Tip of the Week: Planning Your Holiday Travels? Have A Plan For Productivity

Tip of the Week: Planning Your Holiday Travels? Have A Plan For Productivity

With Labor Day now behind us, it’s a hop, skip, and jump until the holidays arrive. With more companies allowing their employees to work remotely, holiday travel means that people are going to be taking their work on the road with them. Preventing credit card and identity theft has been a priority for shoppers during the season for many years. It’s important that the same security considerations be given to technology being used for business while traveling.

  1. Know Wi-Fi Options. In order to be productive while away from the office, you need to make sure that you’ll have access to stable Internet/WiFi. Many companies use VPNs to create secure connections from their networks to a mobile device. If you’re staying at a hotel, make sure that they’ll have WiFi to meet your needs. Reading through the hotels reviews on pages like Yelp! or Trip Advisor will let you see what other guests have said about WiFi signals.
  2. Bring Extra Accessories Just in Case. It never hurts to have an extra set of technology accessories like LAN cables, Micro-USB cords, charging bricks, portable mouses, etc. You’ll be happy to have an extra when you see that buying one from an airport or tourist destination costs a small fortune.
  3. Avoid Checking Your Devices. Even if you’re not going to work while traveling to your destination, it’s important to keep devices needed for work in a carry-on, rather than checked into the cargo hold. Think about how upset your boss would be if you were authorized to work remotely over the holiday but had your laptop or tablet cracked or lost before you even got to your destination.
  4. Beware of Free WiFi. Believe it or not, there are actually people who wait around for someone to logon using an insecure WiFi Connection. Open WiFi should be avoided whenever possible. Having your identity stolen is bad enough. Don’t put your customers’ personal information into jeopardy because you wanted to check your email.
  5. Turn Off Autofill and Password Management: While it is certainly convenient to use a password manager for work purposes, it’s a good idea to disable it while traveling. If someone steals your device with a password manager on it, you’re basically giving them a key into your personal information, your company’s information and your clients’ information. Having to type passwords manually for a few days will be worth it.
  6. Use External Harddrive or USB To Back Up Regularly on the Go: Imagine having worked on a project throughout your vacation, only to learn that your device was damaged or misplaced - and now you have nothing. If you’re not connecting to your network regularly, your work may not be backing up properly. Bring an external or USB drive along to save any progress you might have made. Even if your computer does backup regularly on its own, it’s better to be safe than sorry.

These are just a few of the things that you should be doing when working while traveling - or whenever you’re working away from the office. If you have any questions about using your technology on the road, make sure you check with your IT team or call us at 586 258-0650 .



