Use the Cloud

When it comes to search and seizure by customs agents, the cloud is your friend. A plethora of online services today make it easy to simply copy your sensitive data – or your entire drive’s contents – up to a hosted storage server. Once again, you’ll want to make sure that the connection to whatever cloud service you’re using is encrypted. You’ll also want to make sure that the data itself is encrypted. Finally, you’ll want to leave yourself enough time prior to departure to complete the transfer.

When it comes to search and seizure by customs agents, the cloud is your friend. A plethora of online services today make it easy to simply copy your sensitive data – or your entire drive’s contents – up to a hosted storage server. Once again, you’ll want to make sure that the connection to whatever cloud service you’re using is encrypted. You’ll also want to make sure that the data itself is encrypted. Finally, you’ll want to leave yourself enough time prior to departure to complete the transfer. Depending on the amount of data you’re moving and the upload speed of your Internet connection, this could range from minutes to months. Once you’ve copied up your data, you can remove any sensitive data from your device for the border crossing. Once you get to your location, you can download the content you need.”

(Cloud image via nirak‘s Flickr photostream)


Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.