{"id":26255,"date":"2025-10-22T11:24:17","date_gmt":"2025-10-22T10:24:17","guid":{"rendered":"https:\/\/reedmackay.com\/how-to-choose-a-sustainable-hotel"},"modified":"2025-12-12T16:50:12","modified_gmt":"2025-12-12T16:50:12","slug":"cybersecurity-everything-a-travel-manager-needs-to-know","status":"publish","type":"post","link":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know","title":{"rendered":"Cybersecurity tips for business travel: a guide for travel managers"},"content":{"rendered":"\n<p>Cybersecurity\u00a0is a growing concern for businesses. As a\u00a0travel manager, advising your business travelers on cybersecurity is a crucial part of\u00a0risk management. Cyber attacks can lead to financial losses, operational disruptions, and reputational damage.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-1024x683.jpg\" alt=\"\" class=\"wp-image-46628\" srcset=\"https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-1024x683.jpg 1024w, https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-300x200.jpg 300w, https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-768x512.jpg 768w, https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-1536x1025.jpg 1536w, https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-2048x1367.jpg 2048w, https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-930x620.jpg 930w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Being extra vigilant about cybersecurity is becoming increasingly crucial<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><br><strong>Why cybersecurity matters in business travel<\/strong><\/h2>\n\n\n\n<p>Unfortunately,\u00a0<a href=\"https:\/\/www.europarl.europa.eu\/topics\/en\/article\/20220120STO21428\/cybersecurity-main-and-emerging-threats\"><strong>one of the growing threats to businesses is the risk to cybersecurity<\/strong><\/a>. And examples of these types of breaches are never far from the news. <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/threat-landscape\/microsoft-digital-defense-report-2024\"><strong>Microsoft estimated that its customers faced 600 million cyber attacks per day globally last year<\/strong><\/a>.<\/p>\n\n\n\n<p>Protecting clients\u2019 personal data and information must be a priority for all businesses. And, with\u00a0<strong><a href=\"https:\/\/www.gbta.org\/global-business-travel-spending-to-reach-1-57-trillion-in-2025-amid-trade-policy-uncertainty-and-economic-risk-according-to-new-gbta-forecast\/\">business travel spending worldwide projected to reach an all-time high of $1.57 trillion by the end of 2025<\/a><\/strong>, more travelers will be venturing outside their secure office computer systems. This means they may become more vulnerable to cyber attacks.<\/p>\n\n\n\n<p>It\u2019s crucial that business travelers understand the risks and the implications for their organization if there is a breach in cybersecurity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"756\" src=\"https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_1095422036-1024x756.jpg\" alt=\"\" class=\"wp-image-46635\" srcset=\"https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_1095422036-1024x756.jpg 1024w, https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_1095422036-300x222.jpg 300w, https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_1095422036-768x567.jpg 768w, https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_1095422036-1536x1134.jpg 1536w, https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_1095422036-2048x1512.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Stay safe: traveling makes you more vulnerable to cyber attacks and data loss<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><br><strong>Top 16 cybersecurity tips for business travelers<\/strong><\/h2>\n\n\n\n<p>Traveling makes you, your data, and your devices more vulnerable to cyber attacks and data loss. Here are some ways you can minimize these risks for your travelers and your organization.<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Lock your devices<\/strong>. Use passwords, PINs, fingerprint matching, or facial recognition to protect them.<br><br><\/li>\n\n\n\n<li><strong>Use multifactor authentication (MFA)<\/strong> for your work and personal accounts. And only accept an MFA challenge if you initiated it yourself.<br><br><\/li>\n\n\n\n<li><strong>Use strong, unique passwords<\/strong>. At least 12 characters with numbers, symbols, and mixed-case letters.<br><br><\/li>\n\n\n\n<li><strong>Use a password manager<\/strong>. Securely store and manage your credentials.<br><br><\/li>\n\n\n\n<li><strong>Avoid public Wi-Fi networks and unknown Bluetooth devices<\/strong>. Use your company\u2019s VPN to secure your connection.