Border security agents are increasingly forcing international travelers to surrender passwords, unlock and decrypt mobile devices, and allow inspection and backup of mobile device contents. Travelers who lose their data are not victims but targets for prosecution and legal action by data owners and privacy legislators. What are the new best practices for data travel hygiene?
1: Understand mobile vulnerabilities encryption will not protect against.
2: Discuss innovative solutions.
3: Brainstorm best practices.
Protecting Data & Applied Crypto Mobile & IoT Security
mobile security endpoint security encryption strategy & trends data security BYOD
Share With Your Community