Travel companies were hit by one data breach after another last year — firms including Marriott, British Airways, Delta Air Lines and the travel booking site Orbitz.
Marriott estimates that as a result of its breach — in which the reservation database of Starwood-branded hotels in its portfolio was hacked — 383 million guest records could have been affected and 5.25 million unencrypted passport numbers were possibly compromised. And experts expect breaches in the travel sector will continue.
“Travel companies are a prime target of cyberthefts” because they have “highly sensitive, personally identifiable information,” said Eva Velasquez, chief executive of the Identity Theft Resource Center, a national nonprofit organization in San Diego that supports victims of identity theft and seeks to broaden public awareness.
But travelers do have options to protect their information.
Bruce McIndoe, president of WorldAware, a risk management company, recommends creating a “digital persona” when booking travel or making other online transactions. This can include setting up a new, disposable phone number using a service like Google Voice and RingCentral to screen any calls based on caller ID, and to forward these to the phone number that you want to protect.
Mr. McIndoe also suggests creating what he calls a throwaway email address, to be used only when booking online, to protect your actual personal or work email from theft. You can also keep your home and work addresses private with a service like iPostal1.com, PhysicalAddress.com and PostScanMail.com, which can create a new mailing address for you. And you can rent a post office box from the United States Postal Service, though this cannot be used for many online transactions.
There are many steps you can take to protect any device you bring on business trips. If you work for a large company or service provider, like a law or accounting firm, your employer may be able to provide clean devices, even some with special protections appropriate for whatever destination you visit.
Before leaving on a trip, Sam Rubin, a vice president of the Crypsis Group, a cybersecurity consulting firm, advises all travelers, regardless of the size of their employer, to make sure their laptops are encrypted, via software like BitLocker for Windows laptops or Filevault, for Macs. He also suggests backing up data regularly, installing application updates and deleting unneeded and old data from devices.
The Global Business Travel Association, a trade group for corporate travel managers, suggests using a privacy filter on your laptop and tablet screen when you’re traveling. To prevent theft, lock your devices when you’re not using them, through a PIN, password protection or physical locks and alarms. The group also recommends using a juice-jack protector — attached to the end of your USB cord — to protect against data skimmers when you plug the cord into a public charging station. If you bring your own charging device, you won’t need a public charger.
Experts strongly recommend not connecting to unsecured public Wi-Fi systems anywhere in the world, not only at coffee shops like Starbucks but also in airports and hotels, among other places. If you must use these, Si-Yeon Kim, chief risk and compliance officer of American Express Global Business Travel, suggests minimizing the number of documents you open, and being careful of whatever information you transmit.
Christel Cao-Delebarre, the global privacy officer in London for Carlson Wagonlit Travel, a travel management company, advises being “very careful about speaking with colleagues and possibly sharing confidential information in public places.” She also urges travelers not to leave confidential documents unattended either in conference or guest rooms at hotels and elsewhere.
When it comes to working online, Mr. Rubin advises using two-factor authentication on all Internet-accessible accounts. He suggests locking and password-protecting your mobile phone and configuring it to automatically lock after a period of inactivity, and using secure passwords, with a different password for each device and account. Password managers like LastPass and Keeper can help you remember and manage these.
As for making purchases online, consider signing up for a credit card to be used only for such transactions. You also can set up a virtual credit card for a one-time purchase whose cost you can limit. Some of these can also be used to pay for recurring charges; those amounts can also be limited. Virtual credit cards are issued by companies such as Bank of America, Citi, Capital One, American Express and Privacy.com. According to Mr. Rubin, if the virtual credit card is compromised, it should have no impact on your physical card.
Another payment option, possibly more secure than credit cards, is PayPal, said Robert Austin, president of KoreLogic, a cybersecurity company.
BCD Travel, another travel management company, advises against posting pictures online of your itineraries, tickets or boarding passes. It also urges travelers to never leave their boarding passes and tickets on an airplane or in a hotel room, and to shred these once you’ve used them, all steps to keep cyberthieves from obtaining your travel details. Another protective measure is to use digital boarding passes issued by the airline, and apps like BCD’s TripSource, TripLingo, Apple Wallet and Google Pay. This information will be protected by the security code on your mobile phone even if the phone is lost or stolen.
John Reed Stark, former chief of the S.E.C.’s Office of Internet Enforcement and author of “The Cybersecurity Due Diligence Handbook,” advises setting up your credit card account to automatically notify you of all transactions via email or its app, which he said will make you aware of every transaction as it occurs. He also suggests setting up a separate email account for these alerts, so you can easily track them and not clog up other accounts.
