(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

Know Your Wi-Fi Options
You can’t be productive without an Internet connection. This includes either mobile data or Wi-Fi. Chances are you’d rather look for an open wireless network than waste your mobile data, but unsecured networks can put your data at risk. One option you have is to check the reviews on sites like Yelp! and Trip Advisor to see what other guests have to say about Wi-Fi connections. Ideally, you want a VPN to secure your data while it’s in transit.

Bring Along Extra Accessories
You never know when that extra LAN cable or micro-USB cord will come in handy. Furthermore, if you’ve ever done any traveling, you’ll know that buying new equipment from an airport can be more expensive than you’d like.

Carry On Your Devices
If you need to travel for business, be sure to put your devices into your carry-on baggage at any airport. The last thing you need is for a screen to get cracked while your luggage is rolling around the cargo area of a plane. Furthermore, you don’t want your luggage to be either lost or stolen while in-flight. It’s just safer for you to keep anything important in your carry-on luggage.

Be Wary of Free Wi-Fi
You should keep your device from automatically connecting to any open wireless connection that it latches onto. The reasoning for this is that hackers will literally lurk on them, waiting to steal any data that presents itself to them. This can put both your own data and that of customers at risk--all because you checked your email.

Turn Off Your Autofill and Password Management
A password manager keeps you from entering in the same information over and over, but it should be disabled while you’re traveling. What if someone steals your device? They would have access to anything that was auto-filled on it. It’s like leaving the keys to your car in the front seat without locking the door. It’s not impossible to go a few days without auto-populating passwords, and it sure beats the fallout of losing a device.

Use External Drives and USB to Back Up Data
What if you are working on a project while out of the office on vacation, and you misplace your device or it’s damaged beyond repair? All of that progress would be gone. Now, imagine that you have that data backed up to an external hard drive. Now you don’t have to worry about losing data or progress while working out of the office.

There are just a few practices that can keep your organization from succumbing to the dangers of traveling and working at the same time. If you have any questions, thoughts, or concerns about using technology while out of the office, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Malware Backup Internet Google Mobile Devices Efficiency VoIP Business IT Support IT Services Email Network Security Managed Service Provider Miscellaneous Server Innovation Data Workplace Tips Upgrade Disaster Recovery Business Continuity Network Software Windows Business Management Managed IT Services Saving Money Hardware Communication Computer Save Money Android Mobile Device Management Virtualization Browser Smartphone Smartphones communications Data Backup User Tips Holiday Cybercrime Microsoft Office Outsourced IT Computers Internet of Things BYOD Windows 10 WiFi Operating System Cloud Computing Mobile Computing Hacking Chrome Big Data Ransomware Small Business Data Recovery Social Media Remote Monitoring Managed IT Services Collaboration IT Solutions VPN Alert Application Apple Automation Proactive IT Avoiding Downtime Passwords Office Marketing Budget The Internet of Things Tech Term Quick Tips Social Engineering Information Technology BDR Employer-Employee Relationship Managed IT Artificial Intelligence Going Green Remote Computing Health Mobility Bring Your Own Device Cybersecurity Recovery spam Gadgets Telephone Systems Bandwidth Compliance IT Support Redundancy Wireless Technology Data Protection Office 365 User Error Two-factor Authentication Business Intelligence Document Management Vendor Management Website iPhone Money Save Time Firewall App Router Gmail How To Vulnerability Data Security Private Cloud Networking Mouse Law Enforcement Apps Productivity Data Management Word Windows 10 Connectivity Risk Management PowerPoint Excel Phone System Antivirus Office Tips Content Filtering Downtime Facebook History Entertainment Tablet Lithium-ion battery Analytics Value Phishing Retail Memory Search Identity Theft Credit Cards SaaS Training Best Available People Safety Programming Government Cleaning Network Congestion Trending Meetings Solid State Drive Education HaaS Applications Fax Server IT Consultant Infrastructure Analysis Black Market Data Storage Workers Humor Saving Time Statistics Comparison Business Owner Windows 7 Streaming Media Internet Exlporer Online Currency OneNote Data storage Biometrics Encryption Sports Outlook Printer IT Management eWaste Mobile Device Work/Life Balance Servers YouTube Flexibility USB Smart Tech IT Plan Hard Drives Current Events Administration CES Data loss Maintenance Unsupported Software Update Public Cloud Content Management Running Cable Physical Security DDoS Unified Threat Management Robot Skype Google Drive Mobile Office Environment HIPAA Customer Relationship Management Intranet Human Resources Virtual Reality Inventory Debate Cache Relocation HBO Uninterrupted Power Supply Keyboard Computer Accessories Cortana Mobile Digital Signature Multi-Factor Security Screen Mirroring Domains Bloatware Access Control Fraud Wireless Internet Frequently Asked Questions IaaS Professional Services Cameras Customer Service Google Apps Video Surveillance Strategy Computer Fan Lifestyle Cast Consultant Entrepreneur Authentication Amazon Wire Tip of the week Tools Tech Support Printer Server Files FENG Password Hacker Wi-Fi Worker Commute Cost Management Nanotechnology Piracy Amazon Web Services Smart Office Windows Server 2008 Shadow IT Colocation Password Manager Accountants Electronic Medical Records User Wireless Science Instant Messaging Company Culture Licensing Online Shopping Paperless Office Botnet Hosted Solution Shortcut Computing Infrastructure Windows 8.1 Update Business Mangement Samsung Specifications Data Warehousing SharePoint Legal Twitter Windows 8 Devices Evernote Students Regulations Travel End of Support Bluetooth Recycling Crowdfunding IoT Millennials Monitor Tablets Wireless Charging Healthcare Notifications Internet exploMicrosoft Criminal Root Cause Analysis Print Server Workforce Thought Leadership Reputation Wearable Technology Windows Media Player Social Fiber-Optic Electronic Health Records Flash Software as a Service NarrowBand Patch Management Advertising Insurance Telecommuting Content Filter Customers Social Networking Net Neutrality Hiring/Firing Computer Repair Cables Machine Learning Sync Best Practice Chromecast Scam WIndows 7 Practices Remote Work Storage Charger Software Tips Analyitcs Unified Communications HVAC Telephony Google Docs Laptop Managing Stress Settings Hybrid Cloud Blockchain Hosted Computing Addiction Computer Care Distributed Denial of Service Virus Virtual Desktop Touchscreen Theft LinkedIn Start Menu Spam Blocking Voice over Internet Protocol Touchpad Audit IT service PDF Staff Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride IBM Webinar Emergency Worker Content Supercomputer IT solutions Rootkit Video Games Audiobook Knowledge Users Netflix Scalability Politics Transportation How to webinar Benefits