ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Make These Cybersecurity Mistakes Before Going on Vacation

Don’t Make These Cybersecurity Mistakes Before Going on Vacation

Whether you are sitting on a warm beach, taking a scenic train ride out into the countryside, or camping at the foot of a mountain, a vacation can be a great way to disconnect from the everyday buzz of work and screens. Although, if you are like me, you probably bring a few screens with you… let’s assume you keep it to a minimum. Either way, it’s important to not set yourself up for failure when you get back.

Consider a Hotspot Over Public Wi-Fi

Depending on your carrier, it might cost a little more, but it is worth it. If you are bringing a laptop or tablet or any other device that connects to Wi-Fi, but you know you’ll have cell service, using your smartphone as a hotspot will be so much safer than connecting to the Wi-Fi in a hotel, campground, or coffee shop. Plus, it’s guaranteed to work (provided you have decent cell service).

If You Have to Connect to Public Wi-Fi, Do So Conservatively

Let’s say you need to look up directions or pull up your flight itinerary, and you just need to connect to Wi-Fi in order to do it. Don’t use that opportunity to check your email, log into social media, or pass all sorts of other sensitive information across the network. The longer you are connected, the more risk there is that your data will be stolen.

Better yet, ensure that you have a secure VPN to tunnel into your work network if you need to access work-related information. This is something that all businesses should be able to provide these days, especially if they survived having workers work from home during the pandemic.

Don’t Overshare on Social Media

If you aren’t going to be home, who is going to watch over your house?

Don’t expect those automated outdoor lights to do the heavy lifting for your home security either. We’re not saying that your week-long absence is going to result in a break-in, but it’s better to be safe than sorry. Don’t advertise that your home will be vacant for the next week on social media.

Home burglary isn’t even the biggest security issue here, either. If someone can see that you are spending two weeks in the Poconos, they can easily craft up some fiction about how you lost your wallet and need the help of a random Facebook friend to wire you the funds to come home. Social media accounts like Facebook and LinkedIn are hacked all the time, and it’s possible that a cybercriminal might just be waiting for a good time to scam your innocent friends into “helping” you out by begging for gift cards.

Make Sure Your Travel Accounts are Secure

We often end up making a lot of new accounts when traveling, whether it be with an airline we’re flying for the first time, or a ride-sharing service, a hotel website, and more.

Don’t get lax about your personal information. Make sure you always use strong, unique passwords for these accounts, and document them securely (preferably in your password manager, not your browser). When possible, it helps to do some of this ahead while you are planning your vacation, as you probably won’t want to mess around with it while checking in or ordering a ride from the cocktail bar to the beach.

Take Us With You!

If you are planning on going on vacation, we hope you enjoy it! It’s been a rough couple of years for lots of us, and we bet you deserve the much-needed R&R!

