Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

1 min read

Guest Networks: How to protect your Internet Privacy and Information While Traveling

The holiday travel season is just around the corner, and whether you're traveling by plane, train, or automobile, you will likely need to join a guest or public network if you don't have a reliable hotspot. But the reality is you're potentially opening yourself up to fraud and identity theft. So how do you keep yourself safe and your data secure? Read below for tips and best practices on reducing your risk while traveling. 

9 Tips for Protecting Your Privacy While Traveling

  1. Set up Multi-Factor Authentication (MFA) on all accounts that can utilize it before leaving home. This includes email, social media, productivity, and many others.
  2. ALWAYS use a Virtual Private Network (VPN) as guest and or public networks might be unencrypted which means all of your traffic is potentially sent “in the clear.”
  3. Avoid accessing important accounts if not absolutely necessary (financial, business, medical, etc).
  4. Do not stay connected to public accessible networks indefinitely and do not stay logged into accounts. Sign out of accounts when you are finished using them. This includes gaming devices. 
  5. Consider using a Virtual Machine (VM) as they are great for segmenting your personal computer files and system from prying eyes. 
  6. Only log in to familiar sites with secured connections (look for HTTPS).
  7. Adjust settings to ensure your devices are not automatically connecting to WiFi networks.
  8. Don’t forget physical security measures too! Consider installing a privacy screen to deter shoulder surfing.
  9. Consider not broadcasting that you and/or your family will be away from home, or where you are going on social media. This includes “checking in” to locations as well as immediately uploading and geotagging pictures on social media posts. 


Employing these will provide an effective base for you and your family’s overall security while traveling. Best of all, they’re easy to implement!

Subscribe to Network Security News