Are you affected? GDPR for US companies

All businesses should take a hard look to see if and how they are affected by GDPR now that is is in effect.

GDPR (or the General Data Protection Regulation) is a law governing the data protection and privacy for people in the European Union (EU) and European Economic Area. This regulation has been officially in effect since May, 25th 2018. But, this law doesn’t apply only to businesses in the EU, there are impacts from GDPR for US companies.

Our GDPR expert, John Prejean, says that any business associated with the EU needs to comply with the law. “There are serious consequences for violating the regulation,” John says, “including hefty fines, up to $20m euros or four percent of global revenues, whichever is higher.” And, of course, potential damage to a company’s reputation.

GDPR For US Companies: Is Your Business Affected?

Any US company with a connection to the EU (including subsidiaries, customers, and suppliers) must comply with the regulation. It’s important to take a deep look into your customers and suppliers, in particular, to see if they are tied to the EU. In this global economy, it’s simply not safe to assume you’re unaffected.

In A Nutshell What Does GDPR Cover?

GDPR Is all about data protection and privacy. Basically, it requires the businesses to know and document where their data is stored and how and where it moves. “Outside the need for GDPR compliance, this foundational requirement is extremely valuable to the organization,” John says.

You’ve probably noticed more and more websites requesting you opt in or out of allowing the site to capture cookies. This is in response to one of the main components of the GDPR: consent. Clearly defined consent is required for all GDPR affected businesses, but it also helps to gain customer confidence.

Why GDPR Is Important For US Companies, Regardless of Regulation.

Even if your business is completely untied to the EU, and the GDPR change does not affect your business directly, it can still be helpful for your company. It’s unwise to view the GDPR as a big, scary, negative change – many businesses can benefit from following GDPR practices!

John says that the fines for breaking the GDPR law are “only part of the cost the business
would incur with a data breach”. He explains that GDPR gives investigative powers to the Member States’ supervisory authorities. These authorities may discover the breach. But, it is more likely that a 3rd party would report a breach, or submit a complaint to the authorities. Companies are obligated to comply with requests from authorities for GDPR related compliance information.

Having a data breach isn’t cheap. There is the cost that comes with finding the breach in the first place. Then there are the post-breach costs, any business lost due to the breach, and any litigious expenses. Having a data breach is not good for business, regardless of GDPR.

How To Comply With GDPR Regulations:

As John says, most of the stipulations in GDPR for US Companies are just good, solid business practices. Really, it shouldn’t be totally new to a business, as there should already be some data security and privacy measures in place. We like to think of it more as an opportunity to make data security part of the company culture. Shoring up your data security and privacy practices have many benefits, including saving money, resources, and your reputation.

When we’re working with GDPR compliance, the first thing we do for a client is a full risk assessment. This includes evaluating the staff, processes, and their technology. It allows us to identify any holes in the process and determine associated risk. Knowing these weaknesses is half the battle! From there we can create a plan to address any compliance and security issues. This gives us the ability to work with the business to prioritize the timing and resources needed to become compliant.

Should A Novice Try To Comply Alone?

In the grand scheme of things, the concepts covered in GDPR for US companies are pretty simple and easy to understand. The main difficulty we find with most compliance clients is the identification of vulnerabilities in their processes. It can be difficult to seek these out without a trained eye, let alone correct the problem. Seeking expert help can save a lot of time and money.

Data protection is so important to us, we created a basic set of data protection principles ready to plug into a business. We also ensure that compliance becomes part of the company culture. To do this we always have training sessions with our clients to help staff members understand the importance of their role in maintaining compliance. We usually find there is a misconception that being compliant is a one and done exercise, but a major component is a shift in culture. This is one reason why ongoing training is one of the most critical areas to get right.


Whether or not you need to worry about GDPR for US Companies, data protection, and privacy are critical business practices. In some ways, we can thank the GDPR for forcing many companies to think about how they’re using data while doing business. Data security affects all the people in an organization from accounting to sales to legal andIT.

Need help getting your data security on point? Let’s talk about different solutions for your business.

Create an emergency preparedness plan for your business

When disaster strikes, the last thing you should be worried about is how it will affect your business.

As a New Orleans IT firm, we can tell you from experience that when a natural disaster occurs, your people and your family come first. Making sure your business and IT systems have a clearly defined emergency preparedness plan ready in case of any extreme event saves you time, money, and heartache after it’s done. As our IT disaster preparedness expert Charles Andrews (Andy) says, “the biggest problem is the one you aren’t prepared for.”

