclaimer: : We are is a independent technical support provider on on-site and On-Demand Technical or Information Services For Norton related products. Use Of the Name, trademarks, logo & Product Images of Norton is only for reference purposes and is no way related to suggesting that info or services have any business association with Norton Products. Norton or its product-related trademarks, names, Images or logo are the property of its owner i.e, Norton or of their respective owner, we disclaim any ownership in such conditions or if you find any issue feel free to email us.