ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Make These Cybersecurity Mistakes Before Going on Vacation

Don’t Make These Cybersecurity Mistakes Before Going on Vacation

Whether you are sitting on a warm beach, taking a scenic train ride out into the countryside, or camping at the foot of a mountain, a vacation can be a great way to disconnect from the everyday buzz of work and screens. Although, if you are like me, you probably bring a few screens with you… let’s assume you keep it to a minimum. Either way, it’s important to not set yourself up for failure when you get back.

Consider a Hotspot Over Public Wi-Fi

Depending on your carrier, it might cost a little more, but it is worth it. If you are bringing a laptop or tablet or any other device that connects to Wi-Fi, but you know you’ll have cell service, using your smartphone as a hotspot will be so much safer than connecting to the Wi-Fi in a hotel, campground, or coffee shop. Plus, it’s guaranteed to work (provided you have decent cell service).

If You Have to Connect to Public Wi-Fi, Do So Conservatively

Let’s say you need to look up directions or pull up your flight itinerary, and you just need to connect to Wi-Fi in order to do it. Don’t use that opportunity to check your email, log into social media, or pass all sorts of other sensitive information across the network. The longer you are connected, the more risk there is that your data will be stolen.

Better yet, ensure that you have a secure VPN to tunnel into your work network if you need to access work-related information. This is something that all businesses should be able to provide these days, especially if they survived having workers work from home during the pandemic.

Don’t Overshare on Social Media

If you aren’t going to be home, who is going to watch over your house?

Don’t expect those automated outdoor lights to do the heavy lifting for your home security either. We’re not saying that your week-long absence is going to result in a break-in, but it’s better to be safe than sorry. Don’t advertise that your home will be vacant for the next week on social media.

Home burglary isn’t even the biggest security issue here, either. If someone can see that you are spending two weeks in the Poconos, they can easily craft up some fiction about how you lost your wallet and need the help of a random Facebook friend to wire you the funds to come home. Social media accounts like Facebook and LinkedIn are hacked all the time, and it’s possible that a cybercriminal might just be waiting for a good time to scam your innocent friends into “helping” you out by begging for gift cards.

Make Sure Your Travel Accounts are Secure

We often end up making a lot of new accounts when traveling, whether it be with an airline we’re flying for the first time, or a ride-sharing service, a hotel website, and more.

Don’t get lax about your personal information. Make sure you always use strong, unique passwords for these accounts, and document them securely (preferably in your password manager, not your browser). When possible, it helps to do some of this ahead while you are planning your vacation, as you probably won’t want to mess around with it while checking in or ordering a ride from the cocktail bar to the beach.

Take Us With You!

If you are planning on going on vacation, we hope you enjoy it! It’s been a rough couple of years for lots of us, and we bet you deserve the much-needed R&R!