To further track any suspicious activity, he advises subscribing to a credit and identity monitoring company — such as Experian, TransUnion or Equifax — that can provide alerts relating to your credit rating, credit cards and banking.
For additional protection, Mr. Rubin suggests the purchase of an individual cybersecurity insurance policy, offered by companies like Chubb and NAS Insurance. Although such policies have long existed for businesses, individual policies are a new development.
Henry Harteveldt, president of Atmosphere Research Group, a travel research company, said his company had found that a growing number of travelers were becoming uncomfortable with sharing their personal information with travel sellers.
“The lesson for travel suppliers here is that no matter how good they think their cybersecurity hardware and software practices are, they may never be good enough,” Mr. Harteveldt said. “Sadly, there will be one hacker a step ahead at some travel company.”B:
第109期零陵烟雨跑狗【迎】【上】【程】【颐】，【黄】【盖】【一】【把】【抱】【住】【程】【颐】【道】：“【扬】【希】，【你】【怎】【么】【会】【来】【这】【里】？【是】【担】【心】【我】【们】【这】【边】【的】【防】【范】【吗】？【放】【心】，【我】【已】【经】【让】【所】【有】【人】【准】【备】【好】【了】。【刘】【繇】【大】【军】【还】【没】【来】，【他】【敢】【过】【来】，【我】【们】【就】【会】【把】【他】【们】【挡】【在】【港】【口】【之】【外】，【不】【让】【他】【越】【雷】【池】【半】【步】！” 【丁】【奉】【也】【摸】【了】【摸】【鼻】【子】，【笑】【嘻】【嘻】【的】。 【程】【颐】【就】【要】【找】【借】【口】。 【却】【见】【左】【承】【祖】【插】【话】【道】：“【其】【实】，【将】【军】【此】【次】【来】
【【觅】【血】【者】！】 【【不】【是】【那】【个】【蕾】【莎】，【但】【胸】【也】【好】【大】！】 【【之】【前】【的】【水】【蓝】【色】【长】【发】【与】【冻】【住】【卡】【西】【的】【冰】【系】【魔】【法】，【与】【马】【绍】【尔】【冰】【幕】【法】【师】【团】【的】【那】【位】【副】【团】【长】【希】【薇】【娅】•【霜】【蕊】【特】【征】【吻】【合】。】 【【上】【来】【就】【用】【拙】【劣】【的】【扯】【谎】【撇】【清】【耳】【语】【教】【派】【与】【马】【绍】【尔】【家】【族】【的】【关】【系】，【莫】【非】【是】【巴】【菲】【那】【贱】【人】【的】【姘】【头】？【还】【是】【另】【有】【隐】【情】？】 【【这】【女】【人】【似】【乎】【超】【强】【的】【样】【子】【啊】，【但】【无】
【花】【白】【头】【发】【的】【老】【者】【根】【本】【就】【没】【有】【看】【龙】【展】【颜】【一】【眼】，【便】【走】【到】【桌】【上】，【迫】【不】【及】【待】【的】【打】【起】【那】【个】【瓶】【子】，【倒】【出】【一】【粒】【洗】【髓】【丹】【来】，【他】【用】【鼻】【子】【细】【细】【的】【闻】【着】。 【看】【着】【老】【者】【那】【那】【滑】【稽】【的】【模】【样】，【龙】【展】【颜】【忍】【不】【住】【笑】【了】【起】【来】。 【过】【了】【有】【五】【分】【钟】【左】【右】，【那】【花】【白】【头】【发】【的】【老】【者】【拿】【起】【那】【枚】【宗】【级】【洗】【髓】【丹】，【走】【到】【阳】【光】【下】，【细】【细】【观】【望】【了】【许】【久】。 【又】【小】【心】【翼】【翼】【的】【放】【在】【自】【己】【的】
