Digital nomad survival tips you can use anywhere
Living in Europe, the Middle East and Africa taught me that the conventional wisdom about mobility is all wrong
Computerworld - I'm a digital nomad. You're a digital nomad. According to my own definition, anyone who is able to work in various environments because of digital and mobile technology (home, office, Starbucks, plastic lounge chair by the pool while on vacation) is a digital nomad.
However, for the last year and a half I have lived truly nomadically. My wife and I put all our possessions into storage (except for two backpacks and two large dufflebags) and now live internationally, choosing countries to stay based on, well, whim more than anything else, and working from wherever we go.
During that time I've lived in Europe, the Middle East and Africa. I've been robbed, stranded, and, worst of all, disconnected from Internet connectivity and reliable electricity.
While living this lifestyle, I've learned a lot about being a digital nomad -- mostly the hard way -- and gained insights useful for anyone who can work with mobile technology or who travels abroad for any length of time.
So I thought I would share my hard-won knowledge with you. Let's start with the basics.
How to choose and use a backpack
The most important feature of a backpack is security. But the best way to achieve backpack security is different than nearly everyone imagines.
There's a whole sub-industry of backpack security that treats the problem as one of fortification. A company called Pacsafe is the leading brand in this space. Wire mesh backpack linings or covers are designed to prevent crooks from cutting into your bag. Zipper locks and hidden pockets prevent easy theft.
The marketing around these bags suggests that you're going to leave your backpack behind in some hotel room or hostel and you'll want to lock it down to prevent theft.
The belief that locking a backpack to, say, a pipe or desk and fortifying it will prevent theft is false. A determined thief will cut through the cables, rip out the pipe or figure out some other way to steal your stuff.
The best protection is social engineering and also following some basic guidelines. It starts with the backpack selection.
There are high-quality backpacks on the market, fortified or not fortified. If you have a conspicuously high-quality backpack, you'll make yourself a target for theft. For example, the SOOT Electropack project looks promising. And I've been tempted by the Pelican ProGear S130 Sport Elite Laptop Backpack. These are great products if you never leave the safety and comfort of safe and wealthy places.
But carry these packs into most countries and you might as well tape a sign to it in the local language that says: "Very expensive gear inside: Please steal me!" And a determined thief will do so.
The most important security feature in a backpack is to be boring. Buy a black backpack without fancy features or designer logos. The plainer the better.
The second most important security feature is that it hold everything of value and still be comfortable to wear.
Gear up in such a way as to never have to leave your valuable electronics behind. Make sure everything fits into one backpack. (In my case, I carry a MacBook Pro, iPad, iPhone (my Android phone lives in my pocket), Google Glass, chargers, cables, extra credit cards and more. The total value of what I carry in my backpack is about $5,000.)
Then never, ever leave it behind. Always have your backpack with you.
When you're in a coffee shop, don't place the backpack on a chair or on the floor next to you. Put it on the floor between your legs and under the table.
Finally, whenever you're in a situation where anyone can be close to you and behind you, put the backpack on backwards so it's in the front, to prevent razor-blade access. The most likely way thieves will steal stuff is to divert your attention. If something happens that's attention-grabbing, always move the backpack to the front and keep your head on a swivel.
How to keep your laptop from being stolen
After surviving many trips abroad, working often in coffee shops, I laugh whenever I hear someone at Starbucks saying to a stranger: "Will you watch my stuff while I go to the bathroom?" This provides you with exactly zero protection against theft.
Here's the global best practice for stealing a laptop from an American innocent abroad: Grab it and run.
The commonly used defenses against this crime are all perfectly wrong. Sitting there won't deter them. They'll steal it even while you're actually typing. If you can out-run a teenager familiar with the surrounding streets (Good luck with that), he will drop it before you catch him, destroying the laptop. If you chain it to the table, he'll drop it and smash it trying to get away. If you chase after the guy with the laptop, his partner will casually walk off with your backpack.
To protect your laptop, follow my three-second rule: Make sure a crook can't run from your laptop to the door in less than three seconds. Find a place to work that's tucked way back in the corner with lots of tables and chairs between you and the door. And make sure a thief can't approach your laptop without you seeing them. It's more important that you keep an eye on who's approaching your table than your stuff.
Second, if you need to leave the table for any reason, but want to maintain your claim to it, leave easily replaceable personal items on the table and take your laptop and other valuables with you, even into the bathroom.
Third, don't appear to have an expensive laptop. That Apple logo screams "black market retail value!," so buy a cover that makes it look like a cheap laptop, or something other than a laptop.
- Enabling devices and device management for your mobility/BYOD program In this white paper, learn how to select the right mobile devices for your organization and manage them with efficiency, flexibility and security...
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Personal Technology White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!