FREE Webinar: 'Immersive Experiences Unveiled'
Join us for a FREE webinar, 'Immersive Experiences Unveiled,' on July 25.

5 Tips for Protecting Yourself From Cyberattacks

Michael Owen, managing partner at EventGenuity LLC, sums up the vulnerability we all have to cyberattacks like the ongoing global ransomware crisis on a daily basis: â€śConvenience is the enemy of security." In the world of the Internet of Things—where car keys, refrigerators, microwaves and even electric wheelchairs are vulnerable to hackers—business travelers are perhaps the most at risk. Consider these facts: > Airports acknowledge their wireless systems are not secure. > Data swipers have victimized Uber customers. > Public USB ports in hotels and convention centers can’t be fully protected. > The basic idea of having insurance is a source of public debate. Despite these details, it’s unrealistic to expect yourself, or an attendee, to give up things now considered essential—we all need to charge our devices, after all. The key is to minimize risks. “You can’t prevent everything,” acknowledges MaryAnne Bobrow, CAE, CMP, CMM, who, like Owen, regularly leads conference education sessions on security. Implement the duo’s five tips to minimize your personal cybersecurity risk—your data will thank you.


Bobrow says 16 years after 9/11, and 11 years since Hurricane Katrina, more than 50 percent of the planners she works with still don’t have an emergency plan. “It’s not sexy,” she says of security. That makes cybersecurity education sessions, in particular, a tough sell to attendees. But Bobrow and Owen say they’re worth it, not only to learn how vulnerable you are, but also how to protect attendees at your events.


Because you can’t (and shouldn’t plan) for every possible danger, Bobrow suggests planning contingencies for scenarios most likely to occur. For instance, you probably don’t have to worry about a hurricane in California, but earthquakes, fires and floods are a real concern. Owen notes this philosophy extends to data. What information might hackers be most interested in? The most likely answer is personal information like social security numbers. If you need to have a list with coveted information, place it on a device you won’t plug into a public outlet or connect a USB cable to.


Most people know their laptops and desktops (even Macs, despite popular belief!) are vulnerable to hackers. But smartphones are as susceptible to breaches. Just as Ransomware can be used to steal data off a phone, antivirus software can be installed on all devices to protect against it. Bobrow says she doesn’t do online banking on her phone to be extra cautious. Owen adds SMShing, a fraudulent kind of texting, is among the newest threats.


How sophisticated have email attacks become? In CEO fraud, the latest spear phishing threat is emails appearing to originate from company executives are sent to chief financial officers. Bobrow says such emails often refer to the status of a wire transfer. Remarkably, the tactic has proven effective. It may sound obvious, but Bobrow also emphasizes not downloading attachments from someone you don’t know. PDFs and zip files are among the most suspicious. Another commonsense defense: Don’t repeat passwords on different accounts. “You might as well leave your door unlocked,” she says.


Bobrow recalls attending a conference where a speaker from a security company mirrored the event’s registration website. Within 30 minutes, the speaker had five people try to sign up on the wrong page. Owen suggests sending a screenshot to attendees with what the real site looks like to prevent them from be fooled by fake pages.

Page 1 of 12
Next Page