Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

Know Your Wi-Fi Options
You can’t be productive without an Internet connection. This includes either mobile data or Wi-Fi. Chances are you’d rather look for an open wireless network than waste your mobile data, but unsecured networks can put your data at risk. One option you have is to check the reviews on sites like Yelp! and Trip Advisor to see what other guests have to say about Wi-Fi connections. Ideally, you want a VPN to secure your data while it’s in transit.

Bring Along Extra Accessories
You never know when that extra LAN cable or micro-USB cord will come in handy. Furthermore, if you’ve ever done any traveling, you’ll know that buying new equipment from an airport can be more expensive than you’d like.

Carry On Your Devices
If you need to travel for business, be sure to put your devices into your carry-on baggage at any airport. The last thing you need is for a screen to get cracked while your luggage is rolling around the cargo area of a plane. Furthermore, you don’t want your luggage to be either lost or stolen while in-flight. It’s just safer for you to keep anything important in your carry-on luggage.

Be Wary of Free Wi-Fi
You should keep your device from automatically connecting to any open wireless connection that it latches onto. The reasoning for this is that hackers will literally lurk on them, waiting to steal any data that presents itself to them. This can put both your own data and that of customers at risk--all because you checked your email.

Turn Off Your Autofill and Password Management
A password manager keeps you from entering in the same information over and over, but it should be disabled while you’re traveling. What if someone steals your device? They would have access to anything that was auto-filled on it. It’s like leaving the keys to your car in the front seat without locking the door. It’s not impossible to go a few days without auto-populating passwords, and it sure beats the fallout of losing a device.

Use External Drives and USB to Back Up Data
What if you are working on a project while out of the office on vacation, and you misplace your device or it’s damaged beyond repair? All of that progress would be gone. Now, imagine that you have that data backed up to an external hard drive. Now you don’t have to worry about losing data or progress while working out of the office.

There are just a few practices that can keep your organization from succumbing to the dangers of traveling and working at the same time. If you have any questions, thoughts, or concerns about using technology while out of the office, reach out to us at 845-876-6561.

Without A Data Backup, You Aren’t Ready
Cybercriminals Who Use This Malware Will Get A Nas...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 October 2017

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Malware Disaster Recovery Managed IT Services Business Continuity Microsoft Software Business VoIP Mobile Devices Google Productivity Data Internet Windows 10 Hardware Outsourced IT Innovation Efficiency IT Support Computer Smartphones Cybercrime Office Ransomware Server IT Services Browser Email Telephone Systems Alert Android Saving Money communications Quick Tips Computers Upgrade Business Management Mobile Device Management Chrome Passwords Workplace Tips Avoiding Downtime BYOD App Firewall Data Backup Hacking User Tips Windows Microsoft Office Save Money Virtualization Law Enforcement Small Business Managed IT Cybersecurity Network Recovery Social Media Mobility Miscellaneous Private Cloud Productivity Social Engineering Office Tips Managed Service Provider Facebook Proactive IT Budget Operating System Collaboration HaaS Office 365 Flexibility Smartphone Health Information Technology Work/Life Balance Data Management Data Breach Black Market Bandwidth Bring Your Own Device Google Drive Remote Monitoring Communication SaaS Phishing Money How To Password Spam Gmail Holiday Automation Cloud Computing Wi-Fi User Error Marketing Safety Redundancy BDR Managed IT Services Router Remote Computing Data Storage Wireless Technology Compliance Battery Wearable Technology Gadgets Computing Infrastructure Applications VPN Risk Management Physical Security Windows 10 Internet of Things DDoS Solid State Drive Employer-Employee Relationship Word Downtime Cleaning Hiring/Firing Computer Care Unsupported Software History Meetings Artificial Intelligence Wireless Samsung Best Practice Patch Management Apple Data storage Shadow IT Business Owner Government Value Data Security End of Support Internet Exlporer Spam Blocking Settings Save Time The Internet of Things Worker Automobile Entertainment Public Cloud Reputation Rootkit Start Menu Audit Troubleshooting Legal Files Television Tip of the week Notifications Workers Hybrid Cloud People Fax Server Customer Training Mobile Content Computer Fan Hosted Solution Business Intelligence Mobile Device Knowledge Colocation Chromecast Public Computer Two Factor Authentication Windows Server 2008 Education PDF Mobile Office IT solutions Vendor Management Professional Services Audiobook FENG Content Filtering Data Warehousing Network Congestion Uninterrupted Power Supply Windows 7 Emails Hard Drives Mobile Computing Charger Tools Politics Big Data IT Management Video Games Two-factor Authentication hacker Networking Electronic Medical Records Regulations Users Antivirus Unified Threat Management OneNote Books IT Plan Scalability IT Consultant IBM Virtual Reality Distributed Denial of Service WiFi Botnet HIPAA Emergency Instant Messaging Leadership Going Green Supercomputer Robot Tech Support Employer Employee Relationship Servers Worker Commute Netflix Relocation Travel Root Cause Analysis Software Tips Search Laptop Current Events Computer Accessories Flash Mouse Data Recovery IaaS Keyboard Scam How to webinar eWaste Touchpad Outlook Bluetooth Sync Document Management Techology YouTube Loyalty Software as a Service Experience Data loss Transportation HBO Lithium-ion battery Conferencing Environment Internet exploMicrosoft Humor Telephony Windows 10s Running Cable Streaming Media iPhone Update Music Screen Mirroring Benefits Frequently Asked Questions IT Support Advertising Monitor Sports Skype Vulnerability Cast SharePoint NarrowBand Assessment USB Smart Technology Excel Encryption Apps Website Webinar Administration IT solutions CrashOverride Thank You Congratulations Google Docs

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!