Tip of the Week: Planning Your Holiday Travels? Have A Plan For Productivity

Tip of the Week: Planning Your Holiday Travels? Have A Plan For Productivity

With Labor Day now behind us, it’s a hop, skip, and jump until the holidays arrive. With more companies allowing their employees to work remotely, holiday travel means that people are going to be taking their work on the road with them. Preventing credit card and identity theft has been a priority for shoppers during the season for many years. It’s important that the same security considerations be given to technology being used for business while traveling.

  1. Know Wi-Fi Options. In order to be productive while away from the office, you need to make sure that you’ll have access to stable Internet/WiFi. Many companies use VPNs to create secure connections from their networks to a mobile device. If you’re staying at a hotel, make sure that they’ll have WiFi to meet your needs. Reading through the hotels reviews on pages like Yelp! or Trip Advisor will let you see what other guests have said about WiFi signals.
  2. Bring Extra Accessories Just in Case. It never hurts to have an extra set of technology accessories like LAN cables, Micro-USB cords, charging bricks, portable mouses, etc. You’ll be happy to have an extra when you see that buying one from an airport or tourist destination costs a small fortune.
  3. Avoid Checking Your Devices. Even if you’re not going to work while traveling to your destination, it’s important to keep devices needed for work in a carry-on, rather than checked into the cargo hold. Think about how upset your boss would be if you were authorized to work remotely over the holiday but had your laptop or tablet cracked or lost before you even got to your destination.
  4. Beware of Free WiFi. Believe it or not, there are actually people who wait around for someone to logon using an insecure WiFi Connection. Open WiFi should be avoided whenever possible. Having your identity stolen is bad enough. Don’t put your customers’ personal information into jeopardy because you wanted to check your email.
  5. Turn Off Autofill and Password Management: While it is certainly convenient to use a password manager for work purposes, it’s a good idea to disable it while traveling. If someone steals your device with a password manager on it, you’re basically giving them a key into your personal information, your company’s information and your clients’ information. Having to type passwords manually for a few days will be worth it.
  6. Use External Harddrive or USB To Back Up Regularly on the Go: Imagine having worked on a project throughout your vacation, only to learn that your device was damaged or misplaced - and now you have nothing. If you’re not connecting to your network regularly, your work may not be backing up properly. Bring an external or USB drive along to save any progress you might have made. Even if your computer does backup regularly on its own, it’s better to be safe than sorry.

These are just a few of the things that you should be doing when working while traveling - or whenever you’re working away from the office. If you have any questions about using your technology on the road, make sure you check with your IT team or call us at 586 258-0650 .

