{"id":52643,"date":"2024-02-27T11:00:36","date_gmt":"2024-02-27T11:00:36","guid":{"rendered":"https:\/\/www.n-able.com\/?p=52643"},"modified":"2024-02-29T11:14:32","modified_gmt":"2024-02-29T11:14:32","slug":"your-cyber-safety-checklist-for-business-travel","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel","title":{"rendered":"Your Cyber Safety Checklist for Business Travel"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">As we roll into 2024 proper, the events are starting to appear in the calendar again. In an era where connectivity is ubiquitous and threats are omnipresent, safeguarding sensitive data and digital infrastructure demands extra attention, especially during business travel. As MSPs, your role extends beyond mere provision of services; you&#8217;re entrusted with the security and integrity of your clients&#8216; networks and systems\u2014and, of course, that includes protecting your own. With staff frequently on the move to attend events, the risks multiply exponentially, necessitating a proactive and layered approach to cybersecurity. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In this blog, our Head security Nerd Lewis Pope provides a checklist of six key strategies and precautions you can take to help fortify both your own and your clients&#8216; defenses, while also ensuring seamless mobility for teams. <\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">1. Brush up on your cybersecurity awareness training<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">One of the best places to start is by getting end-users to understand how to take ownership of their risk, and this can be done through cybersecurity-awareness training. You likely already have some sort of cyber awareness training program in place, and some training programs even have modules specific to international travel. It\u2019s a good idea to have users complete a refresher course just prior to their scheduled travel to keep the lessons learned fresh in their mind.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0<\/span><span class=\"s1\">Some things you should make sure to include in this are:<\/span><\/p>\n<ul>\n<li class=\"p3\"><span class=\"s1\"><b>Avoiding public Wi-Fi networks<\/b>\u2014Most public Wi-Fi networks are going to have minimal or no real security measures in place. Wi-Fi connections that do not require credentials are subject to being intercepted and manipulated by a physically present attacker. Have users take advantage of their phone\u2019s hotspot, issue them a cellular hotspot to use, or provide a secure VPN service. <\/span><\/li>\n<li class=\"p3\"><span class=\"s1\"><b>Never using public computers<\/b>\u2014While those complementary computers at the hotel might seem like a life-saver, their use should be reserved for emergencies and you should avoid logging into business or personal accounts while using them. You have no guarantees about the state of the computer or the network to which it\u2019s connected. <\/span><\/li>\n<li class=\"p4\"><span class=\"s1\"><b>Exercising caution with social media<\/b>\u2014Avoid oversharing or sharing live in the moment. If someone is gathering information on you via social media to prepare for a focused social engineering attack, you want to deprive them of as much intelligence as possible. Depriving an attacker of this knowledge can help reduce their effectiveness. Consider waiting until you\u2019re back from your trip and curate the best-of-the-best to post or schedule your social media posts to drop after you\u2019re already home.<\/span><\/li>\n<\/ul>\n<h2 class=\"p5\"><span class=\"s1\">2. Monitor for impossible travel<\/span><\/h2>\n<p class=\"p5\"><span class=\"s1\">If you have users logging in from different physical locations you can use conditional access and other security controls to help ensure someone is who they say they are when they try to access resources. However, any defense can be defeated, so having the ability to monitor for and block a user who, for example, logs in from San Diego at noon and then tries logging in from London an hour later is now an essential capability that IT defenders should be implementing. <\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">3. Make sure all systems and software are up to date<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">This is one of the most basic\u2014but very effective\u2014ways of keeping users safe. Make sure all systems a user takes with them are fully updated. This includes not just OS and applications, but also firmware and even a user\u2019s personal devices that may be used to access company resources while traveling. Tools like <a href=\"https:\/\/www.n-able.com\/features\/patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">N&#8209;able\u2019s Patch Management<\/span><\/a> can help automate this process for laptops, workstations, and servers.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">4. Think about hardening all devices for travel <\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">If you can stretch to it, providing a fresh, hardened laptop for international travel can be an effective step, where budgets allow. If an end-user will be doing extensive traveling, consider providing them with a freshly loaded computer that is fully patched and has your full security stack installed. This can reduce the chance that a user takes an already compromised system with them as well as ensuring the system is hardened and in a known good state. When the user returns, they can go back to their regular computer and the travel laptop can get prepped for the next user. