Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

Know Your Wi-Fi Options
You can’t be productive without an Internet connection. This includes either mobile data or Wi-Fi. Chances are you’d rather look for an open wireless network than waste your mobile data, but unsecured networks can put your data at risk. One option you have is to check the reviews on sites like Yelp! and Trip Advisor to see what other guests have to say about Wi-Fi connections. Ideally, you want a VPN to secure your data while it’s in transit.

Bring Along Extra Accessories
You never know when that extra LAN cable or micro-USB cord will come in handy. Furthermore, if you’ve ever done any traveling, you’ll know that buying new equipment from an airport can be more expensive than you’d like.

Carry On Your Devices
If you need to travel for business, be sure to put your devices into your carry-on baggage at any airport. The last thing you need is for a screen to get cracked while your luggage is rolling around the cargo area of a plane. Furthermore, you don’t want your luggage to be either lost or stolen while in-flight. It’s just safer for you to keep anything important in your carry-on luggage.

Be Wary of Free Wi-Fi
You should keep your device from automatically connecting to any open wireless connection that it latches onto. The reasoning for this is that hackers will literally lurk on them, waiting to steal any data that presents itself to them. This can put both your own data and that of customers at risk--all because you checked your email.

Turn Off Your Autofill and Password Management
A password manager keeps you from entering in the same information over and over, but it should be disabled while you’re traveling. What if someone steals your device? They would have access to anything that was auto-filled on it. It’s like leaving the keys to your car in the front seat without locking the door. It’s not impossible to go a few days without auto-populating passwords, and it sure beats the fallout of losing a device.

Use External Drives and USB to Back Up Data
What if you are working on a project while out of the office on vacation, and you misplace your device or it’s damaged beyond repair? All of that progress would be gone. Now, imagine that you have that data backed up to an external hard drive. Now you don’t have to worry about losing data or progress while working out of the office.

There are just a few practices that can keep your organization from succumbing to the dangers of traveling and working at the same time. If you have any questions, thoughts, or concerns about using technology while out of the office, reach out to us at 845-876-6561.

Without A Data Backup, You Aren’t Ready
Cybercriminals Who Use This Malware Will Get A Nas...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Mobile Devices Microsoft Disaster Recovery Software Productivity Business Internet Business Continuity Email Data Innovation Outsourced IT Data Backup Cybercrime Efficiency communications IT Support Smartphones Windows 10 Ransomware Computer IT Services Browser Android Cloud Computing Data Recovery Hardware BDR Office Internet of Things Business Management Tech Term Telephone Systems Alert Windows Saving Money Computers Server Upgrade Virtualization User Tips Mobile Device Management Network Small Business Cybersecurity Smartphone Save Money Law Enforcement Microsoft Office Collaboration Quick Tips Managed IT BYOD Chrome Workplace Tips Social Engineering Managed Service Provider Firewall Avoiding Downtime Productivity Bandwidth Money Facebook Recovery Artificial Intelligence Password Holiday Private Cloud Communication Office 365 Social Media Hacking Miscellaneous How To Mobility Passwords Work/Life Balance Router App Office Tips VPN Applications Proactive IT Remote Monitoring HaaS Business Intelligence Automation Operating System Budget Gmail Two-factor Authentication Health Information Technology Redundancy Data Protection Flexibility Wi-Fi Phishing Data Management Bring Your Own Device Data Security Compliance Google Drive Connectivity Mobile Device Cleaning Risk Management Vulnerability Data Breach SaaS Managed IT Services Employer-Employee Relationship Big Data Identity Theft Blockchain Safety Windows 10 Value Word Document Management Marketing User Error Gadgets Entertainment Black Market Apps Spam Battery Data loss Training Downtime Paperless Office Education Update IT Support History Content Filtering Best Practice Charger Data storage DDoS Shadow IT CES Networking Electronic Medical Records Government Website Smart Tech Data Storage Workers End of Support Solid State Drive Internet Exlporer Content Management Hiring/Firing YouTube Meetings Computer Care HIPAA Wireless The Internet of Things Apple Windows 7 Samsung Credit Cards Sports Patch Management Business Owner eWaste IT Management Public Cloud Keyboard Remote Computing OneNote Scam Settings Wireless Technology IT Plan Streaming Media Save Time Access Control Unsupported Software Servers Infrastructure PDF Worker Computing Infrastructure Automobile Encryption Comparison USB Physical Security Mobile Computing Analysis Wearable Technology Spam Blocking Legal NIST Software as a Service Accountants Mobile Office Conferencing Content Millennials HBO Telephony Recycling IT solutions Windows 10s Public Computer Hosted Solution Two Factor Authentication Cryptocurrency Screen Mirroring Frequently Asked Questions Wireless Charging Vendor Management Audiobook Going Green Workforce Devices Robot Students Tech Support Skype Criminal Relocation Safe Mode Google Docs IoT Cast Antivirus Excel Fiber-Optic Politics Laptop Hard Drives Telecommuting Thought Leadership Video Games Healthcare Start Menu Audit Users File Sharing IaaS Tip of the week Cables Unified Threat Management Touchpad Remote Work Content Filter Outlook Scalability Electronic Health Records Distributed Denial of Service Mobile WiFi Computer Fan IBM Books Knowledge Virtual Reality Business Technology Voice over Internet Protocol Insurance Windows Server 2008 Unified Communications Internet exploMicrosoft Storage Humor Instant Messaging Machine Learning Professional Services FENG Supercomputer Emergency Network Congestion Employer Employee Relationship iPhone Worker Commute Virtual Assistant Multi-Factor Security Practices Data Warehousing Theft Emails Advertising Monitor Search Mouse Tools Human Resources Current Events Computer Accessories Telephone System NarrowBand Trending Hosted Computing Regulations Cortana Fraud Addiction Reputation How to Staff IT Consultant Bluetooth Files Lithium-ion battery Lifestyle Inventory Environment Running Cable Google Apps Loyalty Hybrid Cloud Experience Techology Amazon Cache Customer HVAC Botnet Digital Signature Transportation Leadership Colocation Chromecast Netflix Music Amazon Web Services Wireless Internet Enterprise Content Management Travel Strategy SharePoint Root Cause Analysis Benefits Authentication Software Tips Uninterrupted Power Supply Flash Password Manager Assessment Online Shopping Wire Password Management Smart Technology People webinar Rootkit hacker Notifications Specifications Nanotechnology Smart Office Sync Business Mangement Fax Server Television Troubleshooting Evernote Administration Thank You Twitter Company Culture Congratulations Webinar Managing Stress IT solutions CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!