If we manage the IT for your business for you, know that we’ll keep everything running smoothly for you while you are gone!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Covid-19 Disaster Recovery Passwords Holiday Browser Apps Managed Service Windows 10 IT Support Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Remote Work Internet of Things Data Management Saving Money Operating System Government Artificial Intelligence Workplace Strategy Managed IT services Gadgets Networking Windows Spam Remote Server Information Bandwidth Encryption Mobile Device Management App Virtualization Business Technology Blockchain WiFi Office 365 Employee/Employer Relationship Budget History Gmail Office Apple Two-factor Authentication Information Technology Conferencing Access Control Data Security Cybercrime Wi-Fi Health BDR Big Data Analytics Document Management Hacker Save Money Patch Management Compliance Vendor Employer-Employee Relationship Voice over Internet Protocol Remote Monitoring Help Desk Hacking Cost Management Remote Computing IT Management Training Legal Data loss Data storage Money Customer Service Unified Threat Management Firewall Search... Augmented Reality Applications Best Practice Word BYOD Mobile Office Retail IBM Project Management Vulnerabilities Website Computing Alert Managed Services Vendor Management Hard Drive Hiring/Firing Outlook Password Printer VPN Update Mobile Computing Social Sports Travel SaaS Marketing DDoS Virtual Reality Social Engineering Windows 11 Cryptocurrency Data Breach Running Cable Black Market Paperless Office iPhone Cleaning Antivirus Education Storage Cortana Maintenance Remote Workers Robot Content Filtering Windows 7 Monitoring Free Resource Router Healthcare Websites How To User Mobility Meetings The Internet of Things YouTube Twitter Google Maps Law Enforcement Scam Chrome Laptop End of Support Employees Excel Downtime Avoiding Downtime Hack PowerPoint Safety Identity Theft Tech Terms Holidays Administration Notifications Unified Communications Virtual Desktop Presentation Managed IT Digital Virtual Assistant Specifications Experience Cooperation Google Docs Bluetooth Video Conferencing IT Consultant Distributed Denial of Service Virtual Machines Taxes Office Tips Customer Relationship Management Memory Computer Repair Private Cloud Co-Managed IT Processor Entertainment Disaster Professional Services Physical Security Politics Settings Lithium-ion battery Machine Learning Managed Services Provider Virtual Private Network Multi-factor Authentication Solid State Drive Start Menu Processors Downloads Computer Care HIPAA Current Events Chromebook Drones Vulnerability Saving Time Solutions Software as a Service Automobile Data Protection Computers Bitcoin Images 101 Integration Display Telephone How To Wireless Technology Microchip eWaste Flexibility In Internet of Things Wasting Time intranet Social Network Corporate Profile Screen Reader eCommerce Inbound Marketing Wireless Hacks Modem Workplace Strategies Shortcut Network Congestion Knowledge Data Analysis Heating/Cooling Writing Television Security Cameras Environment Videos Telephony Trends Surveillance Employer Employee Relationship Mobile Technology Reliable Computing Windows XP Managing Costs Social Networking Customer Resource management Cabling Devices Fileless Malware Tablet G Suite Tip of the week SSID Mouse Media VoIP Gamification Development Tracking Company Culture Electronic Payment Scalability Employer/Employee Relationships Regulations Administrator Virtual Machine Text Messaging Proactive IT Telephone System Directions Reviews Backup and Disaster Recovery Optimization Web Server Bring Your Own Device Smart Technology Phone System SharePoint 2FA Content Digital Payment Desktop Teamwork Worker Accountants Hypervisor Music Electronic Medical Records Data Storage Shopping Access Database Staffing Medical IT IP Address Paperless Time Management Public Cloud SQL Server Equifax Botnet Licensing Health IT PCI DSS Audit Gig Economy Spyware Tactics Humor Hard Drive Disposal Rental Service Supply Chain Computer Accessories Micrsooft Flash Business Communications Username Internet Service Provider File Sharing Azure Startup Managed IT Service Freedom of Information Telephone Systems Business Growth Redundancy Regulations Compliance Navigation Cache Addiction Memes email scam Recovery Workplace Competition Human Resources Unified Threat Management Net Neutrality Workers Mobile Security Legislation LiFi News Banking Entrepreneur Google Wallet User Tip Financial Data Printing Evernote Risk Management Network Management IT CCTV Documents Messenger Scams Application Deep Learning Business Intelligence Google Apps Touchscreen Emails Computer Malfunction Fake News Troubleshooting Business Metrics Hosted Solution Emergency Proxy Server Telework Smartwatch Vendor Mangement Service Level Agreement Communitications Computing Infrastructure Securty Books Microsoft 365 Cables Domains Language Society Management Procurement Samsung Device security Uninterrupted Power Supply Wireless Headphones Webcam Microsoft Excel FinTech Tech Visible Light Communication CES Business Mangement Going Green IT Assessment Business Cards Reading Point of Sale Monitors Windows 8 Error Supply Chain Management Tablets Value Organization Cyber security Business Owner Shortcuts Bookmark Google Calendar Term Advertising Download Smart Devices Supercomputer Piracy Relocation Public Speaking Displays Work/Life Balance Tech Support Virus Remote Working HTML Streaming Media AI Nanotechnology Trend Micro Motion Sickness Be Proactive Keyboard Browsers Comparison Google Play Digital Security Cameras Google Drive Upload Electronic Health Records Software License Transportation Hard Drives

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?