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">If your budgets don\u2019t stretch to a whole new dedicated travel laptop, here\u2019s a list of some of the key things you should look at on existing devices to make sure they\u2019re as hard to hack as possible:<\/span><\/p>\n<ul>\n<li class=\"p6\"><span class=\"s1\"><b>Enable Bios and UEFI Passwords and Security Features<\/b>\u2014Many modern laptops include ways to improve resilience against attacks that require physical access to devices. Sure, IT might need to be able to change the device boot order but no one else should.\u00a0<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\"><b>Disable Bluetooth, USB, and external HIDs<\/b>\u2014It\u2019s all about the data and keeping it safe. By disabling or restricting Bluetooth or USB devices to a preapproved list you can prevent unintentional data leakage or even data exfiltration<\/span><\/li>\n<li class=\"p3\"><span class=\"s1\"><b>Encrypt all the things<\/b>\u2014BitLocker is the drive encryption technology of choice for many as it is a native component of Windows. Even smartphones support device encryption. If a device is lost while travelling, you need the confidence and audit trail to be able to say the device is encrypted and cannot have its data retrieved. <\/span><\/li>\n<li class=\"p3\"><span class=\"s1\"><b>Enforce idle timeouts<\/b>\u2014It\u2019s easy enough for an end-user to forget to lock their device under normal circumstances, when they\u2019re travelling this risk multiplies significantly. Setting devices to lock after a specified time can help prevent these situations, which is especially important when devices are being used in public areas. <\/span><\/li>\n<li class=\"p3\"><span class=\"s1\"><b>Look beyond browser based VPNs<\/b>\u2014While a browser based VPN might protect you from advertisers and data brokers, it won\u2019t offer the security controls needed for business environments. A solution like <a href=\"https:\/\/www.n-able.com\/products\/dns-filtering\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">DNS filtering is a better option for SMBs<\/span><\/a>.<\/span><\/li>\n<li class=\"p3\"><span class=\"s1\"><b>Improve end-user device security<\/b>\u2014Anything you can do to make an end-user safer while they are travelling makes everybody\u2019s life easier. Having an endpoint-protection solution with detection and remediation capabilities can help keep remote support tickets to a minimum by keeping users out of trouble in the first place. If and when they do get into trouble, having automatic remediation and rollback capabilities offered by solutions like <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">N&#8209;able\u2019s EDR<\/span><\/a> will reduce downtime for the end-user and help keep any nasty surprises from coming back home with the device.<\/span><\/li>\n<li class=\"p3\"><span class=\"s1\"><b>Use agent-based DNS and content filtering<\/b>\u2014Once an endpoint is no longer on the office network, it loses any protection that may have been provided by firewalls or other network security appliances. <a href=\"https:\/\/www.n-able.com\/products\/dns-filtering\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">N&#8209;able\u2019s DNS Filter<\/span><\/a> provides agent-based protection no matter what network the device is connected to.<\/span><\/li>\n<li class=\"p7\"><span class=\"s1\"><b>Provide a Privacy Screen Filter<\/b>\u2014In environments where users handle sensitive information such as PII, EHR, or classified or trade secrets, and those users\u2019 monitors can be seen by others that shouldn\u2019t see that information you either give them their own office or give them privacy filters on their screens in a shared workspace. This should also apply to mobile users. Privacy screens on laptops, mobile devices, and tablets.<\/span><\/li>\n<\/ul>\n<h2 class=\"p2\"><span class=\"s1\">5. Backup devices before and during if possible<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">A laptop gets dropped in a conference hall. A phone gets left in a taxi. A tablet gets left at a party venue. There a myriad ways for things to go wrong when you\u2019re travelling that can result in the loss of data. You can minimize the impact of this by making sure devices and data are fully backed-up prior to the trip. If possible, use a bandwidth efficient, <a href=\"https:\/\/www.n-able.com\/what-is-cloud-first-backup?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">cloud-first backup<\/span><\/a> solution like <a href=\"http:\/\/www.n-able.com\/products\/cove-data-protection?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">N&#8209;able\u2019s Cove Data Protection<\/span><\/a> that will let you perform <a href=\"https:\/\/www.n-able.com\/products\/cove-data-protection\/backup?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">device backups<\/span><\/a> no matter where they are.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">6. MFA all the things<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">While this should be standard practice at this point for MSPs and their clients, all services and devices that support MFA should have it enabled. When an end-user is traveling, especially abroad, it makes it more challenging to monitor and audit their access to systems. If an end-user will be travelling and they need access to a service that does not support MFA, consider providing access to this service only over a secure VPN connection that itself requires MFA. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Of course this is not an exhaustive list of things you can do to help protect staff when travelling, but it does cover the basics. And if there is one thing we\u2019ve learned over the past few years in cybersecurity it\u2019s that covering the basics is essential. <\/span><\/p>\n<p class=\"p2\"><span class=\"s7\"><b>Stay safe! Particularly if you\u2019re travelling to our next Empower event<\/b><\/span><span class=\"s8\"><b> which is taking place at the Omni PGA Frisco Resort, Texas from March 25-28, 2024. If you\u2019ve not yet booked your ticket you can\u00a0<\/b><a href=\"https:\/\/empower.n-able.com\/event\/12f48222-d92b-48fc-ba95-76e57c48a549\/summary\" target=\"_blank\" rel=\"noopener\"><span class=\"s9\"><b>register here.