Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

Know Your Wi-Fi Options
You can’t be productive without an Internet connection. This includes either mobile data or Wi-Fi. Chances are you’d rather look for an open wireless network than waste your mobile data, but unsecured networks can put your data at risk. One option you have is to check the reviews on sites like Yelp! and Trip Advisor to see what other guests have to say about Wi-Fi connections. Ideally, you want a VPN to secure your data while it’s in transit.

Bring Along Extra Accessories
You never know when that extra LAN cable or micro-USB cord will come in handy. Furthermore, if you’ve ever done any traveling, you’ll know that buying new equipment from an airport can be more expensive than you’d like.

Carry On Your Devices
If you need to travel for business, be sure to put your devices into your carry-on baggage at any airport. The last thing you need is for a screen to get cracked while your luggage is rolling around the cargo area of a plane. Furthermore, you don’t want your luggage to be either lost or stolen while in-flight. It’s just safer for you to keep anything important in your carry-on luggage.

Be Wary of Free Wi-Fi
You should keep your device from automatically connecting to any open wireless connection that it latches onto. The reasoning for this is that hackers will literally lurk on them, waiting to steal any data that presents itself to them. This can put both your own data and that of customers at risk--all because you checked your email.

Turn Off Your Autofill and Password Management
A password manager keeps you from entering in the same information over and over, but it should be disabled while you’re traveling. What if someone steals your device? They would have access to anything that was auto-filled on it. It’s like leaving the keys to your car in the front seat without locking the door. It’s not impossible to go a few days without auto-populating passwords, and it sure beats the fallout of losing a device.

Use External Drives and USB to Back Up Data
What if you are working on a project while out of the office on vacation, and you misplace your device or it’s damaged beyond repair? All of that progress would be gone. Now, imagine that you have that data backed up to an external hard drive. Now you don’t have to worry about losing data or progress while working out of the office.

There are just a few practices that can keep your organization from succumbing to the dangers of traveling and working at the same time. If you have any questions, thoughts, or concerns about using technology while out of the office, reach out to us at 845-876-6561.

Without A Data Backup, You Aren’t Ready
Cybercriminals Who Use This Malware Will Get A Nas...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 April 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Hackers Network Security Business Computing Backup Malware Managed IT Services Hosted Solutions Google Disaster Recovery Microsoft Software VoIP Business Mobile Devices Business Continuity Email Outsourced IT Internet Productivity Data Innovation Efficiency Cybercrime Windows 10 Ransomware IT Support Smartphones communications Computer Hardware Browser Data Backup Android Office IT Services Cloud Computing Computers Server Alert Telephone Systems User Tips Mobile Device Management Windows Small Business Data Recovery Saving Money Smartphone Business Management Virtualization BDR Quick Tips BYOD Social Engineering Internet of Things Chrome Upgrade Cybersecurity Network Recovery Mobility Work/Life Balance Microsoft Office Private Cloud Avoiding Downtime Collaboration Holiday How To Hacking Productivity Social Media Office Tips Miscellaneous Passwords Workplace Tips App Firewall Save Money Law Enforcement Managed IT Two-factor Authentication Wi-Fi Information Technology Facebook Health Redundancy Communication Operating System Data Protection Gmail Phishing Data Management Data Security Office 365 Bring Your Own Device Remote Monitoring Managed Service Provider Proactive IT Budget Money Password VPN Business Intelligence HaaS Bandwidth Flexibility Safety Apps Router Compliance Gadgets Data Breach Spam Black Market User Error Big Data Marketing Google Drive Cleaning Vulnerability Managed IT Services Tech Term SaaS Artificial Intelligence Value Risk Management Identity Theft Automation Employer-Employee Relationship Windows 10 IT Management Worker Automobile Word OneNote IT Plan Meetings Public Cloud Wireless Remote Computing Legal Wireless Technology Apple Unsupported Software Battery Training Mobile Device eWaste PDF Comparison Content Filtering Settings Computing Infrastructure Applications Charger Spam Blocking Physical Security Mobile Computing Data loss Electronic Medical Records Entertainment Solid State Drive Encryption Update Hiring/Firing Downtime Computer Care HIPAA History Wearable Technology Samsung Best Practice Data Storage Patch Management Workers Business Owner Data storage Shadow IT Keyboard Government End of Support CES Scam Document Management Internet Exlporer Credit Cards DDoS Save Time The Internet of Things Benefits Advertising Blockchain Trending Fraud Distributed Denial of Service Regulations WiFi Monitor Practices Sports NarrowBand Theft Assessment USB Smart Technology IT Consultant Human Resources Lifestyle Amazon Rootkit Reputation Hosted Computing Cortana Botnet Television Troubleshooting Files Hybrid Cloud Leadership Staff Amazon Web Services Mouse Servers Netflix Content Customer Inventory Chromecast Google Apps Travel Public Computer Root Cause Analysis Hosted Solution Colocation Software Tips Two Factor Authentication Education Digital Signature Online Shopping Flash Vendor Management Audiobook Infrastructure Lithium-ion battery Environment webinar Strategy Uninterrupted Power Supply Specifications Running Cable Evernote Streaming Media Sync Politics Hard Drives Video Games Password Manager Software as a Service Networking hacker HBO Conferencing Users Analysis Millennials Telephony Unified Threat Management SharePoint Windows 10s Scalability Business Mangement IBM Screen Mirroring Books Frequently Asked Questions IT Support Virtual Reality Accountants Workforce Skype Instant Messaging Going Green Recycling Notifications Google Docs Supercomputer Cast Emergency People Excel Employer Employee Relationship Fax Server Worker Commute Robot Tech Support Telecommuting Wireless Charging Start Menu Audit Relocation Mobile Office Search Laptop Criminal Website Current Events Tip of the week Computer Accessories IT solutions IoT Remote Work Fiber-Optic IaaS Mobile Computer Fan Knowledge How to Touchpad Voice over Internet Protocol Windows Server 2008 Bluetooth Outlook Smart Tech YouTube Cables Professional Services Loyalty FENG Experience Techology Transportation Internet exploMicrosoft Network Congestion Content Management Multi-Factor Security Antivirus Data Warehousing Windows 7 Emails Humor Insurance Unified Communications Tools Music iPhone Webinar IT solutions Thank You CrashOverride Congratulations Access Control Authentication Administration

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!