If we manage the IT for your business for you, know that we’ll keep everything running smoothly for you while you are gone!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Microsoft Office Upgrade Small Business Smartphones Network Mobile Devices Managed IT Services Communication Data Recovery Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery Apps Managed Service Windows 10 IT Support Browser Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Managed Service Provider Internet of Things Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Networking Windows Workplace Strategy Bandwidth Server Information Encryption App Virtualization Remote Spam WiFi Mobile Device Management Business Technology Blockchain Information Technology History Gmail Office Budget Two-factor Authentication Office 365 Employee/Employer Relationship Apple Cybercrime Access Control Data Security Health Big Data Wi-Fi Analytics BDR Conferencing Voice over Internet Protocol Compliance Document Management Employer-Employee Relationship Patch Management Vendor Save Money Help Desk Hacking Remote Monitoring Remote Computing IT Management Hacker Training Cost Management Mobile Office Legal Search... Augmented Reality Word Best Practice Managed Services IBM Data storage Applications Retail Website Alert Vulnerabilities Project Management Hiring/Firing Outlook Password BYOD Computing Vendor Management Money Hard Drive Data loss Customer Service Unified Threat Management Firewall Remote Workers Law Enforcement Running Cable End of Support iPhone Printer Update Cortana Education Windows 7 Free Resource Data Breach Storage Content Filtering How To Paperless Office Router Antivirus Travel Virtual Reality Social Engineering Maintenance Cryptocurrency The Internet of Things Monitoring Black Market YouTube User Cleaning Healthcare Robot Websites Laptop Meetings Mobility Chrome Windows 11 Google Maps Scam Social Sports Mobile Computing DDoS Twitter SaaS VPN Marketing Microchip Tech Terms Virtual Assistant Customer Relationship Management Disaster Flexibility Managed Services Provider Managed IT Co-Managed IT Digital Entertainment Virtual Private Network Lithium-ion battery Identity Theft Hack Taxes Notifications Unified Communications Current Events Processor Processors Google Docs Solutions Bluetooth Distributed Denial of Service Physical Security Images 101 Office Tips Integration Display HIPAA Private Cloud Memory Multi-factor Authentication Employees Start Menu Avoiding Downtime Wireless Technology Computer Care Saving Time Politics Downloads Settings Machine Learning eWaste Holidays Vulnerability Computers Bitcoin Software as a Service Downtime Solid State Drive Safety Telephone Cooperation Data Protection Video Conferencing PowerPoint Chromebook Drones Virtual Machines Administration Virtual Desktop Excel Experience Computer Repair Presentation Automobile Specifications Professional Services IT Consultant How To Tablet G Suite Telephone System Regulations Memes Mouse VoIP Tracking Directions Human Resources Backup and Disaster Recovery Net Neutrality Content Financial Data Desktop Cables In Internet of Things Computer Accessories Web Server Electronic Medical Records Hacks Risk Management Accountants Network Congestion IT SharePoint Recovery Digital Payment Competition Reliable Computing Google Apps Database Writing Telework Worker Point of Sale Access Health IT Entrepreneur Smartwatch Equifax Communitications LiFi Microsoft 365 Hard Drive Disposal Time Management Documents Public Cloud Shortcuts Application Scalability Tactics Procurement Username Business Intelligence Text Messaging FinTech Proactive IT Administrator Spyware Bring Your Own Device CES Startup IT Assessment Audit Freedom of Information email scam Value Securty File Sharing Be Proactive Navigation Addiction Supply Chain Management Organization Mobile Security Music Cyber security Redundancy Troubleshooting Domains Cache User Tip Legislation Smart Devices News Unified Threat Management Workers Workplace Strategies Evernote Network Management Remote Working Botnet AI Trend Micro CCTV Proxy Server Rental Service Digital Security Cameras Emails Micrsooft Electronic Health Records Printing Fake News Transportation Flash Computing Infrastructure Wasting Time Touchscreen Public Speaking Service Level Agreement Computer Malfunction Management Telephone Systems Device security Business Growth eCommerce Emergency Business Owner Streaming Media Modem Vendor Mangement Keyboard Videos Wireless Headphones Surveillance Microsoft Excel Business Cards Managing Costs Samsung Smart Technology Tech Hard Drives Going Green Webcam Error intranet Banking Google Wallet SSID Uninterrupted Power Supply Employer/Employee Relationships Business Mangement Wireless Bookmark Shortcut Messenger Media Deep Learning Development Download Environment Piracy Virtual Machine Tablets Term Heating/Cooling Social Networking Business Metrics Reviews HTML Hosted Solution Optimization Inbound Marketing Windows XP Teamwork Supercomputer Browsers Books 2FA Nanotechnology Google Calendar Upload Language Data Storage Software License Society Hypervisor Virus Supply Chain Google Play Motion Sickness Social Network Shopping Medical IT Visible Light Communication SQL Server Google Drive Data Analysis Reading Paperless Screen Reader Monitors Comparison Electronic Payment Trends PCI DSS Mobile Technology Windows 8 Licensing Workplace Security Cameras Customer Resource management Gig Economy Devices Humor Knowledge Corporate Profile Television Tip of the week Advertising Azure Telephony Phone System Staffing Employer Employee Relationship Fileless Malware Relocation Business Communications Displays Internet Service Provider Gamification Work/Life Balance Regulations Compliance Company Culture Tech Support Managed IT Service Cabling Scams IP Address

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?