It’s a scene that we have seen many times; on a beautiful Greek beach, an executive reviews a contract on his tablet and responds to two urgent emails. Then, he absentmindedly slips the tablet under his towel and goes for a swim. Ten minutes later, the tablet is gone. No strong password. No encryption.  And, of course, the tablet is full of sensitive data.

This type of incident, once rare, has become a summer classic. Summer doesn’t suspend security obligations or cyber threats. While offices empty out, hackers never really go on vacation.

So, how can you enjoy your vacation without putting your company’s data at risk? How can you stay vigilant without becoming paranoid or ruining your ten days at the beach? In our August series, we are sharing our tips so you can have a serene summer, and  come back to work without issues.

Illusory disconnect, genuine vulnerability

It is often believed that vacations are synonymous with a digital break. In reality, this is one of the most risky times for IT security: employees connected to public networks, equipment taken on the move, reduced vigilance, and less internal supervision.

Some figures speak for themselves: according to a study by NordLayer (2023), more than a third of cybersecurity incidents in companies occur during holiday periods, particularly July-August and December.

Last August, a lawyer working for a large French industrial group logged into his webmail from Athens airport. He entered his login details on what he thought was the airport’s Wi-Fi portal. In reality, it was a malicious copy. The next day, his access was compromised and confidential documents were exfiltrated. The incident required a CNIL alert and a complete audit of connections.

Why summer amps up the risks

It is the context that weakens cyber defenses.

  • First, attention wanes. The brain is elsewhere, priorities are different.
  • Second, environments are less controlled: hotels, vacation homes, cafés, trains, airports…
  • Finally, IT or security teams are also operating at reduced capacity, and emergency procedures are sometimes poorly defined.

Add to this a psychological factor: excessive confidence in personal technology. Many people believe that their phone, tablet, or PC is “secure” without checking that encryption is enabled or that connections are secure.

VPN, partitioning, access management: truly useful reflexes

You don’t need to be a cybersecurity expert to take effective measures. But you still need to plan ahead before you leave. A professional VPN, for example, remains one of the simplest and most effective ways to secure your communications—even on questionable connections.

Another often overlooked point is the separation between professional and personal life. Using the same device for everything is a common but risky habit. Creating separate sessions, activating a secure workspace or even carrying two devices if possible, significantly limits the damage in the event of an incident.

And of course, password management remains key. Too many users take advantage of the summer to “keep it simple”: using the same password for multiple services, no two-factor authentication… All of these are open doors. A secure password manager not only enhances security, but also saves time, even when traveling.

Continue working... without exposing the organization

Let’s be clear: many executives and managers never completely switch off. And that’s not necessarily a problem in itself. But it does mean that mobility must be considered as a cybersecurity scenario in its own right, not as an afterthought.

Let’s take another real-life example: in 2022, a CIO on vacationtakes his work computer with him in his car. He quickly parks at a motorway rest area, and when he’s back, his window is smashed and his equipment stolen. The computer was neither encrypted nor locked. It contained sensitive files that were accessible without a password. The result:  customer data leakage, an internal investigation,  and a tarnished corporate image.

Encryption, a well-configured session lock, or a remote wipe option would have been enough to limit the impact.

Legal responsibility does not stop in the summer

From a regulatory standpoint, particularly with regard to the GDPR, corporate responsibility knows no summer break. Any personal data breach—whether it occurs in August on a beach or in the middle of a January meeting—is subject to the same obligations: risk analysis, often (depending on the country) regulatory mandatory notification to regulators, and documentation of the measures taken.

And behind the company, it is also the executives and technical managers who can be held liable for negligence, especially if basic measures were not in place.

Several recent rulings have reiterated that, when it comes to security, the absence of appropriate resources is a fault in itself. It is not enough to say that an employee “acted wrongly”: it must also be proven that the company had given them the right tools and instructions.

Plan ahead, train, delegate: the right habits for summer

So, what should you do before shutting down your computer and packing your bags?

  • Have a quick chat with your security team: what remains accessible? Who has access to what? Can temporary privileges be reduced?
  • Establish a clear procedure in case of an incident: who should be notified of a loss? Who can intervene remotely? Is written authorization required?
  • Briefly train employees who are leaving with equipment or access: a one-page memo may suffice if it is well done.

Share emergency contacts (IT, legal, DPO) in an easily accessible format (QR code, card, secure cloud).

It’s not the summer itself that creates the risk. It’s momentary lapses in professional reflexes. Cybersecurity on vacation doesn’t mean being suspicious of everything, all the time. It simply means anticipating tipping points, where a moment of complacency can be costly.

And even though it can seem paradoxical, it’s also a good opportunity to review internal practices: who has access to what? Why keep certain resources open all summer? Why not train teams in mobile usage?

Summer can be a break. But cybersecurity must remain a routine.

Come back in mid-August for the second part of our article on cybersecurity while on vacation. In the meantime, if you have a movie, TV series, software, or e-book that you want to protect, don’t hesitate to call on our services by contacting one of our account managers. PDN has been a pioneer in cybersecurity and anti-piracy for over ten years, and we are sure to have a solution to help you. Happy reading, and see you soon!

Share this article