Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

Know Your Wi-Fi Options
You can’t be productive without an Internet connection. This includes either mobile data or Wi-Fi. Chances are you’d rather look for an open wireless network than waste your mobile data, but unsecured networks can put your data at risk. One option you have is to check the reviews on sites like Yelp! and Trip Advisor to see what other guests have to say about Wi-Fi connections. Ideally, you want a VPN to secure your data while it’s in transit.

Bring Along Extra Accessories
You never know when that extra LAN cable or micro-USB cord will come in handy. Furthermore, if you’ve ever done any traveling, you’ll know that buying new equipment from an airport can be more expensive than you’d like.

Carry On Your Devices
If you need to travel for business, be sure to put your devices into your carry-on baggage at any airport. The last thing you need is for a screen to get cracked while your luggage is rolling around the cargo area of a plane. Furthermore, you don’t want your luggage to be either lost or stolen while in-flight. It’s just safer for you to keep anything important in your carry-on luggage.

Be Wary of Free Wi-Fi
You should keep your device from automatically connecting to any open wireless connection that it latches onto. The reasoning for this is that hackers will literally lurk on them, waiting to steal any data that presents itself to them. This can put both your own data and that of customers at risk--all because you checked your email.

Turn Off Your Autofill and Password Management
A password manager keeps you from entering in the same information over and over, but it should be disabled while you’re traveling. What if someone steals your device? They would have access to anything that was auto-filled on it. It’s like leaving the keys to your car in the front seat without locking the door. It’s not impossible to go a few days without auto-populating passwords, and it sure beats the fallout of losing a device.

Use External Drives and USB to Back Up Data
What if you are working on a project while out of the office on vacation, and you misplace your device or it’s damaged beyond repair? All of that progress would be gone. Now, imagine that you have that data backed up to an external hard drive. Now you don’t have to worry about losing data or progress while working out of the office.

There are just a few practices that can keep your organization from succumbing to the dangers of traveling and working at the same time. If you have any questions, thoughts, or concerns about using technology while out of the office, reach out to us at 845-876-6561.

Without A Data Backup, You Aren’t Ready
Cybercriminals Who Use This Malware Will Get A Nas...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Malware Managed IT Services Disaster Recovery Microsoft VoIP Google Business Continuity Business Software Mobile Devices Productivity Outsourced IT Email Data Internet Smartphones Windows 10 communications Computer Hardware Innovation Efficiency IT Support Android Ransomware Cybercrime Office Alert Telephone Systems Server Data Backup IT Services Browser Small Business Saving Money Computers Windows Business Management Chrome Upgrade Quick Tips Social Engineering User Tips Mobile Device Management Collaboration Holiday Save Money Virtualization Smartphone Social Media Law Enforcement Miscellaneous How To Network Passwords Workplace Tips Data Recovery Recovery App BDR Firewall Managed IT BYOD Cybersecurity Cloud Computing Hacking Mobility Work/Life Balance Office Tips Avoiding Downtime Microsoft Office Productivity Proactive IT Money Office 365 Communication HaaS Budget Information Technology Health Password Private Cloud Bandwidth Flexibility Wi-Fi Facebook Bring Your Own Device Managed Service Provider Operating System Two-factor Authentication SaaS Marketing User Error Remote Monitoring Automation Phishing Spam Safety Artificial Intelligence Redundancy Value Risk Management Gadgets Managed IT Services Employer-Employee Relationship Data Management Black Market Router Internet of Things Compliance Google Drive Windows 10 Gmail Data Breach Applications Word OneNote Best Practice Charger Settings Data storage Shadow IT Government Solid State Drive Unsupported Software End of Support Internet Exlporer Entertainment Hiring/Firing Computer Care The Internet of Things Data Security Samsung Wearable Technology Patch Management Spam Blocking Business Owner Public Cloud Keyboard Scam Remote Computing Wireless Technology VPN Vulnerability Save Time DDoS Worker Computing Infrastructure Automobile Data Storage Workers Physical Security Apps Mobile Computing Business Intelligence Meetings Identity Theft Wireless Battery Apple Credit Cards Downtime Mobile Device Cleaning IT Management History Content Filtering Relocation IT Plan IT Consultant Lithium-ion battery Environment Politics Lifestyle Laptop Hard Drives Running Cable Big Data Amazon Video Games Google Apps Networking Streaming Media Electronic Medical Records Users Botnet IaaS Touchpad Leadership Unified Threat Management Data Protection Books Amazon Web Services Outlook Scalability Servers Infrastructure Netflix IBM SharePoint Virtual Reality Travel YouTube Root Cause Analysis Software Tips Encryption Internet exploMicrosoft HIPAA Comparison Emergency Online Shopping Humor Instant Messaging Flash Password Manager Supercomputer Employer Employee Relationship iPhone Worker Commute People webinar Notifications Advertising Specifications Evernote Fax Server Monitor Search Sync Sports Current Events Computer Accessories Software as a Service NarrowBand Data loss Mobile Office HBO Conferencing Millennials IT solutions Reputation How to Telephony Windows 10s Bluetooth Files Document Management Update Screen Mirroring Techology Frequently Asked Questions Wireless Charging IT Support Loyalty Hybrid Cloud Experience Workforce Transportation Customer Skype Colocation Google Docs Chromecast Cast Excel Fiber-Optic Antivirus PDF Music Telecommuting Benefits Start Menu Audit Website Tip of the week Cables Uninterrupted Power Supply Assessment USB Remote Work Distributed Denial of Service Smart Technology WiFi Mobile Computer Fan Knowledge Rootkit hacker Voice over Internet Protocol Legal Windows Server 2008 Unified Communications Television Troubleshooting Professional Services FENG Network Congestion Training Content Multi-Factor Security Data Warehousing Windows 7 Theft Emails Public Computer Hosted Solution Mouse Two Factor Authentication Education Tools Vendor Management eWaste Audiobook Trending Going Green Fraud Robot Regulations Cortana Tech Support IT solutions CrashOverride Business Mangement Recycling Thank You Administration Congratulations Webinar

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!