(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

Know Your Wi-Fi Options
You can’t be productive without an Internet connection. This includes either mobile data or Wi-Fi. Chances are you’d rather look for an open wireless network than waste your mobile data, but unsecured networks can put your data at risk. One option you have is to check the reviews on sites like Yelp! and Trip Advisor to see what other guests have to say about Wi-Fi connections. Ideally, you want a VPN to secure your data while it’s in transit.

Bring Along Extra Accessories
You never know when that extra LAN cable or micro-USB cord will come in handy. Furthermore, if you’ve ever done any traveling, you’ll know that buying new equipment from an airport can be more expensive than you’d like.

Carry On Your Devices
If you need to travel for business, be sure to put your devices into your carry-on baggage at any airport. The last thing you need is for a screen to get cracked while your luggage is rolling around the cargo area of a plane. Furthermore, you don’t want your luggage to be either lost or stolen while in-flight. It’s just safer for you to keep anything important in your carry-on luggage.

Be Wary of Free Wi-Fi
You should keep your device from automatically connecting to any open wireless connection that it latches onto. The reasoning for this is that hackers will literally lurk on them, waiting to steal any data that presents itself to them. This can put both your own data and that of customers at risk--all because you checked your email.

Turn Off Your Autofill and Password Management
A password manager keeps you from entering in the same information over and over, but it should be disabled while you’re traveling. What if someone steals your device? They would have access to anything that was auto-filled on it. It’s like leaving the keys to your car in the front seat without locking the door. It’s not impossible to go a few days without auto-populating passwords, and it sure beats the fallout of losing a device.

Use External Drives and USB to Back Up Data
What if you are working on a project while out of the office on vacation, and you misplace your device or it’s damaged beyond repair? All of that progress would be gone. Now, imagine that you have that data backed up to an external hard drive. Now you don’t have to worry about losing data or progress while working out of the office.

There are just a few practices that can keep your organization from succumbing to the dangers of traveling and working at the same time. If you have any questions, thoughts, or concerns about using technology while out of the office, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 October 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Productivity Business Computing Microsoft Backup Malware Hosted Solutions Internet Efficiency Mobile Devices Google IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Workplace Tips Business Continuity Innovation Network Data Disaster Recovery Upgrade Hardware Email Business Management Computer Software Windows Save Money Saving Money Mobile Device Management Communication Browser Network Security Microsoft Office Virtualization Smartphone WiFi Android User Tips Smartphones Windows 10 BYOD Hacking Social Media Managed IT Services Operating System Holiday Apple Computers Cybercrime Proactive IT Chrome Remote Monitoring Avoiding Downtime Application communications Mobile Computing IT Solutions Alert Quick Tips Office Outsourced IT Small Business Budget Information Technology Big Data Passwords Marketing Automation The Internet of Things Ransomware Recovery Collaboration Mobility Health Employer-Employee Relationship VPN spam Managed IT Services Going Green Remote Computing Data Backup Vendor Management Cybersecurity Social Engineering Telephone Systems App iPhone Wireless Technology Gadgets User Error Bring Your Own Device Managed IT Save Time Firewall Bandwidth Compliance Networking Antivirus Lithium-ion battery Gmail Analytics Private Cloud PowerPoint Mouse Excel Phone System Redundancy IT Support Downtime Office 365 History Tablet Retail Memory Search Customer Relationship Management Document Management Risk Management Online Currency Best Available Office Tips Hard Drives People Programming Printer Network Congestion Facebook Data Storage Current Events Word DDoS Physical Security Public Cloud Maintenance BDR Robot Humor Router Environment Phishing Statistics Google Drive How To SaaS Website Outlook Intranet Safety Government Meetings Flexibility Cloud Computing Artificial Intelligence Content Filtering Money Law Enforcement HaaS Solid State Drive Unsupported Software Fax Server Administration Black Market Data Management Entertainment IT Consultant Running Cable Internet of Things Vulnerability Value Unified Threat Management Skype Internet Exlporer Data Security Windows 10 Business Owner Data storage Saving Time Biometrics Mobile Office Virus Bluetooth Company Culture LinkedIn Sports HBO OneNote Mobile eWaste Tablets Windows 8.1 Update Monitor Debate End of Support Notifications Screen Mirroring Computer Accessories USB YouTube Frequently Asked Questions Professional Services Wearable Technology Reputation Internet exploMicrosoft Cast Social Root Cause Analysis Cameras Video Surveillance NarrowBand Tip of the week Tools Consultant Trending Customers Patch Management Education Advertising Print Server Best Practice Social Networking Data loss Printer Server Chromecast Windows Server 2008 Analyitcs Piracy Business Intelligence Worker Commute Net Neutrality Computer Repair Laptop Windows 7 Settings Botnet Distributed Denial of Service User Licensing Hybrid Cloud Data Warehousing Virtual Desktop Human Resources Computer Care Samsung Touchpad Regulations IT service Travel Virtual Reality Twitter HIPAA Relocation Uninterrupted Power Supply IT Management Training Spam Blocking Touchscreen Crowdfunding Servers Domains Data Recovery IaaS Bloatware Cleaning IT Plan Customer Service Flash Software as a Service Entrepreneur Tech Support Computer Fan Windows Media Player Hacker Applications Sync Files Update Cost Management Hiring/Firing Shadow IT Software Tips Two-factor Authentication FENG Wireless WIndows 7 Science Apps Telephony Colocation Streaming Media Instant Messaging Workers Shortcut SharePoint Managing Stress Windows 8 Start Menu Computing Infrastructure Encryption Audit Hosted Solution Employer Employee Relationship Legal Data Breach Automobile Emails Books Mobile Device CrashOverride IBM Work/Life Balance Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Scam Netflix Charger Scalability Users Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Keyboard Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Productivity Password Television Wi-Fi Google Docs Troubleshooting Electronic Medical Records Techology Public Computer