{"id":32096,"date":"2022-03-01T23:22:31","date_gmt":"2022-03-02T04:22:31","guid":{"rendered":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/"},"modified":"2022-04-05T14:40:05","modified_gmt":"2022-04-05T19:40:05","slug":"combat-digital-theft-blog-the-logic-group","status":"publish","type":"post","link":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/","title":{"rendered":"Combat Digital Theft | Blog | The Logic Group"},"content":{"rendered":"<p>Whether you\u2019re traveling for business or leisure this summer chances are that as a small business owner you\u2019ll be working on your trip. But with unsecured Wi-Fi hotspots and the potential for physical theft among other risks there are several steps you need to take to ensure security issues don\u2019t interrupt your productivity.<\/p>\n<h3>Use these tips to keep your devices and data safe on the road.<\/h3>\n<h2>Before you go<\/h2>\n<ul>\n<li>Back up your devices before you leave and make sure current updated security software is installed\u2014including on your phone and tablet.<\/li>\n<li>Ensure your current data and documents are stored securely in the cloud so that you can access your files from a borrowed device or computer even if you lose your laptop or tablet.<\/li>\n<li>Set up features that enable remotely locking and wiping devices in case they\u2019re lost or stolen.<\/li>\n<li>Secure all your devices with a password or PIN. You may not use a password to log in to your laptop every day at work but on the road this additional step adds a layer of protection.<\/li>\n<li>Encrypt your mobile devices (go to settings\/security).<\/li>\n<li>Set up a virtual private network (VPN) at work that you can use on the road to connect to the Internet. The VPN encrypts everything you do online protecting your data and devices.<\/li>\n<li>Bring only what you really need. You probably don\u2019t need both a laptop and a tablet. The more you bring the greater your risk for physical and digital theft.<\/li>\n<\/ul>\n<h2>On the road<\/h2>\n<ul>\n<li>Keep your eyes\u2014or your hands\u2014on your device at all times. It sounds paranoid but physical theft is as big a risk as data theft. Never leave your laptop phone or tablet lying around even for a moment. The caf\u00e9s coffeehouses airports and hotel lobbies that travelers frequent are home to pickpockets and thieves waiting for someone to get distracted. When leaving your hotel room put electronics you\u2019re not taking in the in-room safe.<\/li>\n<li>Turn off Wi-Fi and Bluetooth when you\u2019re not using your devices to prevent them from accidentally connecting to a cybercrook\u2019s network.<\/li>\n<li>Stay off public computers. If you must assume everything you do is being watched so don\u2019t input any sensitive information or connect to your business network.<\/li>\n<li>Avoid public wireless hotspots. If you must use this type of network never buy anything connect to your business network or input passwords.<\/li>\n<li>If you don\u2019t have VPN Use secure browsing which you can set up within the \u201cpreferences\u201d of your Internet browser. (You\u2019ll know you are browsing securely if the URL of the webpage you\u2019re on starts with HTTPS instead of HTTP.)<\/li>\n<li>Look under \u201csettings\u201d on your smartphone to see if your phone enables setting up a private mobile hotspot. Most newer phones offer this feature which provides added security.<\/li>\n<\/ul>\n<p>Take these precautions before it\u2019s too late\u2014it\u2019s expensive and potentially damaging to business if you learn the lesson the hard way. Even if you can\u2019t take every one of these steps each one you do take increases your chances of keeping your business information safer while you\u2019re on the road.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unsecured Wi-Fi hotspots are a big risks. There are several steps you need to take to ensure security issues don\u2019t interrupt your productivity. Learn More from The Logic Group&#8217;s Blog.<\/p>\n","protected":false},"author":13,"featured_media":32097,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-32096","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Combat Digital Theft | Blog | The Logic Group - The Logic Group<\/title>\n<meta name=\"description\" content=\"Whether you\u2019re traveling for business or leisure this summer chances are that as a small business owner you\u2019ll be working on your trip. But with unsecured Wi-Fi hotspots and the potential for physical theft among other risks there are several steps you need to take to ensure security issues don\u2019t interrupt your productivity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Combat Digital Theft | Blog | The Logic Group - The Logic Group\" \/>\n<meta property=\"og:description\" content=\"Whether you\u2019re traveling for business or leisure this summer chances are that as a small business owner you\u2019ll be working on your trip. But with unsecured Wi-Fi hotspots and the potential for physical theft among other risks there are several steps you need to take to ensure security issues don\u2019t interrupt your productivity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/\" \/>\n<meta property=\"og:site_name\" content=\"The Logic Group\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-02T04:22:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-05T19:40:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"424\" \/>\n\t<meta property=\"og:image:height\" content=\"318\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Doug Yocco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Doug Yocco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/\"},\"author\":{\"name\":\"Doug Yocco\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3\"},\"headline\":\"Combat Digital Theft | Blog | The Logic Group\",\"datePublished\":\"2022-03-02T04:22:31+00:00\",\"dateModified\":\"2022-04-05T19:40:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/\"},\"wordCount\":538,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/\",\"url\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/\",\"name\":\"Combat Digital Theft | Blog | The Logic Group - The Logic Group\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg\",\"datePublished\":\"2022-03-02T04:22:31+00:00\",\"dateModified\":\"2022-04-05T19:40:05+00:00\",\"author\":{\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3\"},\"description\":\"Whether you\u2019re traveling for business or leisure this summer chances are that as a small business owner you\u2019ll be working on your trip. But with unsecured Wi-Fi hotspots and the potential for physical theft among other risks there are several steps you need to take to ensure security issues don\u2019t interrupt your productivity.