Read on to learn why you need a disaster preparedness plan and to download our FREE checklist!


Who Needs To Be Prepared For A Disaster?

Different areas of the US are more or less likely to have significant weather events that can cause an IT disaster. We’re in the heart of hurricane country, but events like tornadoes, earthquakes, and wildfires can be disastrous for businesses all over the country.

But, no business can afford to ignore creating an emergency preparedness plan. Even if your business is located in an area that doesn’t often see natural disasters there are still vulnerabilities. Anything from fire, gun violence, and terrorism can affect a business, their people, and their data.

Every potential disaster comes with its own set of challenges, but, we strongly feel that it’s better to be prepared for the unexpected than it is to do damage control after it happens. We believe every business needs an IT disaster plan to be integrated into their overarching disaster plan that should address their people, processes, and technology.

The First Thing A Business Should Do:

First things first, you need to know your risks. Doing a risk assessment lets you know the potential impact to your business of not being prepared. In our experience the biggest issues are:

  • The business has no emergency preparedness plan in place.
  • The business has a plan but doesn’t fully cover all three prongs (people, process, and technology).
  • The plan relies on the wrong technology or relies on recovering data in a way that isn’t in line with actual IT capabilities.
  • The plan is untested, or not fully tested.

It’s critical that your employees know their role in preparing your business for potential disasters. We often see coastal businesses focus on hurricane preparedness but neglect planning for other unexpected disasters.

Disaster Affects Every Aspect Of Your Business

When a disaster hits, very little is untouched. There are the obvious issues with the loss of sales or income from the business being down. You can also find revenue delayed if there is a disruption in the supply line, or your customers were likewise affected by the disaster. Plus, you may find yourself with a lack of cash flow as you wait for insurance to kick in.

But, it’s not just a money waiting game. You’ll likely have increased expenses from cleaning up, purchasing new equipment, recovering damaged inventory, and paying overtime if necessary. You could also experience contractual penalties if you have a major contract as a vendor or supplier. Delays in providing your product or service could breach a contractual agreement.

What’s The Biggest Weakness When A Disaster Hits?

Any physical part of your business that can be affected is going to be a huge problem. From our experience, we’ve found that the weakest link is having critical IT systems on physical servers in the office. If you have any critical applications or data saved only on a local server, you need to take the physical machine with you when you evacuate.

If that server is damaged by any physical attack (fire, water, even terrorism) it can be devastating for a business. We have even seen simple events like a hardware failure, electrical surge, and accidental user deletions make physical servers extremely problematic.

What About Data Recovery?

Although data recovery is possible, you’d be depending heavily on luck! It’s not as simple as restarting your computer. There is usually a significant expense and time used to recover data after a disaster if no other backup is used.

What You Should Do Instead

We firmly believe that you shouldn’t have a physical server on-site that houses your critical systems. Andy says that off-site backups are by far the best step to take when protecting business data. For such a significant safety measure, off-site backups are an easy and inexpensive process to implement.

Keep It In The Cloud

Utilizing the cloud makes off-site backups easy. Systems are stored in specialized facilities (or data centers) and most data centers have off-site redundancy. This means your information is stored on multiple servers in different locations, which makes sure that your data is safe even if one server goes down.

This is also important for businesses with multiple office locations. Having multiple servers can be a huge risk if a disaster hits. In order to protect your data, you would need to set in place failover options between locations, which can be expensive to implement. Plus, these systems need to be constantly monitored and routinely tested to ensure that they’re working. Instead of having a server down in one area affecting all the others, using the cloud eliminates a lot of challenges.

We Know From Experience

Over 10 years ago, Hurricane Katrina forced us to put our own emergency preparedness plan into action. We had to take our servers with our critical systems with us, which taught us just how important it is to use the cloud. Those precious hours you have to prepare need to be spent on family and your own personal belongings, not hauling servers. After Katrina, we became early adopters of cloud technology, and we’ve used it ever since. We store everything in the cloud including all of our client documentation, automated monitoring systems, and service call systems.

Our Emergency Preparedness Plan

When hurricanes threaten our area, we start implementing our plan early. Our emergency preparedness plan includes two different teams. One team assists our clients who are disaster preparing, and the other focuses on our business. We all know our own roles and we practice year-round to keep us fresh and ready or any unexpected disasters.

We have created specialized programs that monitor our clients’ IT systems and often correct any hiccups before they become problems. This way, much of our work can run on auto-pilot for a short period of time if necessary.