<br><br><\/li>\n\n\n\n<li><strong>Limit location sharing on social media<\/strong>. Prevent phishing and social engineering attacks.<br><br><\/li>\n\n\n\n<li><strong>Avoid public USB charging ports<\/strong>. Carry a portable battery instead.<br><br><\/li>\n\n\n\n<li><strong>Watch out for shoulder surfing<\/strong>. Use privacy screens and avoid discussing sensitive information in public.<br><br><\/li>\n\n\n\n<li><strong>Keep software updated<\/strong>. Install updates before traveling to avoid large downloads on the go.<br><br><\/li>\n\n\n\n<li><strong>Run updated antivirus software. <\/strong>Protect against malware from compromised networks and emails.<br><br><\/li>\n\n\n\n<li><strong>Secure devices in hotel safes. <\/strong>Rooms may be open for long periods of time during cleaning.<br><br><\/li>\n\n\n\n<li><strong>Enable &#8220;Find my device<\/strong>&#8221; or similar services. Remotely block or wipe lost or stolen devices.<br><br><\/li>\n\n\n\n<li><strong>Don\u2019t post travel documents online<\/strong>. Boarding passes and itineraries contain personal data.<br><br><\/li>\n\n\n\n<li><strong>Use secure travel apps<\/strong>.&nbsp;<a href=\"https:\/\/reedmackay.com\/us\/our-platform\"><strong>Our mobile app<\/strong><\/a> and digital boarding passes offer added protection.<br><br><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/reedmackay.com\/us\/whats-new-visas-and-travel-regulations\">Apply for visas<\/a> via trusted sources<\/strong>. Contact your TMC for safe e-visa application sites.<br><br><\/li>\n\n\n\n<li><strong>Report device issues immediately<\/strong>. IT teams can contain threats before they spread.<br><\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/reedmackay.com\/us\/contact\">Get in touch<\/a><\/h3>\n\n\n\n<p>Email us\u00a0<a href=\"mailto:helloUS@reedmackay.com\"><strong>helloUS@reedmackay.com<\/strong><\/a>\u00a0to discuss all of your\u00a0<a href=\"https:\/\/reedmackay.com\/us\/corporate-travel-management\"><strong>corporate travel<\/strong><\/a>\u00a0and\u00a0<a href=\"https:\/\/reedmackay.com\/us\/event-management\"><strong>event management<\/strong><\/a>\u00a0needs.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity\u00a0is a growing concern for businesses. As a\u00a0travel manager, advising your business travelers on cybersecurity is a crucial part of\u00a0risk management. Cyber attacks can lead to financial losses, operational disruptions, and reputational damage. Why cybersecurity matters in business travel Unfortunately,\u00a0one of the growing threats to businesses is the risk to cybersecurity. And examples of these&hellip;&nbsp;<a href=\"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Cybersecurity tips for business travel: a guide for travel managers<\/span><\/a><\/p>\n","protected":false},"author":39,"featured_media":19916,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"[\"title\",\"meta\",\"thumbnail\",\"content\",\"tags\",\"comments\"]","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[171],"tags":[966,172,644],"class_list":["post-26255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles-us","tag-business-travel-us","tag-cyber-security-us","tag-risk-management-us"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity: everything a travel manager needs to know<\/title>\n<meta name=\"description\" content=\"Travel can make you, your data, and your devices more vulnerable to cyber attacks. Read our guide on cybersecurity for business travelers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security: everything a travel manager needs to know\" \/>\n<meta property=\"og:description\" content=\"Travel can make you, your data and your devices more vulnerable to cyber attacks. Read our guide on cyber security for business travellers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know\" \/>\n<meta property=\"og:site_name\" content=\"Reed &amp; Mackay\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-22T10:24:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-12T16:50:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Francesca Chapman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyber security: everything a travel manager needs to know\" \/>\n<meta name=\"twitter:description\" content=\"Travel can make you, your data and your devices more vulnerable to cyber attacks. Read our guide on cyber security for business travellers.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-scaled.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francesca Chapman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know\"},\"author\":{\"name\":\"Francesca Chapman\",\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us#\\\/schema\\\/person\\\/7e3b6f9c7a90e560002dd288042aed8a\"},\"headline\":\"Cybersecurity tips for business travel: a guide for travel managers\",\"datePublished\":\"2025-10-22T10:24:17+00:00\",\"dateModified\":\"2025-12-12T16:50:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/reedmackay.