We are in the middle of the vacation period, starting to plan or enjoy personal and professional rest. Now, this does not imply that we should lower our guard.
At the enterprise level is an ideal time to perform all kinds of installations, upgrades, migrations and any other changes or revisions in the system security environment. Especially those tasks that we have had for the rest of the year, to postpone so as not to disrupt the daily operations of the business activity.
On a personal level and despite being considered a period of disconnection from the daily routine, we have so assimilated new technologies that, according to industry statistics, the use of applications, social networks and websites for leisure and booking accommodation and activities, increases by 200% in summer. Not only among adults, but also and especially among minors and teenagers.
Be alert to the following vacation risks:
- Detect and avoid fake vacation rentals and reservations. Always using websites and applications of official companies in the tourism sector.
- Be wary of bargains, sweepstakes and discounts. Especially if they do not have accessible conditions or terms of participation in which detailed information is given.
- Do not accept just any payment method. If you are asked to enter all your card details in a single form, without a payment gateway, it could be a fraud.
- Back up your device before you leave. This way in case of loss or theft of our cell phone we will avoid losing all personal information and photographs.
- Download only strictly useful applications and delete them when you return from vacation. It is especially recommended not to maintain applications for establishments, events, games (hotels, weddings, leisure, etc.), otherwise they will continue to record information.
- Be careful about using public wifi networks. Do not connect to free networks that are open and in which no connection code is required, if it is not strictly necessary or urgent.
- Do not click on links or download files from e-mails. Especially if they are from recipients you don’t know or are not related to your vacation.
- It is not necessary to publish all our vacation activity in a detailed and live way. Unless we are instagramers and make a living from it, the worst thing that can happen to us if we constantly publish personal information about destination, location, dates, photos, videos, etc. is that we may be not only victims of cyberattacks, but also of break-ins and robberies at home. Cybercriminals are criminals who have evolved with new technologies, but that does not mean that they stop using in addition other “old school” methods (stealing, scamming, blackmailing, etc.).
IMPORTANT NOTE: If you have the slightest suspicion about a communication or believe you may have been the victim of a cyberattack, do not hesitate to report it to your line manager, the CISO Security Manager and the IT department, so that they can advise you appropriately. And on a personal level he reports the cyberattack to the police authority.
*Shipment date: June 23, 2025