Also, we use hosted VOIP phone system and online chat. This allows us to stay in contact with our clients and our team without relying on cell service, landlines or other local systems. Lastly, we have a prearrangement with technical resources outside our own company. This 3rd party service can handle our client requests while we are in crisis mode taking care of our own families.

FREE Disaster Preparation Checklist

We know just how important it is to keep your business safe. Download our emergency disaster checklist to make sure you’re prepared if disaster strikes.


A disaster can hit anywhere at any time. We know your first priority is keeping your people and your family safe through the storm. To make sure your business is kept safe too you must have your emergency preparedness plan set in advance.

Interested in your company’s risk in a disaster situation? Let’s chat.

Everyday there is a battle of Good versus Evil on the internet. Every morning guys and girls like me wake up, have a cup of coffee, and prepare to do battle with malicious programs out there on the world wide web. Fortunately for me, a NOLA IT professional, there are a few lines of defense that make my job a whole heck of a lot easier; namely the end user, firewalls, antivirus software, etc.

But let me be honest, none of these forms of protections are perfect. Firewalls and antivirus software are not entirely impenetrable, and I can’t tell you how many times I come across “PEBKAC” errors [Problem exists between keyboard and chair)], but as a Networking Technician it is my mission to better educate you guys on how to keep your computers safe while exploring the vast sea that is the Internet. This morning, I want to focus on how YOU, the end user; and how YOU can keep your sensitive information safe

1. Never call Microsoft

What do you mean never call Microsoft? Shouldn’t they be the most prepared to confront a virus that has made its way into my operating system?

And the answer to that is… Yes, absolutely. But the bullet point is purposefully misleading to emphasize a point. It should actually read “Never call Microsoft if your computer tells you to do so.” Often times, if we are not careful, we may accidentally click on the wrong button, link, or drop down menu that these internet villains programmed to cause a pop-up to come up on your screen that looks something like this:

nola it professional don't call microsoft
Do NOT Call Microsoft if a Warning Screen like the one Pictured Above Pops Up!

Don’t be alarmed if this happens to you! These pops-up are designed to scare us. Some of them will even cause alarming sounds to come out of your speakers. These sounds are designed to raise your heart rate and spook you into calling that number. DON’T!!! All you have to do is close out of the browser and the message and the annoying sounds should go away. Some of these

Some of these pop-ups are a little more malicious and therefore harder to close, and if that is the case we need to open our Task Manager and force the browser to close.

Here is  a list of instructions at the end of this section about how to do that:

Steps Open/Use Task Manger to Close Pesky Pop-Ups

  1.  Press ctrl+alt+delete.
  2.  Open Task Manger
  3.  Right click on the browser that generated the pop-up
  4.  Select the option that reads “End Task” . The pop-up should close and the noises should stop
  5.  (optional): The likely hook of a virus getting on your machine if you close this popup without clicking else is pretty low, but for safe measure use your antivirus software to run a scan on your computer to make sure it is clean.

Don’t feel alone or dumb if this ever happens to you, everyone here at the office has done it at one point or another. Accidents happen!  Even if you do click the pop-up, it doesn’t mean you’re doomed as long as you’re anti-virus works properly and you don’t call any numbers.

What they want you to do is call this number so they can “show” you that your machine has a “virus,” and then will attempt to solicit you into giving them your credit card information so that they can “fix” your computer. It is ALWAYS a scam. Microsoft will NEVER contact you about viruses on your computer.

2. Uninstall McAfee and Norton Antivirus

I am absolutely certain that everyone who has ever used the internet has heard of Norton and McAfee Antivirus software, and I guarantee that those same individuals, at one point or another, have been prompted to download or even offered a free trial version of these two programs. Well, I’m typing before you today to BEG YOU to avoid this software at all cost. These programs are known to be more malicious to your operating system than most of the common viruses out there. They update at inappropriate times, they may cause your operating system to freeze suddenly, and they definitely do not play nice with other applications on your computer. Not only that, but uninstalling these programs is not exactly a

These programs are known to be more malicious to your operating system than most of the common viruses out there. They update at inappropriate times, they may cause your operating system to freeze suddenly, and they definitely do not play nice with other applications on your computer. Not only that, but uninstalling these programs is not exactly a straight forward process; and even after they are uninstalled occasionally little bits of the software are still left behind on your machine and a technician such as myself will have to open the registry and remove the bits and pieces by hand.

*WARNING! Do not! I repeat! DO NOT open the registry to your computer without knowing exactly what you are doing. While the registry is open, one can destroy the computer’s operating system with a couple of mis-clicks of the mouse; thus, causing the user to lose ALL of the data they have stored on their computer. *

In fact, McAfee is so rough on computers that the former CEO, John McAfee, put out a rather comical but extremely inappropriate video about how to uninstall the McAfee Software; and let’s just say, he “disposes” of the computer entirely using a firearm. (As a disclaimer, I would link you guys the YouTube video but as previously stated the video is extremely inappropriate, and does not reflect the opinions, ideals, or beliefs of Guardian Computer in any way, shape, or form.)

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

3. Free Antivirus Software We Recommend

bit defender fre

Bit Defender– If you already have Windows 10 installed on your computer, oh boy do I have good news for you! Windows 10 already has a built in Antivirus Software known as Bit Defender. It works really well for users who do what they are supposed to be doing on their computers and not clicking on anything too suspicious.

avast

Avast– I personally used Avast before I upgraded to windows 10. It generated a few more popups than I would like, but those can easily be turned off in its settings. We really want our antivirus software to be “seen and not herd,” if you know what I mean. I only my antivirus software to yell at me if there is a major problem, but then again if there is a major problem with my computer I am probably going to recognize the change in performance of the computer right around the same time that my antivirus software does.

malwarebytes

Malwarebytes– This is a Guardian Computer’s favorite. We use Malwarebytes pretty much every day to clean up computers that are already infected, and its antivirus works well and will not bog down a computer’s performance. The free version of this software performs a thorough scan of your machine should you ever accidently click on the wrong link and is quick to quarantine these bugs from doing any more damage to your machine.

webroot

Well if that is the case then I would have to recommend using Webroot. This is the soft where we put on all our Managed Services machines and it works like a charm. Occasionally, we will have to step in to fix a few bugs that leak through, but since we have started using Webroot I haven’t seen to many major viruses get through; but that does not give our users the go-ahead to freely click around the Internet I’m just pointing out that it has been doing a solid job of protecting our machines! If this sounds like something you would be interested in, please give us a call at the office and one of our Techs would be happy to discuss the inner workings of Webroot in more detail with you over the phone!

Conclusion from a NOLA IT Professional on Internet Safety

No matter what antivirus you are using do not assume you are completely protected out on the Internet. At the end of the day, it is always up to the user to be cautious of the links they are clicking on and the files they are downloading.

From the time we are old enough to recognize the sheer power and awesomeness of the almighty dollar, we are told, that every decision we make from here on out will affect our ability to find that first job. Throughout high school, we are introduced to just about every field of study in one way, shape, or form so that we may gauge our interest in the different realms of academia. During our adolescents, some of us will read Shakespeare’s Sonnets and be taken away by the sheer beauty of the English Language. Some of us will develop an intense desire to learn about the history of man and find their passion in the realms of History and Sociology. Then there are the “nerds;” those whose curiosities piqu

e when they use the other half of their brain as they learn to “solve for x” and dissect various animals such as frogs and piglets. But in more recent history children are being introduced to technology earlier and earlier; which only make sense because the technology industry is growing exponentially! The problem with the tech industry is that it is still relatively new and I’m afraid that the kids who develop a curiosity for technology may not know how to go about making a career out of it.

When it comes to landing that first job as doctor, lawyer, teacher, architect, etc. kids are bombarded with notions such as: You HAVE to go to college; You HAVE to learn how to interview well in order to land internships with potential employ, andand you HAVE to be graduate in top 5 percent of your class in order to make a living in a given particular field of study. But when it comes to the technology industry that is not always the case! Lucky for us, we have options when it comes to making our first career move; but it all starts with getting that first interview. So how do we get that first interview? We pad our resume with College Degrees or Certifications.

As a matter of full disclosure, it is only fair that mention how I landed my first job as a Networking Technician. I am a college graduate from Louisiana State University where I acquired a Bachelor’s of Science in the realm of Mathematics with an emphasis in Pure Mathematics. While I was in school, I also took enough Education courses and passed enough Educational Certification Exams to teach High School Mathematics and Biology. With that being said, you must be thoroughly confused about how I got an interview for current position here at Guardian Computer; which leads me to my first point.