【在】【傅】【宸】【轩】【为】【她】【扶】【簪】【子】【的】【时】【候】，【阮】【凤】【兮】【便】【顺】【从】【地】【垂】【着】【头】【看】【向】【自】【己】【的】【脚】【尖】。 【绣】【花】【鞋】【尖】【上】【的】【东】【珠】【正】【在】【阳】【光】【照】【射】【下】【散】【发】【着】【润】【泽】【的】【光】，【很】【是】【好】【看】。 【她】【垂】【着】【头】，【那】【从】【衣】【领】【中】【露】【出】【来】【的】【那】【一】【截】【细】【白】【的】【颈】【子】【便】【像】【是】【白】【天】【鹅】【修】【长】【的】【脖】【颈】【一】【般】，【在】【阳】【光】【的】【照】【射】【下】【还】【能】【看】【到】【细】【小】【的】【金】【色】【绒】【毛】。【那】【细】【白】【的】【颈】【子】【与】【她】【颈】【间】【的】【那】【串】【东】【珠】【更】【是】【相】【称】第109期零陵烟雨跑狗【蓝】【海】【市】，【张】【氏】【集】【团】【设】【计】【院】。【张】【氏】【集】【旗】【下】【的】【设】【计】【公】【司】。【今】【天】【设】【计】【院】【里】【却】【来】【了】【很】【多】【人】，【李】【云】【伟】【带】【领】【着】【桂】【省】【的】【领】【导】【班】【子】【来】【到】【设】【计】【院】，【看】【看】【张】【氏】【设】【计】【院】【设】【计】【的】【城】【市】【方】【案】。 【对】【于】【森】【林】【城】【市】【建】【设】，【任】【何】【一】【个】【设】【计】【院】【都】【没】【有】【张】【氏】【集】【团】【有】【经】【验】。【现】【在】【私】【人】【领】【就】【是】【一】【个】【巨】【大】【的】【森】【林】【城】【市】，【各】【种】【设】【施】【非】【常】【的】【完】【善】，【各】【个】【系】【统】【之】【间】【如】【何】【配】【合】，
【季】【漓】【的】【办】【事】【效】【率】【的】【确】【是】【高】【的】【很】，【很】【快】【就】【在】【院】【子】【里】【替】【殷】【清】【若】【搭】【了】【一】【个】【秋】【千】，【殷】【清】【若】【看】【着】【秋】【千】，【高】【兴】【的】【像】【个】【孩】【子】【一】【样】，【急】【忙】【的】【做】【了】【上】【去】。【让】【桐】【华】【帮】【自】【己】【替】【秋】【千】。 “【高】【点】，【桐】【华】，【再】【高】【点】……”【殷】【清】【若】【不】【过】【瘾】【的】【回】【道】。 【桐】【华】【听】【从】【殷】【清】【若】【的】【意】【见】，【将】【殷】【清】【若】【推】【的】【老】【高】【了】，【殷】【清】【若】【闭】【上】【了】【眼】【睛】，【她】【可】【以】【感】【受】【到】【风】【的】【温】【柔】，【她】
【我】【无】【意】【间】，【看】【见】【了】【顾】【启】【舟】【的】【朋】【友】【圈】【的】【大】【合】【照】，【莫】【名】【其】【妙】【地】【划】【开】【了】，【便】【开】【始】【自】【动】【自】【觉】【地】【搜】【索】【顾】【启】【舟】【这】【张】【脸】。 “【这】【种】【照】【片】【有】【什】【么】【好】【看】【的】。”【友】【人】P【从】【背】【后】【伸】【出】【手】【来】，【一】【把】【夺】【过】【我】【手】【机】，【反】【剪】【在】【背】【后】。 “【还】【给】【我】。”【我】【十】【分】【不】【满】。 【友】【人】P【偏】【不】，【指】【着】：“【删】【了】，【这】【个】【人】，【立】【刻】，【马】【上】！” “【你】【还】【给】【我】【先】。”【我】
【凤】【家】【开】【始】【有】【大】【动】【静】【了】。 【之】【前】【他】【们】【强】【占】【的】【暂】【时】【逃】【离】【四】【神】【城】【之】【人】【的】【宅】【院】，【就】【在】【这】【两】【日】【内】【被】【尽】【数】【拆】【除】，【只】【剩】【了】【一】【片】【又】【一】【片】【光】【秃】【的】【土】【地】。 【凤】【家】【做】【的】【这】【件】【事】【虽】【不】【怎】【么】【好】，【但】【多】【少】【还】【是】【可】【以】【理】【解】【的】，【毕】【竟】【这】【些】【地】【已】【经】【被】【凤】【家】【收】【为】【了】【己】【有】，【人】【家】【想】【重】【新】【建】【立】【自】【己】【产】【业】【和】【院】【子】【也】【似】【乎】【是】【在】【可】【理】【解】【的】【范】【围】【内】。 【但】【是】【白】【家】【这】【两】【日】【办】