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Reed-and-Mackay-Corporate-Travel-and-Events-Management-1080-x-768-px-35.jpg\",\"keywords\":[\"Business travel\",\"Cyber Security\",\"Risk management\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know\",\"url\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know\",\"name\":\"Cybersecurity: everything a travel manager needs to know\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/reedmackay.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Reed-and-Mackay-Corporate-Travel-and-Events-Management-1080-x-768-px-35.jpg\",\"datePublished\":\"2025-10-22T10:24:17+00:00\",\"dateModified\":\"2025-12-12T16:50:12+00:00\",\"description\":\"Travel can make you, your data, and your devices more vulnerable to cyber attacks. Read our guide on cybersecurity for business travelers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know#primaryimage\",\"url\":\"https:\\\/\\\/reedmackay.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Reed-and-Mackay-Corporate-Travel-and-Events-Management-1080-x-768-px-35.jpg\",\"contentUrl\":\"https:\\\/\\\/reedmackay.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Reed-and-Mackay-Corporate-Travel-and-Events-Management-1080-x-768-px-35.jpg\",\"width\":1080,\"height\":850},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/cybersecurity-everything-a-travel-manager-needs-to-know#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/reedmackay.com\\\/us\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity tips for business travel: a guide for travel managers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us#website\",\"url\":\"https:\\\/\\\/reedmackay.com\\\/us\",\"name\":\"Reed & Mackay\",\"description\":\"Reed and Mackay Travel and Events Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/reedmackay.com\\\/us?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us#organization\",\"name\":\"Reed & Mackay\",\"url\":\"https:\\\/\\\/reedmackay.com\\\/us\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/reedmackay.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RM-Horz-Logo-Colour@2x.png\",\"contentUrl\":\"https:\\\/\\\/reedmackay.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RM-Horz-Logo-Colour@2x.png\",\"width\":2107,\"height\":411,\"caption\":\"Reed & Mackay\"},\"image\":{\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/reedmackay.com\\\/us#\\\/schema\\\/person\\\/7e3b6f9c7a90e560002dd288042aed8a\",\"name\":\"Francesca Chapman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7e5d4bff98a295f4b23c895fc2046c3d6326247b619d28535a2820c99c4f7d53?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7e5d4bff98a295f4b23c895fc2046c3d6326247b619d28535a2820c99c4f7d53?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7e5d4bff98a295f4b23c895fc2046c3d6326247b619d28535a2820c99c4f7d53?s=96&d=mm&r=g\",\"caption\":\"Francesca Chapman\"},\"url\":\"https:\\\/\\\/reedmackay.com\\\/us\\\/author\\\/francesca\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: everything a travel manager needs to know","description":"Travel can make you, your data, and your devices more vulnerable to cyber attacks. Read our guide on cybersecurity for business travelers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know","og_locale":"en_US","og_type":"article","og_title":"Cyber security: everything a travel manager needs to know","og_description":"Travel can make you, your data and your devices more vulnerable to cyber attacks. Read our guide on cyber security for business travellers.","og_url":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know","og_site_name":"Reed &amp; Mackay","article_published_time":"2025-10-22T10:24:17+00:00","article_modified_time":"2025-12-12T16:50:12+00:00","og_image":[{"width":2560,"height":1708,"url":"https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-scaled.jpg","type":"image\/jpeg"}],"author":"Francesca Chapman","twitter_card":"summary_large_image","twitter_title":"Cyber security: everything a travel manager needs to know","twitter_description":"Travel can make you, your data and your devices more vulnerable to cyber attacks. Read our guide on cyber security for business travellers.","twitter_image":"https:\/\/reedmackay.com\/wp-content\/uploads\/2024\/03\/shutterstock_515725240-scaled.jpg","twitter_misc":{"Written by":"Francesca Chapman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know#article","isPartOf":{"@id":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know"},"author":{"name":"Francesca