My degree and really any college degree for that matter open a lot of doors. Once the resume of a college graduate is placed on a potential employer desk, he can reasonably infer that the applicant is going to be relatively intelligent and a well-rounded individual (or at least I hope so or why else did I have to take 4 English classes to acquire my math degree). Secondly, going to college really offers its students numerous networking opportunities. Now when I say networking of course I’m not talking about routing and switching, but rather I’m referring to the ample opportunities students have to meet people with similar interest and presumably similar career paths. Throughout your career everyone builds up “contact list” of people that can help them push their careers in the right direction, and college is a great place to start building up this list. For example, while I was in college I made three very close friends whose parents owned and operated their own companies, and I have worked for ALL of them at one point or another! Therefore, to finish my story from earlier, once I was armed with my degree and my contact list I was able to get my resume hand delivered to my current boss’s desk and got the job few weeks later! But back to my point…

As go we through college not only do we get the chance to build up this list of contacts, but we also get develop our social skills and get to learn how to work as a team; which I’m sure I do not have to tell you how important these notions are when it comes to developing a great work environment. These notions of socialization and team work are really emphasized by group projects and internships. And let me tell you, college opens up a whole realm of possibilities when it comes to landing internships. Colleges do this so that their graduates have real life experience in their given fields upon graduation. For example, most prominent engineering programs require their students to complete at least a semester worth, if not a full year, of internships before they will even think about giving their students a diploma. And I cannot say this enough, EXPERIENCE IS EVERYTHING!

But I will also be the first to admit that college is not the right learning environment for everyone! Unfortunately, when it comes to getting a college education there are very limited options when it comes to time, place, and subject matter! This is how students like myself end up taking General Chemistry at 8 am every Monday, Wednesday, and Friday morning; when an hour after that final exam I will not care about the noble gases, moles, or how much hydrogen is left over after given reaction (man that semester was rough). But this is the beauty of the Certification route to landing that first job. Individuals who made their way into the computer industry through the route of certifications have a lot more time to focus on material that they are actually passionate about, and they do not get bogged or bored writing 14-page research papers about the troubled youth of some far off European country (I made an A on that paper by the way). Also with the technology industry being as big as it is we as potential employees can narrow down our scope of studies even further depending on the realm of computing we find to be to be the most prevalent to us or the most enjoyable. For example, some individuals may find their calling in software development, or web design, cyber security, or maybe they are like me and are curious about routing and switching. There are so many paths within the realm of technology that I may have to write an entirely different blog post just encompass all the different fields! Flexibility is the key here!

When it comes to acquiring these certifications one can take classes in the fields they are interested in or if you happen to be like a few of my coworkers you can simply read up on the subject matter and teach yourself the material in the comfort of your own home! But we would be kidding ourselves if we did not recognize the flaws in both of these career paths. As an informed writer, I would be doing the reader a disservice if I did not also mention the drawbacks of each of these educational paths.

When it comes to these technology certifications, they may only last 2 to 3 years before they need to be renewed. This should make sense because the world of technology is ever changing and essentially revolutionizing itself every few years. Therefore, hopefully one can see that it only makes sense that we must keep our certifications up to date to keep up with the changing times! On the other hand, a college degree last forever. It keeps a permanent place on your resume. I never have to go back to school in recertify in Abstract Algebra or Complex Analysis. I get to claim my degree as my own forever and always. It’s mine. I own it, and no one can take it away from me no matter how hard they try. On the other hand, because I never have to go back and recertify, if I don’t use it, I lose it. I’d be lying to you right now if I said I remember everything I learned about Math during my four years in college. Hell. I’d be lying to you if I said I remember everything from the last semester of my senior year! But that’s the beauty and the appeal of these certifications. Employers realize that these candidates, are always up to date on notions within the realm of expertise, so they know that when they hire someone they can go right to work with minimal training!

Now, I know what on everyone’s mind at his point. Which is the cheaper alternative? Where do I get the most ‘bang for my buck’? Again this is another topic that I could write an entirely different blog post the covers a cost-benefit analysis between these two paths; but I will do my best to explain the difference using generalities. The beauty of getting your college degree is that it’s a once in a life time investment. Unless of course you are taking out loans then obviously you are making multiple payments, but that is beside the point. Like I have stated previously, even if you are continually making payments towards your degree is never going to go away. Whereas with these certifications you have to continually buy books and other study materials to stay relevant and up to date. Also one must continually pay to take these certification exams, and I’ll let you in on a little secret, the higher you go in the different branches of certifications the more expensive the tests become and some even require you to fly out to a different location to take the exam. So you better pass those tests the first time!

