LiveZilla Live Chat Software
260-422-3979    Get SUPPORT

Technology Specialists Blogs

Can You Tell if Your Browsing is Secured?

Can You Tell if Your Browsing is Secured?

Your choice of browser can easily impact your security, as each handles how it informs you whether or not your connection is encrypted differently. This is especially important to recognize, especially when the Chrome browser will soon run counter to the advice users have received for quite some time.

How Chrome is Shaking Up the Conventional Advice
There are two different kinds of websites that use hypertext transfer protocol to deliver content. The first, HTTP, lacks the security that the “S” in HTTPS signifies. If your URL does include HTTPS, it means that the data that you input into the website is protected by encryption measures, keeping it safe from any prying eyes. Historically, this meant that best practices demanded that a user check for a padlock icon in the URL to be sure their browsing was secure.

However, Google is finally acting on a promise to take the opposite tack and instead label those websites that haven’t taken the time to encrypt their communications with their host server. The hope is that this will pressure websites to adopt HTTPS, especially seeing that Chrome is the most commonly-used browser. This approach has been lauded by security pros.

What Other Browsers are Doing
The remaining three of the big four browsers, Safari, Firefox, and Edge, also have plans to change things about their approach to security, but not all of them have plans to flip the script entirely.

Firefox - While Firefox will very likely follow in Chrome’s footsteps at some point, as of right now it still subscribes to the “confirming the page is secure” approach. However, Firefox also alerts the user if a HTTP page contains a login form by displaying a padlock with a strike-through in the URL, and by adding a warning that displays when the cursor moves over one of the fields. There are also plans to make all HTTP pages display the strike-through padlock, no login forms required.

Safari - As of yet, Apple has stuck with tradition, in that they will confirm that a website’s connection is secured through a digital certificate and encryption. However, it is also important to recognize that Apple has also taken additional steps to ensure security, albeit different ones. For example, if a user is on an HTTP page and tries to input login credentials or other sensitive data, the browser will alert them in a similar way as Firefox will, alerts popping up both at the field in question and in the URL bar.

Edge - Again, like Apple, Edge only informs a user when a page is protected, although there is the option to access additional information that explains that the user’s connection isn’t encrypted and could therefore pose some risk. However, this does not extend to input fields on HTTP sites, so you will not be warned before inputting sensitive information into these fields.

In today’s day and age, it is crucial that your business remains secure. Paying attention to the security of the websites you frequent is just one part of that. For assistance with the rest of your cybersecurity, reach out to Technology Specialists at 260-422-3979.

What Are the Differences Between Business Intellig...
Tip of the Week: How to Add a Watermark in Microso...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Security Tip of the Week Technology Small Business Privacy Communication IT Services User Tips Saving Money Tech Term Best Practices Computer Passwords Efficiency Microsoft Office Network Security Internet Managed IT Services Email Microsoft Data Software Data Backup IT Support Managed Service Productivity Hackers Data Recovery Information Users Website Backup Workplace Tips Employer-Employee Relationship Upgrade Social Media Business Google Hardware Company Culture Productivity Mobile Devices Network PowerPoint LED Content Filtering Disaster Recovery Troubleshooting Business Computing Internet of Things Marketing Ransomware Money Onboarding Gadgets Co-Managed IT Charging Laptop Browser Managed IT services Applications Mobile Device FinTech Save Money Innovation Analytics Office 365 Update Monitoring Malware Touchscreen Miscellaneous Word MSP Communications Cloud Computing Business Intelligence Spying Facebook Desktop Wireless Operating System Development BYOD Slack Windows 10 Analysis Content Employee-Employer Relationship Display Maintenance Hosted Solutions Business Continuity Managing Stress Digital Signage Cloud Streaming Cortana Tech Support Compliance Wireless Technology 5G IBM Apps Safety Hacker Managed Service Provider The Internet of Things Budget Regulation Customer Relationship Management Competition Printers Hiring/Firing IP Address Big Data Fun Customer Service Mobile Office Remote Monitoring Domains Smartphones Windows 10 Virtualization Spam Mobile Device Management Hard Drives VoIP Search Public Speaking Server Two-factor Authentication Presentation Wi-Fi Quick Tips Lithium-ion battery Augmented Reality

      Mobile? Grab this Article!

      QR-Code dieser Seite