Chapman","@id":"https:\/\/reedmackay.com\/us#\/schema\/person\/7e3b6f9c7a90e560002dd288042aed8a"},"headline":"Cybersecurity tips for business travel: a guide for travel managers","datePublished":"2025-10-22T10:24:17+00:00","dateModified":"2025-12-12T16:50:12+00:00","mainEntityOfPage":{"@id":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know"},"wordCount":467,"publisher":{"@id":"https:\/\/reedmackay.com\/us#organization"},"image":{"@id":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know#primaryimage"},"thumbnailUrl":"https:\/\/reedmackay.com\/wp-content\/uploads\/2023\/12\/Reed-and-Mackay-Corporate-Travel-and-Events-Management-1080-x-768-px-35.jpg","keywords":["Business travel","Cyber Security","Risk management"],"articleSection":["Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know","url":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know","name":"Cybersecurity: everything a travel manager needs to know","isPartOf":{"@id":"https:\/\/reedmackay.com\/us#website"},"primaryImageOfPage":{"@id":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know#primaryimage"},"image":{"@id":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know#primaryimage"},"thumbnailUrl":"https:\/\/reedmackay.com\/wp-content\/uploads\/2023\/12\/Reed-and-Mackay-Corporate-Travel-and-Events-Management-1080-x-768-px-35.jpg","datePublished":"2025-10-22T10:24:17+00:00","dateModified":"2025-12-12T16:50:12+00:00","description":"Travel can make you, your data, and your devices more vulnerable to cyber attacks. Read our guide on cybersecurity for business travelers.","breadcrumb":{"@id":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know#primaryimage","url":"https:\/\/reedmackay.com\/wp-content\/uploads\/2023\/12\/Reed-and-Mackay-Corporate-Travel-and-Events-Management-1080-x-768-px-35.jpg","contentUrl":"https:\/\/reedmackay.com\/wp-content\/uploads\/2023\/12\/Reed-and-Mackay-Corporate-Travel-and-Events-Management-1080-x-768-px-35.jpg","width":1080,"height":850},{"@type":"BreadcrumbList","@id":"https:\/\/reedmackay.com\/us\/cybersecurity-everything-a-travel-manager-needs-to-know#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/reedmackay.com\/us"},{"@type":"ListItem","position":2,"name":"Cybersecurity tips for business travel: a guide for travel managers"}]},{"@type":"WebSite","@id":"https:\/\/reedmackay.com\/us#website","url":"https:\/\/reedmackay.com\/us","name":"Reed & Mackay","description":"Reed and Mackay Travel and Events Management","publisher":{"@id":"https:\/\/reedmackay.com\/us#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/reedmackay.com\/us?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/reedmackay.com\/us#organization","name":"Reed & Mackay","url":"https:\/\/reedmackay.com\/us","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/reedmackay.com\/us#\/schema\/logo\/image\/","url":"https:\/\/reedmackay.com\/wp-content\/uploads\/2023\/07\/RM-Horz-Logo-Colour@2x.png","contentUrl":"https:\/\/reedmackay.com\/wp-content\/uploads\/2023\/07\/RM-Horz-Logo-Colour@2x.png","width":2107,"height":411,"caption":"Reed & Mackay"},"image":{"@id":"https:\/\/reedmackay.com\/us#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/reedmackay.com\/us#\/schema\/person\/7e3b6f9c7a90e560002dd288042aed8a","name":"Francesca Chapman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7e5d4bff98a295f4b23c895fc2046c3d6326247b619d28535a2820c99c4f7d53?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e5d4bff98a295f4b23c895fc2046c3d6326247b619d28535a2820c99c4f7d53?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e5d4bff98a295f4b23c895fc2046c3d6326247b619d28535a2820c99c4f7d53?s=96&d=mm&r=g","caption":"Francesca Chapman"},"url":"https:\/\/reedmackay.com\/us\/author\/francesca"}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/reedmackay.com\/us\/wp-json\/wp\/v2\/posts\/26255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reedmackay.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reedmackay.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reedmackay.com\/us\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/reedmackay.com\/us\/wp-json\/wp\/v2\/comments?post=26255"}],"version-history":[{"count":0,"href":"https:\/\/reedmackay.com\/us\/wp-json\/wp\/v2\/posts\/26255\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reedmackay.com\/us\/wp-json\/wp\/v2\/media\/19916"}],"wp:attachment":[{"href":"https:\/\/reedmackay.com\/us\/wp-json\/wp\/v2\/media?parent=26255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reedmackay.com\/us\/wp-json\/wp\/v2\/categories?post=26255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reedmackay.com\/us\/wp-json\/wp\/v2\/tags?post=26255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}