Opinions expressed by Entrepreneur contributors are their own.
If you're like most entrepreneurs, travel is a critical component of your business. Laptops, smartphones and other tech gadgets can help you stay connected when you're on the go, but they also represent potential security problems. From lost or stolen laptops to data gleaned by hackers from unsecured internet connections, every entrepreneur needs to be aware of the risks and take steps to protect themselves, their hardware and their data.
"You have to embrace security before you embrace convenience," says Paul Michael Viollis Sr., CEO of security consulting firm Risk Control Strategies. Wireless hot spots may tempt entrepreneurs looking for a quick internet fix, but Viollis advises against jumping onto public hot spots unless you are absolutely prepared to deal with the security issues. "The best and most secure way to communicate while you're traveling is with a highly encrypted laptop kept in your possession at all times. You can connect through the internet, but you should be connecting through a secure VPN tunnel into your secure server," he says. He recommends similar encryption measures for your smartphone.
Bradley Skaggs, 40, principal and co-founder of Skaggs Design, knows what it's like traveling for business. The design agency he started with his wife, Jonina, 41, has been bicoastal since 2000, with offices in San Francisco and New York City. Because their client base stretches to Australia, Iceland, Japan and the United Kingdom, Bradley has seen his share of airports, and his MacBook and smartphone travel with him. His first line of defense includes some basic security and backup precautions. "The login is protected. The real secret is that we back up a lot," he says. "We keep as little sensitive data as possible on the MacBooks. [The more] data we can keep central and backed up on our file server, the better off we are. We take only what's necessary and easily replaceable on the machine." All the company's laptops back up automatically when they connect to the network.
The rest of this article is locked.
Join Entrepreneur+ today for access.
Already have an account? Sign In