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Touchscreen Document Management Language Access Mobile Humor Memory Business Management Vulnerability Ransomware Government WannaCry IT Technicians Storage WPA3 USB WiFi Meetings robot IT Solutions Scam Audit Wireless Training Smartphones Social Hiring/Firing Tutorial Apps Reputation WIndows 7 Mouse Sales Gadgets Transportation Data Backup Applications Cloud Streaming Media Network Security ebay End of Support Telephone Systems Charger Point of Sale How To Take Your Agency to the Next Level Workers Edge Administrator Benefits Information Password Vendor Management Remote Monitoring Steve Anderson WIndows Server 2008 Fax Server Firewall Office Identity Software as a Service Efficiency SMARTweb Defense Television holidays data backups Camera Smartphone Jessica Stevenson Excel Identity Theft Webinar Backkup Students Computer Fan Marketing Samsung IIAI Near Field Communication Keyboard Shortcuts Files lunch and learn Branding HBO Encryption Managed IT SMB press release Running Cable Battery Wiring DocStar Presentation Music Sync Communication Business Intelligence OneDrive File Sharing Gamification IT solutions communications Cleaning Holiday Browser Device Security Bring Your Own Device Spyware Update Google Biometrics Domains IT Consultant Printing Best Practices Downtime The Internet of Things Keyboard Youtube Data Theft Current Events Mobile Security Avoiding Downtime Debate Hacking Wireless Charging Email Customer Service Monitoring Augmented Reality Microsoft Office 2010 Computers Microsoft Outlook Virtual Reality Adobe Office Tips Chevy HHR Networking PDF iOS Going Green Mobile Device Shadow IT Miscellaneous Bloatware Telephony Thank You Regulations App store Bryant Caudill Project Management Testing Disaster Recovery DDoS HaaS Android Hardware Computer Care Worker Commute Scott White Tablets Bluetooth Microsoft Office Peripheral Shortcut Alert Applied TAM Hetrick and Associates Managed Service Business iPad Legal Data Loss Evernote Wasting Money Quick Tips Access Control Unified Communications Solid State Drive User Co-managed IT Hosted Solution Cortana Text Messaging Gmail User Tips Redundancy website Hard Disk Drive Smart Tech Wireless Internet Administration Cloud Computing Travel Back Up video social media Lifestyle Black Market VPN Intranet Recovery Inbound Marketing File Storage Jerry Fetty Security Cameras Virtualization IT Service Workplace Tips Microsoft Windows 7 PowerPoint Wayne Joubert Wireless Technology Managed Service Provider IoT 3D Printing Save Time Politics Consultant Mobile Device Management Employer Employee Relationship Utility Computing Personal Information Chromebook App Taxes Virtual Private Network Printer Server Management Cameras Artificial Intelligence Data Protection Advertising Internet Video Surveillance Telephone Extreme Technology Makeover Projects Internet Exlporer Work/Life Balance Employee-Employer Relationship Security Application Gift Giving spam Mobile Devices Employer-Employee Relationship Tech Support Safety Computing Operating System Wearable Technology Data Storage Content Filtering Emails Remote Workers History Microsoft Excel Computer Forensics Best Available Collaboration Lithium-ion battery Server Vendor Blogging Mobile Computing Windows 7 SMART Services Flexibility Reliable Computing email encryption Windows Computer Accessories Risk Management Backup Retail Managed IT Services Education Tip of the Week Wasting Time IT Support Budget Net Neutrality Alexa for Business IT Services Dark Web Chrome Cost Management hackers Hyperlink Help Desk Office 365 CrashOverride Windows 10 Gifts Unified Threat Management Bandwidth Microsoft agency automation Screen Mirroring Smart Technology iPhone Data Privacy Technology Antivirus Microsoft Word Supercomputer Hybrid Cloud Unsupported Software Video Games Instant Messaging Avoid Downtime Financial Health Users Microblogging Paperless Office Cast Printer HIPAA Websites IT Budget Media Consumption Kleinschmidt Insurance Phishing Hard Drive Hosted Solutions Cybercrime Saving Money Nanotechnology Data Management Legislation hacker Tech Term Internet of Things Settings Root Cause Analysis Operating Sysytem Managed IT Service Work Station Outlook MySalesResults Business Continuity Saving Time Software Accessory Microsoft Outlook 2007 Virus Disaster Books Payroll FAQ OneNote Fun Trending Computer Best Practice eWaste Phishing Scam VoIP Cybersecurity Phone System Business Technology Google Docs Hard Drives Display In the News Company Culture Private Cloud Big Data Upgrades automation Distributed Denial of Service BDR Managing Stress Specifications Teamwork Windows 8 Tech Tip Chromecast Social Engineering Windows 10s Ubuntu Virtual Desktop Credit Cards Content Filter Data Recovery Surge Protector Amazon Social Networking Network Congestion Analysis Blockchain Compliance Patch Management Doug Vanni Customer Relationship Management Ciminal Virtual Assistant Productivity IT Support Regulation Web Design Innovation Fraud Two-factor Authentication Licensing Nokia Network ISP Financial Technology Images Windows Ink User Error Touchpad Small Business Save Money Conferencing Proactive IT webinar HITECH Act Windows 10 Colocation Facebook Money Proactive Experience Apple Programming IT consulting Professional Services Privacy GLAD Data Outsourced IT Commerce Google Assistant Mobile Office Comparison Analytics NFL MSP Passwords Congratulations Mobility IT Management Electronic Medical Records malware Productivity Law Enforcement Search Router Updates Online Currency insurance Wi-Fi Remote Computing Science Maintenance Printers Twitter Mircrosoft Prodcutivity Devices Human Resources Admin Laptop Co-Managed Services Buisness MAIA Uninterrupted Power Supply Google Maps SaaS Computer repair Upgrade BYOD Word Emergency Connectivity Identities Data Breach Google Drive Managed IT Services Scalability Automobile Value Information Technology Sports Tablet Data Security SharePoint Machine Learning Entertainment Business Computing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *