Introduction:
We have grown very dependent on our technology
devices, so it’s natural to want to take them with us when we travel. However,
traveling with phones, tablets, or laptop computers exposes them to more
threats than normal including liquid and physical damage, theft, loss, and
cyber attacks. Planes, cars, trains, and hotels are technology-hostile
environments. The following recommendations are gleaned from millions of miles
of business and personal travel as well as customer experiences.
Liquid Damage:
Don’t put a water bottle in the same backpack
or carryon as your phone, tablet, or laptop computer. Seems obvious, but we see
the consequences all the time. Water bottles are prone to leaking anyway, but
on planes, the pressure changes significantly increase the probabilities.
Don’t have drinks and your devices on airplane
seatback trays at the same time. Turbulence or someone accidentally bumping
into the seat or tray can cause liquid damage.
Liquid spills cause costly damage to devices
or outright kill them almost immediately due to short circuits or, after a time
delay, due to corrosion.
If your device was exposed to liquid and was
turned off, do not turn it on. If it was on, turn it off immediately, and don’t
turn it back on. You can wipe off the exterior, but don’t try to dry it out
with rice or a hairdryer. Do not try to test it. Bring it in as soon as
possible for a professional to try to save it.
Physical Damage:
Checked luggage is exposed to extreme handling
shocks, cold, heat, and rain. Carryon luggage falls out of overhead bins all
the time. Devices get cooked in very hot cars or used outside in bright
sunlight. When you’re travelling, before you put valuable technology anywhere,
think about its safety, and don’t expose it to unnecessary risk.
Theft:
Leaving your valuable devices unattended in
airports, cars, or hotel rooms or putting them in checked luggage is an
invitation to thieves. Keep them with you at all times, and be vigilant.
Loss:
Travelers absent-mindedly leave valuable
devices in airplanes, trains, taxis, rental cars, buses, hotels, and
restaurants. Sometimes, with significant effort and/or expense, they get them
back, and sometimes they don’t. If you’re travelling for business, your
schedule may be hectic and your surroundings unfamiliar. It’s pretty easy to
get distracted. If you’re travelling for pleasure, the whole point is to relax
in unfamiliar surroundings. It’s pretty easy to lose focus. When you’re
travelling, make a special effort to keep track of your technology.
Cyber attacks:
Using unfamiliar networks is an unfortunate
fact of life for travelers. Most public networks are not very secure. The
probability of exposure to cyber security threats is much higher when
travelling. To avoid infections and attacks, your devices should be protected
by a defense-in-depth. Check out our posts about security for more guidance.
Unless you are certain that the network that
you’re using is secure, avoid doing anything online that would expose your
sensitive information, e.g. banking or credit card transactions.
Security Scanners:
Travelers frequently question the safety of
security scanners. Security scanners use very low levels of radiation and/or
magnetic fields to detect dangerous objects and are not a significant threat.
Conclusion:
We’re all very dependent on our technology
devices, so we want them with us when we travel. Travel exposes them to more
threats. So, be careful out there. clickaway computer services is always
happy to help you keep your devices safe.
Information Source: -https://clickaway.com/how-to-travel-with-your-tech/
Threats, Risks, and Backups:
Things go
wrong. Devices fail and are subject to accidents, cyber attacks, theft, loss,
fire, and natural disasters. You can protect your devices from some of these
threats. Other threats can be mitigated but not completely eliminated.
If an
unanticipated event occurred that rendered your device unusable or unavailable,
what would you lose? Does your device store irreplaceable or costly-to-replace
data:
·
Tax,
financial, legal, or medical documents?
·
Work
products?
·
Photos,
videos, or recordings?
Maintaining
one or more current backups of your valuable data and/or entire system is a
critical security layer that can mitigate the risks associated with the threats
listed above.
Backups:
Backups are
copies of your data and/or system stored on a different device or in the cloud.
If you want
to back up a Mac, just use Apple’s Time Machine, and if you need coaching, we’d
be happy to help.
If you have
a PC, you should have a backup plan that answers the following questions:
·
What
should be backed up?
·
How
many backups should be maintained?
·
Where
should backups be stored?
·
How
frequently should backups be done?
·
Should
backups be manual, scheduled, or incremental?
·
What
tool should be used to create a backup?
The
remainder of this post will help you develop answers appropriate to your
specific situation.
What to Back Up:
If you want
to be able to restore a backup to either your failed or an identical system and
be able to use it as if nothing bad happened, then you should back up your
entire system. If, however, you just want to be able to restore your data to a
compatible system, then you should back up your data.
Number of Backups:
ClickAway
recommends that you maintain two backups – one conveniently close but still
safe and another far enough away not to be compromised by the same threat.
Where to Store Your Backup:
For a backup
to be helpful, it must still be usable when the backed-up device is not. That
means backups should be stored in a safe place that is physically separated
from the backed-up device. There are three ways to accomplish that:
1.
Store
the backup on an external device, and keep that device where a threat is very
unlikely to destroy both the original and copy,
2.
Store
the backup in the cloud using an online backup service, or
3.
Store
backups on both.
This
decision is personal. Some users just want backups to happen automatically
without their intervention, and for them, backing up to the cloud is probably
the right decision. While backups stored in the cloud are encrypted to protect
privacy, other users don’t want to give up physical control of their data or be
dependent on the internet to get their data back, and they don’t mind the
performing the backup task themselves. For them, backing up to one or more
external drives is probably the right decision.
If you
decide to back up to external drives, you should maintain two – one kept
conveniently nearby (not too close) and another kept safely farther away. One
good way to do this is by rotating consecutive backups between your two
locations.
If you
decide to back up to an external drive and to the cloud, you will maintain one
copy conveniently nearby (once again, not too close) and another in the cloud.
Backup Frequency:
Users have
different thresholds of pain regarding loss of work/changes. Can you tolerate a
month’s worth; a week; a day; or an hour? Match your backup frequency to your
threshold of pain.
Backup Process:
You can do
manual, scheduled, or incremental backups. For manual backups, you decide when
you need to initiate a backup with appropriate software. For a scheduled
backup, you pre configure appropriate software with your desired schedule, and
the software then initiates backups according to that schedule. Some offerings
implement incremental backups, and they wake up periodically and backup only
what has changed since the last backup – more efficient.
Once again,
this is a personal decision. The down-side to doing manual backups is the human
tendency to forget; if you experience an event that makes it necessary to
restore a backup but have not done one for too long, then you will lose an
unacceptable amount of work/change. The down-side to doing full scheduled
backups is the amount of time that they take to complete. There really aren’t
significant down-sides to incremental backups; that’s why Apple’s Time Machine
does incremental backups.
Backup Tools:
There are
many backup tools out there. The answers to the previous questions should guide
your tool selection. ClickAway is familiar with many tool offerings and can
help you decide.
Conclusion:
As you can
see, backup plans can be complex. This is not a one-solution-fits-all
situation. ClickAway computer
serviceswould
be happy to help you craft and implement a complete backup plan that fits your
needs and preferences.
Information Source: - https://clickaway.com/backups-why-you-need-then-and-how-to-plan-them/