(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

Know Your Wi-Fi Options
You can’t be productive without an Internet connection. This includes either mobile data or Wi-Fi. Chances are you’d rather look for an open wireless network than waste your mobile data, but unsecured networks can put your data at risk. One option you have is to check the reviews on sites like Yelp! and Trip Advisor to see what other guests have to say about Wi-Fi connections. Ideally, you want a VPN to secure your data while it’s in transit.

Bring Along Extra Accessories
You never know when that extra LAN cable or micro-USB cord will come in handy. Furthermore, if you’ve ever done any traveling, you’ll know that buying new equipment from an airport can be more expensive than you’d like.

Carry On Your Devices
If you need to travel for business, be sure to put your devices into your carry-on baggage at any airport. The last thing you need is for a screen to get cracked while your luggage is rolling around the cargo area of a plane. Furthermore, you don’t want your luggage to be either lost or stolen while in-flight. It’s just safer for you to keep anything important in your carry-on luggage.

Be Wary of Free Wi-Fi
You should keep your device from automatically connecting to any open wireless connection that it latches onto. The reasoning for this is that hackers will literally lurk on them, waiting to steal any data that presents itself to them. This can put both your own data and that of customers at risk--all because you checked your email.

Turn Off Your Autofill and Password Management
A password manager keeps you from entering in the same information over and over, but it should be disabled while you’re traveling. What if someone steals your device? They would have access to anything that was auto-filled on it. It’s like leaving the keys to your car in the front seat without locking the door. It’s not impossible to go a few days without auto-populating passwords, and it sure beats the fallout of losing a device.

Use External Drives and USB to Back Up Data
What if you are working on a project while out of the office on vacation, and you misplace your device or it’s damaged beyond repair? All of that progress would be gone. Now, imagine that you have that data backed up to an external hard drive. Now you don’t have to worry about losing data or progress while working out of the office.

There are just a few practices that can keep your organization from succumbing to the dangers of traveling and working at the same time. If you have any questions, thoughts, or concerns about using technology while out of the office, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 13 December 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Managed Service Provider Miscellaneous IT Services Server Workplace Tips Disaster Recovery Business Continuity Upgrade Email Network Innovation Data Hardware Software Windows Save Money Saving Money Business Management Communication Computer Mobile Device Management Smartphones Managed IT Services User Tips Microsoft Office Network Security Virtualization Browser Holiday Android Windows 10 WiFi Smartphone Hacking Chrome Data Backup BYOD Outsourced IT Social Media Operating System Mobile Computing communications IT Solutions Cybercrime Small Business Application Apple Proactive IT Remote Monitoring Avoiding Downtime Computers Budget Collaboration The Internet of Things Big Data Alert Ransomware Quick Tips Social Engineering Automation Information Technology Passwords Office Marketing Remote Computing Health Mobility VPN Bring Your Own Device Managed IT Services Recovery spam Employer-Employee Relationship Going Green Wireless Technology User Error Vendor Management iPhone Gadgets Save Time Cybersecurity Firewall App Data Recovery Telephone Systems Managed IT Cloud Computing IT Support Office 365 Two-factor Authentication PowerPoint Windows 10 Website Excel Phone System Antivirus Office Tips Content Filtering Downtime History Tablet Analytics Router Gmail Lithium-ion battery BDR Memory Retail Search Private Cloud Bandwidth Compliance How To Artificial Intelligence Networking Mouse Redundancy HaaS IT Consultant Fax Server Apps Black Market Law Enforcement Data Management Solid State Drive Humor Saving Time Statistics Internet of Things Document Management Data Storage Internet Exlporer Risk Management Online Currency Word Data storage Biometrics Business Intelligence Business Owner Outlook Printer Money Flexibility Hard Drives Current Events IT Management Work/Life Balance Facebook Administration Maintenance Entertainment Running Cable Value Physical Security DDoS Unified Threat Management Robot Skype Unsupported Software Mobile Office Environment Google Drive Public Cloud Customer Relationship Management Intranet Phishing Vulnerability SaaS Data Security Best Available People Safety Programming Government Network Congestion Trending Meetings Entrepreneur Education Multi-Factor Security Screen Mirroring Frequently Asked Questions Tech Support Printer Server Hacker Professional Services Worker Commute Cost Management Piracy Computer Fan Lifestyle Cast Tip of the week Shadow IT Applications Science Tools User Wireless Files Streaming Media Instant Messaging Company Culture Licensing FENG Data Protection Productivity Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut Twitter Windows 8 Workers SharePoint Colocation Encryption Comparison Crowdfunding Windows 7 Sports Bluetooth Tablets Botnet Monitor Hosted Solution eWaste Computing Infrastructure Notifications OneNote Specifications Data Warehousing Regulations YouTube USB Travel Print Server Reputation Wearable Technology End of Support Windows Media Player Social Millennials Servers NarrowBand Customers Internet exploMicrosoft Best Practice Social Networking Net Neutrality Hiring/Firing Root Cause Analysis Workforce Computer Repair IT Plan Flash Chromecast WIndows 7 Analyitcs Software as a Service Patch Management Advertising Data loss Sync Laptop Managing Stress Settings Update Scam Distributed Denial of Service Software Tips Virus Virtual Desktop Touchscreen LinkedIn Telephony Touchpad IT service Human Resources Hybrid Cloud Virtual Reality Debate Google Docs Relocation Computer Care Uninterrupted Power Supply Computer Accessories Training Start Menu HIPAA Domains IaaS Bloatware Spam Blocking Voice over Internet Protocol Audit HBO Cleaning Cameras Customer Service Video Surveillance Mobile Consultant Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Techology Electronic Medical Records Public Computer Legal Employer Employee Relationship Data Breach Automobile Emails Books Mobile Device CrashOverride IBM Webinar Emergency Users Worker Supercomputer Content IT solutions Video Games Telecommuting Rootkit Knowledge Audiobook Netflix Charger Scalability Remote Work Politics Transportation How to webinar PDF Benefits Loyalty Conferencing Keyboard