• Customer Portal
  • Remote Portal
Logo
  • Home
  • Services
    • IT Support and Maintenance
    • IT Hardware and Software
    • Microsoft 365 /Cloud Services
    • Pensieve Cyber Security
    • Wi-Fi
    • Data Protection
    • Hospitality POS
    • Project Management
  • Sectors
    • Hospitality
    • Small & Medium-Sized Enterprises
  • Support
    • Customer Portal
    • Remote Support
  • About
    • Testimonials
    • Work with Us
    • Contact Us
    • Cyber Security
    • ISO Certification
    • Cyber Essentials Certification
    • Environmental Statement
  • News
    • All News
    • Social Media

Staying cyber-safe on the road? ESET’s 10 tips for this summer season

  • HOME
  • NEWS
  • Staying cyber-safe on the road? ESET’s 10 tips for this summer season

4th July, 2016

Stay-Safe-sign-with-road1Toothbrush? Check. Towel? Check. Computer, smartphone, tablet? Check. If you are one of those travelers who can’t hit the road without having all the tech gadgets in their suitcase, then you should also be aware of the risks that lurk in the “shadows” of public internet connections, online banking and shopping on the road.

But don’t worry, there are ways to protect yourself from sticky hands of cybercriminals. Tierney’s partner for Security: ESET have put together a short guide to help you travel safely and keep all your data and devices protected:

  1. Make sure that your laptop and mobile devices run a fully updated operating system, software and a reputable security solution before you go on the road.
  2. Backup your data before you leave your home and store the backup in a safe place. Think about moving sensitive data from your laptop hard drive to an encrypted external storage while you are on vacation.
  3. Never leave your devices unattended in public places. With the use of an anti-theft solution you can track your missing laptop or smartphone, in the case it gets stolen, and wipe its contents remotely, if necessary.
  4. Make sure that you have password protection and inactivity timeout engaged on all devices including laptops, tablets, and smartphones. Consider shortening the time span to minimum. Frequent logging in might be annoying, but it’s better than having your sensitive information stolen by the intruders.
  5. If possible, only use reputable internet services. Ask at your hotel or the place where you are accommodated for the name of their Wi-Fi. Then use the exact same name. Beware of the scams which are trying to look similar by attaching “free wifi”, or something alike, to the original name
  6. If the hotel internet asks you to update software in order to connect, immediately disconnect and tell it to the person at the front desk or the owner of the place.
  7. Do not use Wi-Fi connections that are not encrypted with WPA2. Anything with lower standards is simply not safe enough and can be hacked relatively easy. Disconnect from the Wi-Fi if you’re not using the connection.
  8. If you have to use public Wi-Fi to connect to your company network, always use a virtual private network.
  9. If it’s not necessary, avoid online banking and shopping when you’re using public Wi-Fi. Otherwise, it is safer to use your data plan and create your own hotspot.
  10. If you are not using antivirus solution and suspect your laptop has been infected, you can use free ESET Online Scanner which doesn’t require installation and can be used to detect and remove malware on-the-go.

Written by Urban Schrott, ESET Ireland

Tierney’s recommend ESET Security Solutions including Deslock. Call us today for more on data security and ensure you are protected. Ph. 065 6828 281.

 

Tiernys IT
Address
Tierney’s Office Automation Ltd,
23 & 24 NFU Mutual Offices
Camelgate
Spalding
PE12 6ET

E-mail
[email protected]
Phone
UK +44 333 121 0122
USA +1 202 977 2086
Copyright 2025 Terms & Conditions | Privacy Policy | Cookie Policy
Site by acton | web
<

ItemCustomer Portal

ItemFree Site Survey

ItemRemote Connection

Manage Cookie Consent
We use cookies to optimise our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}