MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Planning Your Holiday Travels? Have A Plan For Productivity

Tip of the Week: Planning Your Holiday Travels? Have A Plan For Productivity

Back to school is upon us and then it’s a hop, skip, and jump until the holidays arrive. With more companies allowing their employees to work remotely, holiday travel will mean that people are going to be taking their work on the road with them. Preventing credit card and identity theft has been a priority for shoppers during the season for many years. It’s important that the same security considerations be given to technology being used for business while traveling.

  1. Know Wi-Fi Options. In order to be productive while away from the office, you need to make sure that you’ll have access to stable Internet/WiFi. Many companies use VPNs to create secure connections from their networks to a mobile device. If you’re staying at a hotel, make sure that they’ll have WiFi to meet your needs. Reading through the hotels reviews on pages like Yelp! or Trip Advisor will let you see what other guests have said about WiFi signals.
  2. Bring Extra Accessories Just in Case. It never hurts to have an extra set of technology accessories like LAN cables, Micro-USB cords, charging bricks, portable mouses, etc. You’ll be happy to have an extra when you see that buying one from an airport or tourist destination costs a small fortune.
  3. Avoid Checking Your Devices. Even if you’re not going to work while traveling to your destination, it’s important to keep devices needed for work in a carryon, rather than checked into the cargo hold. Think about how upset your boss would be if you were authorized to work remotely over the holiday but had your laptop or tablet cracked or lost before you even got to your destination.
  4. Beware of Free WiFi. Believe it or not, there are actually people who wait around for someone to logon using an insecure WiFi Connection. Open WiFi should be avoided whenever possible. Having your identity stolen is bad enough. Don’t put your customers’ personal information into jeopardy because you wanted to check your email.
  5. Turn Off Autofill and Password Management: While it is certainly convenient to use a password manager for work purposes, it’s a good idea to disable it while traveling. If someone steals your device with a password manager on it, you’re basically giving them a key into your personal information, your company’s information and your clients’ information. Having to type passwords manually for a few days will be worth it.
  6. Use External Harddrive or USB To Back Up Regularly on the Go: Imagine having worked on a project throughout your vacation, only to learn that your device was damaged or misplaced - and now you have nothing. If you’re not connecting to your network regularly, your work may not be backing up properly. Bring an external or USB drive along to save any progress you might have made. Even if your computer does backup regularly on its own, it’s better to be safe than sorry.

These are just a few of the things that you should be doing when working while traveling - or whenever you’re working away from the office. If you have any questions about using your technology on the road, make sure you check with your IT team or call us at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup google Business Management Managed IT Services Productivity Computer Microsoft Disaster Recovery Business IT Support Mobile Devices Outsourced IT Business Continuity User Tips Windows 10 communications VoIP Email Productivity Hardware IT Services Innovation Cybercrime Mobility Windows Managed IT Mobile Device Management Data Backup Efficiency Smartphone Server Ransomware Cybersecurity Apps Saving Money Data Recovery browser Telephone Systems Small Business Save Money Hosted Solution Quick Tips Operating System Android Virtualization Law Enforcement Internet of Things Recovery Data Security Chrome Office 365 Microsoft Office BYOD VPN Data BDR Passwords Money Password Information Technology Holiday Smartphones Data Management upgrade Social App Communication IT Support Google Drive Hacking Avoiding Downtime Wireless Facebook Alert Government Health Miscellaneous Managed Service Provider Computers Risk Management Unsupported Software Phishing Cloud Computing Gadgets Best Practice Social Media Work/Life Balance Budget Wi-Fi Firewall Application Current Events Audit search Collaboration Personal Information Wireless Technology Politics Two-factor Authentication User Error Automation Telephony Windows 10 USB Save Time Vulnerability Applications Private Cloud Office tips History Identity Theft Managed IT Services Proactive IT Workplace Tips Flexibility Data Breach Shortcut The Internet of Things Social Engineering Data Loss Marketing Employer-Employee Relationship Streaming Media Apple SaaS Google Docs Samsung Antivirus Content Filtering Network Sports WiFi Battery HaaS Tech Support Going Green Bandwidth Data Protection Compliance Hacker Internet Exlporer eWaste Solid State Drive Redundancy Blockchain Automobile Commerce iPhone Cortana Saving Time Cleaning Mobile Computing Office Transportation Computer Care Phone System Gmail Spam Robot Legal Users Encryption Update Excel End of Support Remote Computing IT solutions Data Storage DDoS OneNote Artificial Intelligence Humor Disaster Television Cost Management Project Management compaq Vendor Management Settings Data storage Router How To Retail Wearable Technology Licensing MSP Benefits WannaCry Administration Chromecast Updates hp Webinar Conferencing Unified Threat Management HBO Mobile intranet domain Colocation Microsoft Word Microsoft Excel Training Hard Drives Entertainment Electronic Medical Records IT solutions Files Gifts Upgrades Lithium-ion battery Professional Services IT budget remote Point of Sale Administrator File Sharing Yahoo Company Culture HIPAA Windows 10s Black Market Consultant IT Management Maintenance Running Cable Travel Server 2008 Smart Technology Nanotechnology Relocation Access Avoid Downtime Storage Ali Rowghani Value Hard Disk Drive Shadow IT Trending Credit Cards WIndows Server 2008 Device Security Tablets Identities Root Cause Analysis Document Management PDF Experience FAQ Patch Management Devices NFL server installation dvd "cannot install required files" Augmented Reality Video Games Lifestyle stock Business Intelligence Text Messaging Touchscreen Virtual Reality Charger Outlook Spyware Word Scam Legislation tweet Managed IT Service Music iOS Wireless Charging Fraud Windows Ink calculator Employer Employee Relationship Laptop Uninterrupted Power Supply Comparison Twitter Analytics control Keyboard Computer Fan Instant Messaging Evernote Regulation Edge Google Maps Computer Accessories Worker Commute Touchpad Specifications WSJ Mobile Device Screen Mirroring Big Data Ciminal Exchange Dark Web Reputation Managing Stress Networking Sync Distributed Denial of Service Software as a Service altivista Meetings Advertising Scalability Sales Cast Books Emails Adobe SBS Hiring/Firing Education Workers Cache Monitors Remote Monitoring Safety Emergency Thank You Worker Congratulations CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...