(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

Know Your Wi-Fi Options
You can’t be productive without an Internet connection. This includes either mobile data or Wi-Fi. Chances are you’d rather look for an open wireless network than waste your mobile data, but unsecured networks can put your data at risk. One option you have is to check the reviews on sites like Yelp! and Trip Advisor to see what other guests have to say about Wi-Fi connections. Ideally, you want a VPN to secure your data while it’s in transit.

Bring Along Extra Accessories
You never know when that extra LAN cable or micro-USB cord will come in handy. Furthermore, if you’ve ever done any traveling, you’ll know that buying new equipment from an airport can be more expensive than you’d like.

Carry On Your Devices
If you need to travel for business, be sure to put your devices into your carry-on baggage at any airport. The last thing you need is for a screen to get cracked while your luggage is rolling around the cargo area of a plane. Furthermore, you don’t want your luggage to be either lost or stolen while in-flight. It’s just safer for you to keep anything important in your carry-on luggage.

Be Wary of Free Wi-Fi
You should keep your device from automatically connecting to any open wireless connection that it latches onto. The reasoning for this is that hackers will literally lurk on them, waiting to steal any data that presents itself to them. This can put both your own data and that of customers at risk--all because you checked your email.

Turn Off Your Autofill and Password Management
A password manager keeps you from entering in the same information over and over, but it should be disabled while you’re traveling. What if someone steals your device? They would have access to anything that was auto-filled on it. It’s like leaving the keys to your car in the front seat without locking the door. It’s not impossible to go a few days without auto-populating passwords, and it sure beats the fallout of losing a device.

Use External Drives and USB to Back Up Data
What if you are working on a project while out of the office on vacation, and you misplace your device or it’s damaged beyond repair? All of that progress would be gone. Now, imagine that you have that data backed up to an external hard drive. Now you don’t have to worry about losing data or progress while working out of the office.

There are just a few practices that can keep your organization from succumbing to the dangers of traveling and working at the same time. If you have any questions, thoughts, or concerns about using technology while out of the office, reach out to us at (703) 288-9767.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Mobile Devices Google Efficiency VoIP Business IT Support Email Miscellaneous IT Services Managed Service Provider Innovation Server Disaster Recovery Business Continuity Workplace Tips Network Data Windows Upgrade Network Security Software Hardware Business Management Communication Computer Save Money Saving Money Mobile Device Management Virtualization Smartphones Android User Tips Microsoft Office Browser Smartphone communications Managed IT Services Holiday Data Backup Windows 10 Outsourced IT WiFi BYOD Small Business Social Media Remote Monitoring Operating System Mobile Computing Computers Cybercrime Hacking Chrome Alert Application Apple Proactive IT Avoiding Downtime IT Solutions Managed IT Services Big Data Ransomware Quick Tips Social Engineering Data Recovery Automation Information Technology Employer-Employee Relationship Passwords Office Marketing Budget Cloud Computing Collaboration The Internet of Things Recovery spam Gadgets Telephone Systems BDR Going Green Remote Computing Mobility Health Bring Your Own Device VPN iPhone Cybersecurity Save Time Firewall App Gmail Private Cloud Bandwidth Compliance How To Managed IT Wireless Technology User Error Two-factor Authentication Internet of Things Vendor Management Website Excel Phone System Antivirus Content Filtering Money Office Tips Downtime History Tablet Lithium-ion battery Analytics Router Value Retail Memory Search Vulnerability Data Security Artificial Intelligence Mouse Networking Redundancy Office 365 IT Support Data Management Document Management Risk Management Business Intelligence PowerPoint Windows 10 Outlook Business Owner eWaste Printer OneNote Flexibility Hard Drives IT Management Current Events Administration Work/Life Balance Facebook Maintenance IT Plan Entertainment Running Cable DDoS CES Physical Security Skype Unsupported Software Unified Threat Management Robot Public Cloud Mobile Office Environment Google Drive Intranet Customer Relationship Management Human Resources Phishing SaaS Identity Theft Best Available Training People Safety HIPAA Programming Government Credit Cards Network Congestion Trending Meetings HaaS IT Consultant Fax Server Apps Law Enforcement Black Market Solid State Drive Humor Saving Time Statistics Data Storage Internet Exlporer Online Currency Workers Word Data storage Biometrics Bluetooth Online Shopping Crowdfunding Windows 7 Sports Computing Infrastructure Tablets Business Mangement Botnet Monitor Hosted Solution Data Warehousing Notifications Legal Specifications USB Evernote Regulations YouTube Wearable Technology End of Support Recycling Travel Print Server Reputation Mobile Device Windows Media Player Social Millennials Wireless Charging Servers NarrowBand Internet exploMicrosoft Criminal Customers Computer Repair Best Practice Social Networking Net Neutrality Hiring/Firing Root Cause Analysis Workforce Fiber-Optic Flash Chromecast WIndows 7 Advertising Analyitcs Software as a Service Patch Management Data loss Telecommuting Cables Sync Laptop Managing Stress Settings Distributed Denial of Service Content Management Update Scam Remote Work LinkedIn Charger Software Tips Virus Virtual Desktop Touchscreen Unified Communications Telephony Touchpad IT service Hybrid Cloud Virtual Reality Blockchain Debate Google Docs Relocation Computer Care Uninterrupted Power Supply Computer Accessories Theft Start Menu Domains Audit IaaS Bloatware Staff Spam Blocking Voice over Internet Protocol Video Surveillance HBO Cleaning Cameras Customer Service Cortana Mobile Keyboard Consultant Screen Mirroring Entrepreneur Education Multi-Factor Security Fraud Frequently Asked Questions Tech Support Printer Server Hacker Google Apps Professional Services Cast Worker Commute Cost Management Piracy Computer Fan Lifestyle Amazon Tip of the week Shadow IT Applications User Wireless Files Science Infrastructure Tools Productivity Streaming Media Password Instant Messaging Company Culture Licensing FENG Data Protection Amazon Web Services Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut SharePoint Colocation Twitter Windows 8 Password Manager Electronic Medical Records Encryption Comparison Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Users Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Smart Technology Digital Signature Windows 10s Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology