Posts
Cybersecurity and Digital Privacy Tips for International Travel
July 14, 2025 • Cybersecurity
Picture this: You’re on a cross-country flight, reviewing documents on your laptop. After a moment, you notice the passenger beside you has abandoned their in-flight entertainment. Instead they’re riveted by something far more interesting — the sensitive organizational data glowing on your screen. Who are they? And how much have they read?
While movies may show a hacker sitting in the corner of the coffee shop as the biggest cybersecurity threat outside your home, the most likely threats are far more straightforward. Lost or stolen devices with applications still open, or curious neighbors with eyes on your screen are more likely to compromise your data than anything installing VPN will guard against.
Protecting your organization while traveling requires a strategic approach that prioritizes your biggest areas of concern. These tips look beyond the security theater to focus on what’s most important to remember while traveling — and the simple, low-cost solutions that offer protection in the real world.
Understanding the digital threat landscape when traveling
Before investing in security measures to ensure you and your team travel safely, you need to understand what you’re facing. The best place to start is threat modeling, which breaks down what you are trying to protect and who you are trying to protect it against.
When traveling abroad, the threat landscape includes the risks of working in any public space. Below is a breakdown of the data security risks you or your team could face:
Breach by proximity
The person next to you on a flight reads sensitive documents on your screen. This happens constantly, and human curiosity makes it nearly inevitable when working on glowing screens in cramped spaces.
Breach by opportunity
Rideshare drivers overhearing sensitive phone conversations about strategy, legal cases, or campaign plans. These conversations typically happen in what feels like a private space but actually occur in the presence of strangers.
Loss or theft of private property
Device loss or theft during transit: Laptops left behind at TSA checkpoints, phones dropped on the metro, or bags stolen from hotel rooms are all scenarios that pose immediate risks for data exposure.
Targeted government investigation
Border agents confiscating devices for forensic data extraction. While this generates headlines and anxiety, it affects a smaller subset of travelers than the daily privacy breaches outlined above.
State-level surveillance
Your data is compromised as a result of using state-owned ISPs (internet service providers). This sophisticated threat requires specific countermeasures but applies only to certain destinations. Freedom House offers a breakdown of countries that pose the greatest risk.
Poor security over public networks
The rarest threat is criminals in coffee shops who attempt to steal passwords through network interception. VPN advertisements may promise protection, but modern web security practices also make these attacks nearly impossible.
Debunking security theater: Don’t fall for the marketing hype
With so many scenarios and concerns to take into account while traveling abroad, looking for simple fixes can be tempting. However, before putting all of your faith in some of the more heavily-marketed “solutions,” consider whether the investment is actually worth it.
VPNs
Advertisements for VPN (virtual private network) services often promise protection from cybercriminals stealing passwords on public WiFi. However, this threat became largely obsolete when HTTPS encryption became universal years ago. In fact, Chrome stopped displaying lock icons because secure connections became so standard that the browser now blocks non-HTTPS websites entirely.
That said, VPNs do provide legitimate benefits: they obscure your IP address for privacy purposes and help circumvent censorship in restrictive countries. In restrictive destinations, VPN use may also be criminalized, so be sure to consult with a legal advisor before traveling to a location with laws restricting VPN use.
Burner devices
Temporary or burner devices such as phones or laptops represent another area where marketing exceeds utility. These devices make sense when you have time and resources to prepare before your trip. They do help minimize data exposure, and bringing an expendable burner device mitigates the risk of the loss or confiscation of a “real” device.
However, burner devices require preparation and coordination, particularly in a work context. Your staff may still need access to work systems and communication tools, and the logistical complexity of accommodating a duplicate device must be considered alongside the security benefits. Organizations with strong device management and data minimization policies may find device preparation more effective than replacement.
Security fundamentals when travelling and working abroad
Your organization can address common travel security risks with a few low-tech solutions:
Privacy screens
A $30-50 investment in laptop and phone privacy screens offers a vital first line of defense against visual eavesdropping. With a privacy screen, when you turn your device at an angle, the screen becomes unreadable to anyone not directly in front of it. This simple tool protects you from nosy seatmates, hotel lobby lurkers, and conference attendees trying to glimpse confidential materials.
Situational awareness
Training your team to notice their environment while traveling is just as important as any technical protection. Who around you can see your screens in airports, planes, and hotels? Who can overhear phone calls and discussions? Where are you setting down your device? Just as with any other crime of opportunity, knowing your surroundings helps prevent incidents while traveling.
Encryption
Depending on your device, encryption is either available or already enabled as a default feature. Android and iPhone mobile devices are encrypted by default when you set a passcode, and Apple laptops can be encrypted with FileVault. For PCs, laptops with Windows Pro come with an encryption tool called BitLocker.
Power-off / log-out protocols
Your device’s most secure state is “before first unlock” — after powering off but before entering your passcode. Always turn devices completely off if you’re going to be separated from them, especially for luggage storage, hotel rooms, and border crossings. This prevents biometric authentication bypass and significantly reduces data accessibility.
Strong, unique passcodes of six or more alphanumeric characters provide better security than biometric-only authentication for travel situations. Implementing organization-wide policies for passcodes and automatic device locking after five minutes of inactivity also provide protection against opportunistic access.
Advanced data protection with a ‘clean device’ strategy
For those travelling to high-risk areas or those concerned about being targeted by government officials, data minimization becomes crucial. A “clean device” approach significantly reduces exposure if your phones or laptops are compromised.
Pre-travel preparation involves clearing downloads and desktop files, enabling disappearing messages for sensitive conversations, and logging out of all cloud accounts and applications. Develop habits of logging out of work accounts like Google Workspace or Microsoft 365 after each work session rather than staying signed in. Clear your cache and cookies after logging out to ensure the software doesn’t allow you to bypass the full authentication process the next time you log in. You should only log back into accounts when actively working in those applications.
This strategy proves particularly effective because logged-out accounts cannot be accessed for data extraction, even if someone gains access to your device. Cloud-first workflows with shared drives further minimize locally stored data, ensuring important materials remain accessible from other devices even if a device is lost or confiscated.
For iPhone users, Apple’s Lockdown Mode provides enhanced security against sophisticated attacks. The power-off strategy becomes especially important here, as devices remain most secure in the “before first unlock” state.
A burner device could be used as the “clean device” in this scenario, if removing local data from a “regular” phone or laptop is not possible or practical.
Addressing privacy concerns at border crossings in the U.S. and beyond
When approaching border checkpoints in areas where you or your team may be a target, combine the above elements into a three-step preparation. Log out of all cloud accounts, minimize local data storage, and ensure devices are updated and powered off.
While this approach minimizes data exposure, the legal aspects of recovering a seized device require civil rights attorneys to resolve. Border security while traveling is commonly seen as an IT/cybersecurity issue, but it is just as much a digital rights issue. As privacy concerns have grown with recent incidents at U.S. border crossings, the best guides will be constitutional rights organizations like the ACLU.
Your roadmap to more secure travel
Effective travel security requires systematic implementation rather than ad-hoc responses to perceived security issues. In most cases, comparatively low-tech changes such as privacy screens for phones and laptops and mobile device management best practices will offer more benefits than burner phones and VPN tools.
The most effective travel security policies for nonprofits and mission-driven organizations focus on actual risks rather than fears. When you ground security decisions in real threat models rather than advertising campaigns, you protect your organization’s ability to pursue its mission while traveling confidently in a rapidly changing world.

