MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Planning Your Holiday Travels? Have A Plan For Productivity

Tip of the Week: Planning Your Holiday Travels? Have A Plan For Productivity

Back to school is upon us and then it’s a hop, skip, and jump until the holidays arrive. With more companies allowing their employees to work remotely, holiday travel will mean that people are going to be taking their work on the road with them. Preventing credit card and identity theft has been a priority for shoppers during the season for many years. It’s important that the same security considerations be given to technology being used for business while traveling.

  1. Know Wi-Fi Options. In order to be productive while away from the office, you need to make sure that you’ll have access to stable Internet/WiFi. Many companies use VPNs to create secure connections from their networks to a mobile device. If you’re staying at a hotel, make sure that they’ll have WiFi to meet your needs. Reading through the hotels reviews on pages like Yelp! or Trip Advisor will let you see what other guests have said about WiFi signals.
  2. Bring Extra Accessories Just in Case. It never hurts to have an extra set of technology accessories like LAN cables, Micro-USB cords, charging bricks, portable mouses, etc. You’ll be happy to have an extra when you see that buying one from an airport or tourist destination costs a small fortune.
  3. Avoid Checking Your Devices. Even if you’re not going to work while traveling to your destination, it’s important to keep devices needed for work in a carryon, rather than checked into the cargo hold. Think about how upset your boss would be if you were authorized to work remotely over the holiday but had your laptop or tablet cracked or lost before you even got to your destination.
  4. Beware of Free WiFi. Believe it or not, there are actually people who wait around for someone to logon using an insecure WiFi Connection. Open WiFi should be avoided whenever possible. Having your identity stolen is bad enough. Don’t put your customers’ personal information into jeopardy because you wanted to check your email.
  5. Turn Off Autofill and Password Management: While it is certainly convenient to use a password manager for work purposes, it’s a good idea to disable it while traveling. If someone steals your device with a password manager on it, you’re basically giving them a key into your personal information, your company’s information and your clients’ information. Having to type passwords manually for a few days will be worth it.
  6. Use External Harddrive or USB To Back Up Regularly on the Go: Imagine having worked on a project throughout your vacation, only to learn that your device was damaged or misplaced - and now you have nothing. If you’re not connecting to your network regularly, your work may not be backing up properly. Bring an external or USB drive along to save any progress you might have made. Even if your computer does backup regularly on its own, it’s better to be safe than sorry.

These are just a few of the things that you should be doing when working while traveling - or whenever you’re working away from the office. If you have any questions about using your technology on the road, make sure you check with your IT team or call us at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 22 September 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Business Computing Privacy Best Practices Hackers Malware Hosted Solutions Backup Software Internet Network Security Disaster Recovery Computer google Productivity Business Microsoft Managed IT Services Windows 10 Business Continuity IT Support VoIP Innovation IT Services User Tips Hardware Mobile Devices Outsourced IT Business Management communications Mobility Windows Productivity Ransomware Efficiency Email Cybercrime Saving Money Managed IT Mobile Device Management Server Telephone Systems Save Money Smartphone Hosted Solution Quick Tips Operating System Android Virtualization Law Enforcement Apps Recovery Chrome Microsoft Office BYOD Data Passwords browser BDR Password Small Business Information Technology Cybersecurity Social upgrade Budget Communication Office 365 VPN Facebook Hacking Avoiding Downtime Wireless Health Miscellaneous Managed Service Provider Computers Money Unsupported Software Wi-Fi Smartphones Data Management Firewall Application search App Current Events Google Drive Government Data Backup Automation Telephony USB Alert Save Time Gadgets Risk Management Applications Workplace Tips Private Cloud Office tips Cloud Computing Proactive IT Social Media Shortcut Work/Life Balance Humor Disaster Cost Management WiFi Employer-Employee Relationship Spam Going Green Bandwidth Samsung Antivirus Phishing Network Audit Battery Data Storage Managed IT Services HaaS Compliance Hacker Internet Exlporer Personal Information Solid State Drive Wireless Technology Automobile Gmail Saving Time Mobile Computing Cleaning Office Transportation Update Computer Care Phone System IT solutions Robot History DDoS Users IT Support Identity Theft End of Support Holiday Remote Computing Best Practice Television Social Engineering Internet of Things Flexibility The Internet of Things Data Recovery Streaming Media Windows 10 Scalability Wearable Technology Patch Management Books NFL Hiring/Firing Augmented Reality Education hp Data storage Vendor Management Business Intelligence Touchscreen Router Vulnerability How To SaaS domain Outlook Word Benefits Administration Chromecast Managed IT Service iOS Sports Unified Threat Management remote Excel Content Filtering Colocation eWaste Yahoo Tech Support Training Entertainment Hard Drives Computer Fan Running Cable Files Upgrades Server 2008 Regulation Electronic Medical Records Lithium-ion battery OneNote Point of Sale Administrator Ali Rowghani Company Culture Screen Mirroring HIPAA Data Breach Trending Dark Web Black Market User Error Consultant Sync Smart Technology Meetings Relocation Access Value Cast Politics Emails Avoid Downtime Shadow IT Two-factor Authentication server installation dvd "cannot install required files" Adobe stock Settings Document Management iPhone Data Security Experience Marketing PDF Licensing tweet HBO Webinar Video Games Text Messaging Virtual Reality calculator Mobile Twitter Scam control Data Protection Music IT solutions Legal Collaboration Encryption Professional Services WSJ Employer Employee Relationship Laptop Uninterrupted Power Supply Exchange IT Management Analytics Windows 10s Nanotechnology Instant Messaging Distributed Denial of Service altivista Travel Keyboard Computer Accessories Commerce Worker Commute Artificial Intelligence Touchpad Mobile Device SBS WIndows Server 2008 Big Data Hard Disk Drive Root Cause Analysis Managing Stress Reputation compaq Tablets Apple Advertising Windows Ink CrashOverride Safety Emergency Thank You WannaCry Congratulations Cache Monitors Worker Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...