ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

Know Your Wi-Fi Options
You can’t be productive without an Internet connection. This includes either mobile data or Wi-Fi. Chances are you’d rather look for an open wireless network than waste your mobile data, but unsecured networks can put your data at risk. One option you have is to check the reviews on sites like Yelp! and Trip Advisor to see what other guests have to say about Wi-Fi connections. Ideally, you want a VPN to secure your data while it’s in transit.

Bring Along Extra Accessories
You never know when that extra LAN cable or micro-USB cord will come in handy. Furthermore, if you’ve ever done any traveling, you’ll know that buying new equipment from an airport can be more expensive than you’d like.

Carry On Your Devices
If you need to travel for business, be sure to put your devices into your carry-on baggage at any airport. The last thing you need is for a screen to get cracked while your luggage is rolling around the cargo area of a plane. Furthermore, you don’t want your luggage to be either lost or stolen while in-flight. It’s just safer for you to keep anything important in your carry-on luggage.

Be Wary of Free Wi-Fi
You should keep your device from automatically connecting to any open wireless connection that it latches onto. The reasoning for this is that hackers will literally lurk on them, waiting to steal any data that presents itself to them. This can put both your own data and that of customers at risk--all because you checked your email.

Turn Off Your Autofill and Password Management
A password manager keeps you from entering in the same information over and over, but it should be disabled while you’re traveling. What if someone steals your device? They would have access to anything that was auto-filled on it. It’s like leaving the keys to your car in the front seat without locking the door. It’s not impossible to go a few days without auto-populating passwords, and it sure beats the fallout of losing a device.

Use External Drives and USB to Back Up Data
What if you are working on a project while out of the office on vacation, and you misplace your device or it’s damaged beyond repair? All of that progress would be gone. Now, imagine that you have that data backed up to an external hard drive. Now you don’t have to worry about losing data or progress while working out of the office.

There are just a few practices that can keep your organization from succumbing to the dangers of traveling and working at the same time. If you have any questions, thoughts, or concerns about using technology while out of the office, reach out to us at 630-549-6199.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Hackers Business Computing Backup Microsoft Cloud Innovation Small Business Email Android Business Cybercrime Efficiency Smartphones Malware Software Hardware How To Network Security Ransomware VoIP Data Backup Windows Mobile Devices Data Chrome Computers Mobile Device Management Productivity Business Management User Tips Internet Business Continuity Cybersecurity Cloud Computing Social Engineering Managed IT Services Browser Safety Bring Your Own Device Phishing Spam Data Breach Gadgets Operating System Two-factor Authentication Social Media Data Security Vulnerability Upgrade Telephone Systems Smartphone App Internet of Things Computer Money Data Recovery Communication Law Enforcement Windows 10 Outsourced IT Alert Server Collaboration Managed IT Services Automation Disaster Recovery Physical Security Save Money Passwords Artificial Intelligence Spam Blocking Word Private Cloud Gmail Google Drive BYOD Wi-Fi Public Cloud Miscellaneous The Internet of Things Virtualization Apps Bandwidth Hosted Solutions Office 365 Communications Data Protection Redundancy Avoiding Downtime Comparison Router Downtime Government BDR Windows 10 Remote Monitoring Data Storage Recovery Business Intelligence VPN Update Quick Tips IT Management OneNote CES Saving Money IT Plan Network Internet Exlporer Data storage Unsupported Software Google Apps Tools Advertising Root Cause Analysis Blockchain Automobile Website Big Data Outlook Legal Tip of the week Software Tips Remote Work Electronic Medical Records Employer-Employee Relationship Charger Humor YouTube HIPAA Work/Life Balance Voice over Internet Protocol Windows Server 2008 Health webinar Keyboard Identity Theft Windows 10s Workers Computer Care Managed IT Meetings Human Resources Networking Microsoft Office Facebook Hiring/Firing Windows 7 Conferencing Credit Cards Infrastructure Samsung Botnet Hybrid Cloud Monitor Staff IBM Multi-Factor Security Patch Management Fraud Flash Files Going Green HBO Uninterrupted Power Supply Emails Solid State Drive Password Manager Value Travel PDF Black Market Office NarrowBand Data loss Data Management Supercomputer Trending Scam Amazon History Office Tips Audit Business Mangement Relocation Wireless Technology Screen Mirroring Digital Signature Budget Password Amazon Web Services Sync Cleaning Sports Computer Fan Recycling Cast Encryption Specifications Online Shopping User Error Tech Support Netflix FENG eWaste Robot Accountants Current Events HaaS Evernote IT Services Telephony Laptop Shadow IT IT Support Criminal Reputation Apple Chromecast Knowledge Holiday Millennials Wireless Charging Skype End of Support Touchpad Customer Flexibility Frequently Asked Questions iPhone Network Congestion Workforce Cortana Start Menu Internet exploMicrosoft Settings Hacking Content Management Google Docs Marketing Excel Managed Service Provider DDoS IT Consultant Telecommuting Productivity Thank You Vendor Management Search Politics Congratulations How to Books Save Time Best Practice Emergency Mobile Device Experience Employer Employee Relationship Video Games Music Battery Computer Accessories Scalability Webinar Loyalty Education Information Technology Content Transportation Bluetooth Workplace Tips IT solutions SaaS Computing Infrastructure Audiobook Benefits Techology Instant Messaging Applications Entertainment Firewall Worker Assessment Users Wearable Technology Wireless Smart Technology IT Support Rootkit Remote Computing Television Virtual Reality WiFi USB Two Factor Authentication Training CrashOverride Public Computer Worker Commute Troubleshooting Mobility Risk Management