Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Make These Cybersecurity Mistakes Before Going on Vacation

Don’t Make These Cybersecurity Mistakes Before Going on Vacation

Whether you are sitting on a warm beach, taking a scenic train ride out into the countryside, or camping at the foot of a mountain, a vacation can be a great way to disconnect from the everyday buzz of work and screens. Although, if you are like me, you probably bring a few screens with you… let’s assume you keep it to a minimum. Either way, it’s important to not set yourself up for failure when you get back.

Consider a Hotspot Over Public Wi-Fi

Depending on your carrier, it might cost a little more, but it is worth it. If you are bringing a laptop or tablet or any other device that connects to Wi-Fi, but you know you’ll have cell service, using your smartphone as a hotspot will be so much safer than connecting to the Wi-Fi in a hotel, campground, or coffee shop. Plus, it’s guaranteed to work (provided you have decent cell service).

If You Have to Connect to Public Wi-Fi, Do So Conservatively

Let’s say you need to look up directions or pull up your flight itinerary, and you just need to connect to Wi-Fi in order to do it. Don’t use that opportunity to check your email, log into social media, or pass all sorts of other sensitive information across the network. The longer you are connected, the more risk there is that your data will be stolen.

Better yet, ensure that you have a secure VPN to tunnel into your work network if you need to access work-related information. This is something that all businesses should be able to provide these days, especially if they survived having workers work from home during the pandemic.

Don’t Overshare on Social Media

If you aren’t going to be home, who is going to watch over your house?

Don’t expect those automated outdoor lights to do the heavy lifting for your home security either. We’re not saying that your week-long absence is going to result in a break-in, but it’s better to be safe than sorry. Don’t advertise that your home will be vacant for the next week on social media.

Home burglary isn’t even the biggest security issue here, either. If someone can see that you are spending two weeks in the Poconos, they can easily craft up some fiction about how you lost your wallet and need the help of a random Facebook friend to wire you the funds to come home. Social media accounts like Facebook and LinkedIn are hacked all the time, and it’s possible that a cybercriminal might just be waiting for a good time to scam your innocent friends into “helping” you out by begging for gift cards.

Make Sure Your Travel Accounts are Secure

We often end up making a lot of new accounts when traveling, whether it be with an airline we’re flying for the first time, or a ride-sharing service, a hotel website, and more.

Don’t get lax about your personal information. Make sure you always use strong, unique passwords for these accounts, and document them securely (preferably in your password manager, not your browser). When possible, it helps to do some of this ahead while you are planning your vacation, as you probably won’t want to mess around with it while checking in or ordering a ride from the cocktail bar to the beach.

Take Us With You!

If you are planning on going on vacation, we hope you enjoy it! It’s been a rough couple of years for lots of us, and we bet you deserve the much-needed R&R!

If we manage the IT for your business for you, know that we’ll keep everything running smoothly for you while you are gone!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 January 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet User Tips IT Support Efficiency Malware Privacy Email Phishing Google Workplace Tips Computer Collaboration IT Services Users Mobile Device Hosted Solutions Ransomware Quick Tips Small Business Cybersecurity Workplace Strategy Microsoft Data Backup Communication Smartphone Saving Money Business Management VoIP Smartphones Android Passwords Mobile Devices communications Backup Data Recovery Upgrade Managed Service Managed IT Services Browser Disaster Recovery Social Media Microsoft Office Tech Term Network Internet of Things Remote Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Managed Service Provider Windows Miscellaneous Current Events Gadgets Remote Work Server Outsourced IT Information Holiday Productivity Encryption Spam Employee/Employer Relationship AI Windows 10 Compliance Data Management Business Continuity Government Training Office Windows 10 Bandwidth Blockchain Virtualization Wi-Fi Business Technology Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Chrome Networking Gmail Budget Apple Vendor App Employer-Employee Relationship Managed Services Voice over Internet Protocol Office 365 How To BDR WiFi BYOD Applications Access Control Computing Hacker Tip of the week Information Technology Avoiding Downtime Conferencing Marketing Healthcare Analytics Office Tips Augmented Reality Managed IT Services Storage Password Bring Your Own Device Big Data HIPAA Router Virtual Private Network Operating System Health Computers Help Desk Risk Management Website Retail Telephone Scam Data loss IT Support Firewall Cooperation Free Resource Project Management Windows 7 Patch Management The Internet of Things Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Social Going Green Display Printer Customer Service Windows 11 Paperless Office Infrastructure Cybercrime Monitoring 2FA Excel Document Management Remote Workers Maintenance Word Antivirus Downloads Outlook iPhone Licensing Money Humor Vulnerabilities Entertainment Data Privacy Safety Images 101 Sports Mouse Robot Mobility Telephone System Multi-Factor Authentication Cost Management Administration IT Management VPN Employees Meetings Physical Security Integration Customer Relationship Management User Tip Modem Computer Repair Mobile Security Settings Processor Wireless Printing Content Filtering Holidays Hacking YouTube Data Storage Presentation Smart Technology Supply Chain Video Conferencing Cryptocurrency Machine Learning Managed Services Provider Wireless Technology Professional Services Saving Time Virtual Machines Virtual Desktop Data storage Managed IT Service LiFi Download Net Neutrality Twitter Alerts SQL Server Technology Care Hard Drives Windows 8 Laptop Financial Data Error History Domains Drones Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Refrigeration Halloween Social Network Telework Cyber security Public Speaking Multi-Factor Security Tech Human Resources Tablet IoT Communitications Lithium-ion battery Dark Web Cables CES Trends Supply Chain Management Alert Hacks Entrepreneur Scary Stories Dark Data Google Calendar Term Google Apps Fun Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Deep Learning Data Analysis Gamification Flexibility Notifications Staff Value Business Intelligence Undo Legislation Shortcuts Education Organization Travel Social Networking Google Maps Smart Devices Ransmoware Techology Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Mobile Computing Comparison Google Play Be Proactive Search Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Application Best Practice Unified Threat Management Directions Videos Buisness Wasting Time Threats IBM Legal Network Congestion Specifications Security Cameras Workplace Strategies IT solutions Trend Micro Internet Exlporer Software as a Service Fraud Meta Business Growth User Error Microchip Username Managing Costs Amazon Black Friday SSID Cortana Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Alt Codes Downtime Network Management Tech Support IT Technicians Virtual Machine Environment Competition Media Monitors Cyber Monday Medical IT Hosted Solution Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Typing Websites Mirgation Hypervisor Displays Google Drive PowerPoint User Knowledge Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint 5G Management PCI DSS Chatbots Navigation IP Address Google Docs Writing Distributed Denial of Service Workplace Unified Communications Experience Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Bitcoin Running Cable Server Management Regulations Compliance Private Cloud Identity Google Wallet Evernote Paperless Co-managed IT Recovery Superfish Bookmark Identity Theft Smart Tech Memes

Blog Archive