4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Planning Your Holiday Travels? Have A Plan For Productivity

Tip of the Week: Planning Your Holiday Travels? Have A Plan For Productivity

Back to school is upon us and then it’s a hop, skip, and jump until the holidays arrive. With more companies allowing their employees to work remotely, holiday travel will mean that people are going to be taking their work on the road with them. Preventing credit card and identity theft has been a priority for shoppers during the season for many years. It’s important that the same security considerations be given to technology being used for business while traveling.

  1. Know Wi-Fi Options. In order to be productive while away from the office, you need to make sure that you’ll have access to stable Internet/WiFi. Many companies use VPNs to create secure connections from their networks to a mobile device. If you’re staying at a hotel, make sure that they’ll have WiFi to meet your needs. Reading through the hotels reviews on pages like Yelp! or Trip Advisor will let you see what other guests have said about WiFi signals.
  2. Bring Extra Accessories Just in Case. It never hurts to have an extra set of technology accessories like LAN cables, Micro-USB cords, charging bricks, portable mouses, etc. You’ll be happy to have an extra when you see that buying one from an airport or tourist destination costs a small fortune.
  3. Avoid Checking Your Devices. Even if you’re not going to work while traveling to your destination, it’s important to keep devices needed for work in a carryon, rather than checked into the cargo hold. Think about how upset your boss would be if you were authorized to work remotely over the holiday but had your laptop or tablet cracked or lost before you even got to your destination.
  4. Beware of Free WiFi. Believe it or not, there are actually people who wait around for someone to logon using an insecure WiFi Connection. Open WiFi should be avoided whenever possible. Having your identity stolen is bad enough. Don’t put your customers’ personal information into jeopardy because you wanted to check your email.
  5. Turn Off Autofill and Password Management: While it is certainly convenient to use a password manager for work purposes, it’s a good idea to disable it while traveling. If someone steals your device with a password manager on it, you’re basically giving them a key into your personal information, your company’s information and your clients’ information. Having to type passwords manually for a few days will be worth it.
  6. Use External Harddrive or USB To Back Up Regularly on the Go: Imagine having worked on a project throughout your vacation, only to learn that your device was damaged or misplaced - and now you have nothing. If you’re not connecting to your network regularly, your work may not be backing up properly. Bring an external or USB drive along to save any progress you might have made. Even if your computer does backup regularly on its own, it’s better to be safe than sorry.

These are just a few of the things that you should be doing when working while traveling - or whenever you’re working away from the office. If you have any questions about using your technology on the road, make sure you check with your IT team or call us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency IT Support Windows Innovation Disaster Recovery Business Continuity Hardware Workplace Tips VoIP Mobile Devices Computer User Tips Saving Money Miscellaneous Virtualization Windows 10 Upgrade Mobile Device Management Network Security Data Server Email Mobile Computing communications Alert Communication Save Money Network Microsoft Office Small Business Social Media Quick Tips Smartphone Smartphones BYOD Going Green Information Technology Mobile Office Apps Android Health Office Managed IT Services Outsourced IT Browser Gadgets Application Ransomware Operating System Chrome Tablet The Internet of Things Cybersecurity Avoiding Downtime WiFi Mobility Productivity Disaster Managed IT Holiday Firewall Data Backup Remote Computing History Unified Threat Management IT Solutions Best Practice Data Management Spam BDR Cybercrime Passwords Telephone Systems Search Data Recovery Risk Management Facebook Hacking Remote Monitoring Hard Drives Apple Saving Time Employer-Employee Relationship Vendor Management Marketing Budget Automation VPN Law Enforcement Office Tips iPhone Customer Relationship Management Big Data Content Filtering Phishing Password Proactive IT Money Hosted Solution Computers User Error Collaboration Phone System Recovery Wireless Technology Work/Life Balance Wearable Technology Maintenance PowerPoint Printer Antivirus Office 365 Virus USB Shortcut Social Analytics Encryption Gmail Router Government Telephony Bring Your Own Device Lithium-ion battery Vulnerability Humor Current Events Administration Trending Education Net Neutrality SaaS Audit HaaS Tech Support Business Intelligence Data Security Users Politics Outlook Personal Information Windows 8 Social Engineering App Wireless Cost Management Unsupported Software Intranet Google Drive Cloud Computing Bandwidth Private Cloud Printer Server Save Time Point of Sale Laptop IT COnsultant OneNote Data Protection Computer Repair Data Storage Two-factor Authentication Redundancy Managing Stress Excel Display Samsung Wi-Fi Augmented Reality Emergency Artificial Intelligence Social Networking Applications Paperless Office Travel hacker Update Fax Server Customer Service Biometrics Transportation Workplace Retail Virtual Reality Streaming Media Robot Meetings Computer Care Battery Uninterrupted Power Supply online currency Automobile IT Support End of Support Instant Messaging Emails Network Congestion HIPAA Windows 10 Entertainment Benefits Internet Exlporer DDoS Computer Accessories Help Desk Efficency Internet of Things Mouse Compliance Identity Theft Solid State Drive Flexibility Sports Regulations PDF Website Licensing Scalability Files Microsoft Excel Value Dark Web Cameras Screen Mirroring Safety Text Messaging OneDrive Chromecast Amazon User How To Co-managed IT Science File Sharing Upgrades Presentation Cast Virtual Desktop Administrator Bluetooth Best Available Hard Drive Training Windows 10s Nanotechnology Colocation IT Technicians systems Consultant Lifestyle The Blindside Of Ebay Access Computing SharePoint Uograde Images Tablets Company Culture Hard Disk Drive Black Market Root Cause Analysis hack Touchscreen HBO IT Security Teamwork NFL Cleaning best practices CrashOverride Experience Cortana Busines Continuity Near Field Communication IT Management Keyboard Avoid Downtime Networking Word data breach Settings Music Legislation Twitter IT consulting Wiring WIndows Server 2008 Hiring/Firing Human Resources Data storage Running Cable Information Windows Ink risk management Books Surge Protector Debate Television Reliable Computing Patch Management Smart Technology Video Games 3D Printing Google Maps Document Management Commerce Data Breach Advertising Bloatware Regulation Legal Touchpad Software as a Service Mobile Device Managed Security ISP Branding Sync Scam Distributed Denial of Service Nokia Data Loss iOS Managed IT Service Programming Blogging WIndows 7 Adobe Employer Employee Relationship Managed IT Services Operating Sysytem eWaste Storage Google Docs Inbound Marketing Computer Fan Worker Commute Electronic Medical Records IT service Devices Webinar IT Budget Credit Cards Domains Spyware Mobile IT solutions Reputation FAQ Professional Services Charger Youtube Microblogging Wireless Charging Buisness Sales Shadow IT Relocation Managed Service Provder WannaCry Tutorial Webinar Evernote Comparison Workers Specifications Updates Gift Giving Conferencing Microsoft Word Taxes Gifts Device Security Supercomputer