<\/b><\/span><\/a><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s10\">@cybersec_nerd<\/span><\/a><\/span><\/p>\n<p class=\"p9\"><span class=\"s7\">LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\"><span class=\"s10\">thesecuritypope<\/span><\/a><\/span><\/p>\n<p class=\"p9\"><span class=\"s7\">Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\"><span class=\"s10\">cybersec_nerd<\/span><\/a><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With more and more people traveling for a range of business events, Lewis Pope walks Pete Roythorne through some of the key ways you can help protect staff away from&#8230;<\/p>\n","protected":false},"author":63,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-52643","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Your Cyber Safety Checklist for Business Travel - N-able<\/title>\n<meta name=\"description\" content=\"With more and more people traveling for a range of business events, here are some of the key ways you can help protect staff away from home.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Cyber Safety Checklist for Business Travel - N-able\" \/>\n<meta property=\"og:description\" content=\"With more and more people traveling for a range of business events, here are some of the key ways you can help protect staff away from home.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-27T11:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-29T11:14:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/02\/240209_BB_CyberSafetyChecklistBusinessTravel_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pete Roythorne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pete Roythorne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel\"},\"author\":{\"name\":\"Pete Roythorne\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\"},\"headline\":\"Your Cyber Safety Checklist for Business Travel\",\"datePublished\":\"2024-02-27T11:00:36+00:00\",\"dateModified\":\"2024-02-29T11:14:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel\"},\"wordCount\":1472,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel\",\"name\":\"Your Cyber Safety Checklist for Business Travel - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2024-02-27T11:00:36+00:00\",\"dateModified\":\"2024-02-29T11:14:32+00:00\",\"description\":\"With more and more people traveling for a range of business events, here are some of the key ways you can help protect staff away from home.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Patch Management\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/patch-management\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Cyber Safety Checklist for Business Travel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\",\"name\":\"Pete Roythorne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"caption\":\"Pete Roythorne\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Your Cyber Safety Checklist for Business Travel - N-able","description":"With more and more people traveling for a range of business events, here are some of the key ways you can help protect staff away from home.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel","og_locale":"de_DE","og_type":"article","og_title":"Your Cyber Safety Checklist for Business Travel - N-able","og_description":"With more and more people traveling for a range of business events, here are some of the key ways you can help protect staff away from home.","og_url":"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-02-27T11:00:36+00:00","article_modified_time":"2024-02-29T11:14:32+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/02\/240209_BB_CyberSafetyChecklistBusinessTravel_ss.jpg","type":"image\/jpeg"}],"author":"Pete Roythorne","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Pete Roythorne","Gesch\u00e4tzte Lesezeit":"7\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel"},"author":{"name":"Pete Roythorne","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837"},"headline":"Your Cyber Safety Checklist for Business Travel","datePublished":"2024-02-27T11:00:36+00:00","dateModified":"2024-02-29T11:14:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel"},"wordCount":1472,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel","url":"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel","name":"Your Cyber Safety Checklist for Business Travel - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2024-02-27T11:00:36+00:00","dateModified":"2024-02-29T11:14:32+00:00","description":"With more and more people traveling for a range of business events, here are some of the key ways you can help protect staff away from home.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/your-cyber-safety-checklist-for-business-travel#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Patch Management","item":"https:\/\/www.n-able.com\/de\/blog\/category\/patch-management"},{"@type":"ListItem","position":2,"name":"Your Cyber Safety Checklist for Business Travel"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837","name":"Pete Roythorne","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","caption":"Pete Roythorne"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/52643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=52643"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/52643\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=52643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}