\",\"breadcrumb\":{\"@id\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#primaryimage\",\"url\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg\",\"contentUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg\",\"width\":424,\"height\":318},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thelogicgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Combat Digital Theft | Blog | The Logic Group\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thelogicgroup.com\/#website\",\"url\":\"https:\/\/thelogicgroup.com\/\",\"name\":\"The Logic Group\",\"description\":\"Turn to The Logic Group for all your Philadelphia managed IT services.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thelogicgroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3\",\"name\":\"Doug Yocco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a864342d50a97c4d5b0bdb07ab31eb9d3bcfe88d5b5d3a6fd94a73523964a84?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a864342d50a97c4d5b0bdb07ab31eb9d3bcfe88d5b5d3a6fd94a73523964a84?s=96&d=mm&r=g\",\"caption\":\"Doug Yocco\"},\"url\":\"https:\/\/thelogicgroup.com\/author\/dyoccoabstraktmg-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Combat Digital Theft | Blog | The Logic Group - The Logic Group","description":"Whether you\u2019re traveling for business or leisure this summer chances are that as a small business owner you\u2019ll be working on your trip. But with unsecured Wi-Fi hotspots and the potential for physical theft among other risks there are several steps you need to take to ensure security issues don\u2019t interrupt your productivity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/","og_locale":"en_US","og_type":"article","og_title":"Combat Digital Theft | Blog | The Logic Group - The Logic Group","og_description":"Whether you\u2019re traveling for business or leisure this summer chances are that as a small business owner you\u2019ll be working on your trip. But with unsecured Wi-Fi hotspots and the potential for physical theft among other risks there are several steps you need to take to ensure security issues don\u2019t interrupt your productivity.","og_url":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/","og_site_name":"The Logic Group","article_published_time":"2022-03-02T04:22:31+00:00","article_modified_time":"2022-04-05T19:40:05+00:00","og_image":[{"width":424,"height":318,"url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg","type":"image\/jpeg"}],"author":"Doug Yocco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Doug Yocco","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#article","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/"},"author":{"name":"Doug Yocco","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3"},"headline":"Combat Digital Theft | Blog | The Logic Group","datePublished":"2022-03-02T04:22:31+00:00","dateModified":"2022-04-05T19:40:05+00:00","mainEntityOfPage":{"@id":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/"},"wordCount":538,"commentCount":0,"image":{"@id":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/","url":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/","name":"Combat Digital Theft | Blog | The Logic Group - The Logic Group","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#primaryimage"},"image":{"@id":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg","datePublished":"2022-03-02T04:22:31+00:00","dateModified":"2022-04-05T19:40:05+00:00","author":{"@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3"},"description":"Whether you\u2019re traveling for business or leisure this summer chances are that as a small business owner you\u2019ll be working on your trip. But with unsecured Wi-Fi hotspots and the potential for physical theft among other risks there are several steps you need to take to ensure security issues don\u2019t interrupt your productivity.","breadcrumb":{"@id":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#primaryimage","url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg","contentUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Combat-Digital-Theft.jpg","width":424,"height":318},{"@type":"BreadcrumbList","@id":"https:\/\/thelogicgroup.com\/combat-digital-theft-blog-the-logic-group\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thelogicgroup.com\/"},{"@type":"ListItem","position":2,"name":"Combat Digital Theft | Blog | The Logic Group"}]},{"@type":"WebSite","@id":"https:\/\/thelogicgroup.com\/#website","url":"https:\/\/thelogicgroup.com\/","name":"The Logic Group","description":"Turn to The Logic Group for all your Philadelphia managed IT services.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thelogicgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3","name":"Doug Yocco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a864342d50a97c4d5b0bdb07ab31eb9d3bcfe88d5b5d3a6fd94a73523964a84?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a864342d50a97c4d5b0bdb07ab31eb9d3bcfe88d5b5d3a6fd94a73523964a84?s=96&d=mm&r=g","caption":"Doug Yocco"},"url":"https:\/\/thelogicgroup.com\/author\/dyoccoabstraktmg-com\/"}]}},"_links":{"self":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/comments?post=32096"}],"version-history":[{"count":0,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32096\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media\/32097"}],"wp:attachment":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media?parent=32096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/categories?post=32096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/tags?post=32096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}