But Bradley, be straight with us, which path is best when it comes to landing that first job? Well that is a loaded question, and it is my hope that the reader recognizes that I tried to stay completely objective throughout the bulk of this article, but in my personal opinion…I had an absolute blast in college. I learned so much about myself and I met so many great people; and that is why I can say with absolute certainty that acquiring my college degree was right career move for ME. And that is just it! I cannot sit here and tell you which path is the best for YOU. Everyone has different hopes, dreams, goals, and aspirations and only you can possibly know which path will work best for you!  But listen to this… The longer I stay in the Networking Industry the more useless my Math degree will become, but it will continue to open doors for me and that is what I love about it! And I have to be honest, do I wish I was a Cisco Certified Networking Administrator currently? Of course I do, and I know I will get there some day; but I would not trade my college education for the world.

 As always if you have any questions, comments or concerns about Information Technology or where to acquire any of the certifications we talked about today please do not hesitate to give us a call at the office. We have quite a few degrees and quite a few certifications floating around the office and we would be happy to point you in the right direction.

At this point in the 21st century, “What is the Wi-Fi password,” is an instinctual phrase for kids of all ages. And let’s be honest, most of you adults also have acquired this learned behavior as well. The real question is though, does either party know what is at stake while they surf the web on public Wi-Fi?

Whether you are checking in on the latest Trump versus Hillary debate or getting lost in the vast world of YouTube, we all need to take these necessary precautions to ensure that our devices and personal information are safe when we sync our devices to a foreign network.

1. Whose Wi-Fi Am I About To Use?

Always be suspicious of which network you connect to in public places. It would take minimal effort for a hacker to set up a Wi-Fi hotspot outside of a local coffee shop with a network name like “FreeCoffeeShopWifi”. This actually happens all of the time! Hackers do this to trick innocent bystanders into joining their network.

If you get lured into joining a hacker’s network like this, then you have essentially left a key under the mat for the hacker so that they may let themselves into all of your personal data! With that being said, always make sure to as an employee of the establishment for the Wi-fi Name to make sure you connect to a safe network.

2. NEVER, EVER Perform Any type of Banking or Personal Transaction Away From Home

Stick to looking up the latest meme or catching up on the news while using public Wi-Fi; your bank account will thank me later. Even a seemingly innocuous banking transaction, like transferring money from your savings account to your debit card, can lead to a hacker infiltrating your account.

3. Stay On Recognizable Websites

Preferably you should stick to what IT nerds call the surface level of the web, i.e. Facebook, YouTube, Yahoo, etc. You know, the websites almost anyone with an internet connection can identify.  By taking these precautions, it makes it difficult for someone to intercept any data you send out or receive.

If you insist on exploring beyond the basics, makes sure to just visit secure websites and applications. When using your laptops on a public network always look for the HTTPS:// line rather than just HTPP:// to confirm you’ve established a secure connection.

4. Turn Off File Sharing

Turning off file sharing will only take a minute and it could potentially save you a lifetime worth of problems. Below is a guide.

For Windows users, we can find this option by opening the Control Panel and making our way to the Network and Sharing Center. From there, we want to Change Advanced Sharing Settings and Turn Off File Sharing.

For Mac users, we want to find our Systems Preferences on our toolbar and be sure to uncheck the box next to File Sharing

5. What If I Want To Work On a Public Network? Is My Data Safe?

In short, the answer is:  NO, your data is not safe!

The good news for you is that this does not have to be the case, there are numerous ways to set up a Virtual Private Network (VPN) so that the data being shared between you and your work is encrypted in case a hacker decides to make you his next victim!

Without the encryption key, it is going to make it challenging for the hacker to make any sense of the data he intercepts from your device thus leaving you and your company files protected. Unfortunately, these types of networks are not always ready, but if you would like to look into getting one of these virtual connections set up one of our Guardian Computer Networking Consultants would be we would happy to help you and your company stay protected!

Ask a New Orleans Tech Conclusion: Public Wi-Fi Is Definitely NOT Safe

The internet is a wonderful place, and it is amazing that we have access to the internet on every street corner. Unfortunately, this ability to access the internet so easily is exactly what makes everyone so vulnerable to cyber-attacks! If we keep these ideas in mind on our next trip to the local coffee shop, I promise you will be able to enjoy that mocha frappuccino much more knowing that your personal data is not being exposed. Please be safe, and always keep your head on a swivel when you are out there on the world wide web!