Why Professional Service Providers Find Managed IT...
Major Cyber Threats Are Less Of A Worry With An MS...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Battery Bring Your Own Device Upgrades Worker Commute Black Market Advertising Hyperlink Document Management robot Health IT Consultant IT Management Blockchain Chevy HHR Evernote email encryption Disaster Recovery Network Cybersecurity automation communications How To Reliable Computing Tip of the Week Mobile Office Tips MSP Applications Telephony Going Green Hard Drives Mobile Devices Scam Take Your Agency to the Next Level WiFi Data Breach Bluetooth Fun Work Station Branding Proactive IT Data Recovery Microsoft Office 2010 IT Solutions Projects Wireless Charging HBO Monitoring Hardware Science IT Budget ebay Productivity Microsoft Office Transportation Paperless Office Mobility Language Virtual Reality Hosted Solution Jessica Stevenson Holiday Telephone Text Messaging DDoS Android Wearable Technology MySalesResults Touchpad Managed IT Services Training Remote Computing Windows 7 Managed IT Service Tech Tip Microsoft Windows 7 Nanotechnology Recovery Electronic Medical Records Updates Backkup Extreme Technology Makeover Ubuntu VPN Consultant Touchscreen Instant Messaging Bryant Caudill User Error Private Cloud Education Virtual Desktop hackers Computer Forensics Benefits Commerce Wasting Time Office 365 Budget Browser Internet Hosted Solutions Outlook Kleinschmidt Insurance Patch Management Content Filtering Students NFL social media Sales HITECH Act Television Customer Service Password Computer Two-factor Authentication Video Games Artificial Intelligence Steve Anderson Business Computing Maintenance Co-managed IT data backups 3D Printing Prodcutivity Value Upgrade Financial Technology SharePoint Money spam Gifts Files Company Culture HIPAA Backup and Disaster Recovery Access Control Reputation Vendor Images Small Business Cameras Spyware Virus Meetings Vendor Management Business Technology Mouse Screen Mirroring Smartphone Storage Employer-Employee Relationship Current Events Safety Hard Drive Politics Gamification Government Office Utility Computing Gmail Taxes Phone System Nokia Administration Medical IT PowerPoint BYOD Facebook Cortana Co-Managed Services Lithium-ion battery Virtual Private Network PDF Camera Alexa for Business Virtual Assistant Running Cable Ransomware Twitter Miscellaneous Microsoft Word Wasting Money Microsoft Excel Phishing Wireless Employee Congratulations IT consulting Supercomputer Privacy Regulations Printer Blogging Web Design SMARTweb Defense BDR Operating Sysytem Data Storage Teamwork Windows 10s Antivirus Google Assistant Software The Internet of Things Quick Tips Passwords Shortcut Apple Application Windows Ink Customer Relationship Management E-Commerce Firewall Presentation Avoiding Downtime Social Networking Best Available Innovation User Tips Remote Workers Best Practices Law Enforcement IoT In the News Identities Save Time Audit Network Security Fraud Mobile Device Management Cleaning Marketing lunch and learn Computer repair Windows 10 History Bandwidth Biometrics Device Security insurance GLAD Outsourced IT Operating System Alert Legislation App store Information Technology Cloud Computing Trending Licensing Save Money Managed IT Intranet Connectivity WIndows Server 2008 Chrome Hiring/Firing Adobe Domains Access Tech Support Programming Mobile Computing VoIP SMART Services Gift Giving File Sharing Phishing Scam HaaS User FAQ Proactive Back Up Applied TAM Networking SMB Google Docs Edge Jerry Fetty holidays Peripheral Settings Emergency End of Support Efficiency Cybercrime Wi-Fi Webinar Emails Data Management Flexibility Printer Server Best Practice Buisness Smart Tech Server hacker WPA3 ISP Solid State Drive IT Services Unified Threat Management Data Privacy IT Service Business Mobile Office Entertainment Testing Microblogging Specifications Keyboard Ciminal Remote Monitoring Legal Payroll Employer Employee Relationship Google Drive Hacking Mobile Security Computer Accessories Excel Big Data Computer Care Computer Fan Unsupported Software Printers Downtime Data Theft Accessory Credit Cards Internet Exlporer Windows 8 Saving Time Cloud Lifestyle Music MAIA malware Employee-Employer Relationship Social Engineering Retail Cost Management Workers Email Wireless Internet Hybrid Cloud Regulation Windows 10 OneNote Point of Sale WannaCry Surge Protector Travel Payment Cards Backup Wireless Technology press release Human Resources IIAI Tablets Professional Services Business Intelligence Tech Term Keyboard Shortcuts Search Data Loss Google Maps Computing CrashOverride Tablet iPad USB Telephone Systems Sync Fax Server video Laptop Hard Disk Drive Smart Technology Virtualization Automobile Data Backup Hetrick and Associates Apps Update Bloatware Content Filter Personal Information Router IT Support Network Congestion Management Cast Windows Work/Life Balance Display Social Experience Computers Word Data Dark Web Microsoft Near Field Communication Saving Money Memory IT Support Machine Learning Distributed Denial of Service Amazon DocStar Identity Break/Fix Doug Vanni Data Protection webinar Video Surveillance Identity Theft Managed Service Shadow IT Humor Internet of Things Managed Service Provider iOS Root Cause Analysis Communication Analytics website Mobile Device App Microsoft Outlook 2007 IT solutions Microsoft Outlook Workplace Tips Business Continuity Google Debate Avoid Downtime File Storage Technology Business Management Admin Conferencing Vulnerability Media Consumption Mircrosoft Managed IT Services Productivity Smartphones Information Unified Communications Inbound Marketing Project Management iPhone Disaster Gadgets Charger Financial Thank You Security Cameras Samsung IT Technicians Wiring Software as a Service Colocation Streaming Media Analysis Sports Data Security Online Currency Uninterrupted Power Supply Managing Stress Net Neutrality Chromecast Scott White Administrator Devices Printing Help Desk Scalability WIndows 7 Youtube Users SaaS Risk Management Compliance Collaboration Tutorial Books Comparison eWaste Wayne Joubert Websites agency automation Augmented Reality OneDrive Encryption Security Redundancy Chromebook

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *