LiveZilla Live Chat Software
260-422-3979    Get SUPPORT

Technology Specialists Blogs

Can You Tell if Your Browsing is Secured?

Can You Tell if Your Browsing is Secured?

Your choice of browser can easily impact your security, as each handles how it informs you whether or not your connection is encrypted differently. This is especially important to recognize, especially when the Chrome browser will soon run counter to the advice users have received for quite some time.

How Chrome is Shaking Up the Conventional Advice
There are two different kinds of websites that use hypertext transfer protocol to deliver content. The first, HTTP, lacks the security that the “S” in HTTPS signifies. If your URL does include HTTPS, it means that the data that you input into the website is protected by encryption measures, keeping it safe from any prying eyes. Historically, this meant that best practices demanded that a user check for a padlock icon in the URL to be sure their browsing was secure.

However, Google is finally acting on a promise to take the opposite tack and instead label those websites that haven’t taken the time to encrypt their communications with their host server. The hope is that this will pressure websites to adopt HTTPS, especially seeing that Chrome is the most commonly-used browser. This approach has been lauded by security pros.

What Other Browsers are Doing
The remaining three of the big four browsers, Safari, Firefox, and Edge, also have plans to change things about their approach to security, but not all of them have plans to flip the script entirely.

Firefox - While Firefox will very likely follow in Chrome’s footsteps at some point, as of right now it still subscribes to the “confirming the page is secure” approach. However, Firefox also alerts the user if a HTTP page contains a login form by displaying a padlock with a strike-through in the URL, and by adding a warning that displays when the cursor moves over one of the fields. There are also plans to make all HTTP pages display the strike-through padlock, no login forms required.

Safari - As of yet, Apple has stuck with tradition, in that they will confirm that a website’s connection is secured through a digital certificate and encryption. However, it is also important to recognize that Apple has also taken additional steps to ensure security, albeit different ones. For example, if a user is on an HTTP page and tries to input login credentials or other sensitive data, the browser will alert them in a similar way as Firefox will, alerts popping up both at the field in question and in the URL bar.

Edge - Again, like Apple, Edge only informs a user when a page is protected, although there is the option to access additional information that explains that the user’s connection isn’t encrypted and could therefore pose some risk. However, this does not extend to input fields on HTTP sites, so you will not be warned before inputting sensitive information into these fields.

In today’s day and age, it is crucial that your business remains secure. Paying attention to the security of the websites you frequent is just one part of that. For assistance with the rest of your cybersecurity, reach out to Technology Specialists at 260-422-3979.

What Are the Differences Between Business Intellig...
Tip of the Week: How to Add a Watermark in Microso...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, October 15 2018

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Security Tip of the Week Technology Small Business Privacy Saving Money Tech Term Productivity Computer Passwords Efficiency User Tips Network Security Best Practices Managed IT Services Microsoft Communication Microsoft Office IT Services Employer-Employee Relationship Workplace Tips Backup Social Media Hardware Internet Mobile Devices Network Email Data Backup Software IT Support Hackers Data Recovery Information Users Monitoring Miscellaneous Malware Touchscreen Communications MSP Upgrade Windows 10 Business Cloud Computing Google Business Intelligence Spying Wireless Facebook Desktop Operating System Slack Development BYOD Content Company Culture Analysis Employee-Employer Relationship Display Hosted Solutions Business Continuity Maintenance Streaming Managing Stress Digital Signage Data Cloud PowerPoint LED Business Computing Content Filtering Troubleshooting Marketing Internet of Things Managed Service Gadgets Money Onboarding Co-Managed IT Charging Laptop Managed IT services Applications Innovation FinTech Save Money Website Analytics Update Customer Service Mobile Office Remote Monitoring Domains Smartphones Virtualization Spam Hard Drives Mobile Device Management Windows 10 VoIP Public Speaking Search Two-factor Authentication Server Presentation Wi-Fi Lithium-ion battery Quick Tips Augmented Reality Tech Support Cortana Wireless Technology 5G Compliance Apps Safety Disaster Recovery IBM Ransomware Hacker The Internet of Things Productivity Managed Service Provider Budget Regulation Hiring/Firing Competition Browser Printers Customer Relationship Management IP Address Big Data Office 365 Fun

      Mobile? Grab this Article!

      QR-Code dieser Seite