Scroll to top
Business Travel Security Checklist | Pre-Trip Guide

Security Intelligence

Business Travel Security Checklist: What to Do Before, During, and After a High-Risk Trip

A practical security checklist for business travellers heading to high-risk locations. Covers threat assessment, hotel protocols, transfers, and digital hygiene. Plan ahead.

Security Intelligence 8 min read 23 Apr 2026

Written by James Whitfield — Senior Security Consultant

The business travel security checklist used by most corporate travellers is: read the FCDO advisory, book travel insurance, pack a doorstop alarm. That is not a security plan. It is a sequence of actions taken to feel organised.

A proper pre-travel security protocol looks different. Here is what it actually covers.

Pre-Travel: Threat Assessment and Preparation

Before booking anything, assess the threat environment for your destination. The UK Foreign, Commonwealth and Development Office (FCDO) and US State Department both publish country-level advisories updated regularly. Read them. But also read the city-level OSAC Crime and Safety Report for your specific destination. Country-level advisories miss city-specific patterns entirely.

If you are travelling to a city with a documented kidnap risk (Lagos, Nairobi, Bogota, Karachi, and Mexico City all fall in this category per OSAC 2025-2026 reporting), commission a professional threat assessment before departure. That assessment should cover your specific movement pattern, who knows your itinerary, and whether your profile makes you a realistic target.

Notify your company travel risk manager at least four weeks before departure for high-risk destinations. If no such function exists in your organisation, that is a gap worth addressing before the trip is booked.

Brief a designated contact at home. They need: your hotel details, a copy of your itinerary, a check-in schedule, and a clear instruction on what to do if you miss a scheduled contact.

Arrange close protection or at minimum a security driver before you land. Arranging these on arrival, under time pressure and with limited local knowledge, significantly reduces the quality of what you get.

Hotel Selection and Room Security

In high-risk cities, your hotel choice is a security decision as much as a comfort one.

Choose a property with controlled lobby access and 24-hour trained security on the door. International business hotels generally meet this standard. Boutique properties in high-risk cities frequently do not. If you are unsure, ask the hotel directly whether their security staff are trained in-house or outsourced, and whether they have a documented incident response procedure.

Request a room on floors three to six. Ground-floor rooms are accessible from street level. Floors above seven are above the effective reach of most emergency ladder equipment in most cities. The middle floors provide the best balance.

Avoid rooms directly adjacent to emergency exit stairwells. These doors are frequently propped open and represent an unmonitored entry point. Rooms at the end of corridors reduce passing traffic.

On arrival, walk the emergency exit route from your room before you do anything else. Walk it twice. It takes three minutes. In a fire or a security incident, that familiarity matters.

If you have a specific concern about your room, a portable door security bar costs under $30 and adds a meaningful additional barrier against forced entry.

Airport Transfers and Vehicle Security

The airport transfer in a high-risk city is one of the highest-risk moments in any business trip. You arrive disoriented and jet-lagged, carrying luggage, in an environment where your identity is easily visible from your airline boarding pass.

Do not use unmarked taxis or private hire drivers arranged by strangers outside the terminal. This is the primary scenario for express kidnapping in cities including Lagos, Bogota, and Nairobi, as documented in multiple OSAC reports from 2024-2025.

Pre-arrange transfers through your hotel security team or a vetted operator. Confirm the vehicle details before you travel: make, model, and licence plate. Agree a code word or phrase with the driver for identity confirmation at pick-up. If someone claims to be your driver but does not know the code, do not get in the vehicle.

Keep the vehicle moving where operationally possible. Extended stops in traffic are the period of greatest vulnerability for vehicle approaches. A trained security driver will know how to manage this through route selection and timing.

Communication Security

Your phone and laptop are intelligence collection targets in several jurisdictions. China, Russia, and some Gulf states have documented state-level surveillance of foreign business travellers’ devices.

For high-risk destinations: travel with a dedicated clean device carrying no stored credentials or sensitive business files. Enable full disk encryption. Turn off Bluetooth and WiFi when not in active use. Use a reputable VPN for all internet traffic.

UK FCDO guidance specifically advises that devices used in China should be treated as potentially compromised on return. This is not a precautionary position. Multiple documented cases of corporate espionage via compromised travel devices are on record in both government and private sector reporting.

Hotel WiFi should be treated as untrusted infrastructure regardless of location. Where a VPN is not available, use your phone as a personal hotspot for sensitive traffic.

What to Do If You Are Threatened

If you believe you are under surveillance or being followed, the priority is time and distance from the location, not engagement.

Change your behaviour without indicating awareness. Move to a populated, well-lit public space. Contact your CP officer or security driver immediately. If you are alone and have no security support, contact the nearest large hotel reception desk and request their security team.

If you are approached with a demand for money or property, the professional position is compliance with demands for valuables. Assets are replaceable. Escalation over replaceable items creates unnecessary risk.

If you are travelling with professional close protection, your officers will have briefed you on a set of pre-agreed protocols for exactly these scenarios. If you have not received that briefing before the trip starts, ask for it.

Our bodyguard hire service covers city-specific security arrangements across all major high-risk destinations. For a pre-travel consultation on a specific city or itinerary, contact our team before you book your flights.

Summary

Key takeaways

1
1
Preparation reduces exposure before you land

Most security incidents targeting business travellers involve predictable movement patterns and poor pre-travel planning. A threat assessment and hotel security review completed in advance cuts exposure before you arrive.

2
2
Digital hygiene is not optional in high-risk countries

Devices taken to China, Russia, and several Middle Eastern countries face documented state-level surveillance risk. Travel with dedicated devices, use VPNs on all traffic, and treat hotel WiFi as monitored infrastructure.

3
3
Have a communication plan for every trip

Your security team, your company travel risk manager, and at least one trusted contact at home all need your itinerary, a check-in schedule, and clear emergency procedures before you depart.

FAQ

Frequently Asked Questions

Ideally four to six weeks before departure for high-risk destinations. This allows time to arrange close protection, brief your officers on the trip schedule, complete advance work on venues and hotels, and confirm insurance. Leaving it to the week before limits your options significantly and increases costs.

Avoid floors one and two, which are vulnerable to ground-level intrusion. Avoid floors above seven or eight, which are beyond the reach of most fire ladder equipment. Floors three to six are the standard professional recommendation, balancing fire safety and physical security.

Hotel WiFi in high-risk countries should be treated as untrusted network infrastructure. Use a reputable VPN for all business traffic. Do not access sensitive systems over hotel WiFi without VPN protection, regardless of how the hotel presents itself.

Do not confront or indicate awareness. Change your route to a populated, well-lit public space. Contact your CP officer or security driver immediately using a pre-agreed code phrase. Do not return to your hotel until your security team has confirmed it is clear to do so.

Yes. UK FCDO and US State Department both advise that devices taken into China and Russia should be considered potentially compromised after the trip. Travel with a dedicated clean device carrying no stored credentials or sensitive files. Enable full disk encryption. Do not accept USB drives from unknown sources.
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.