Bredy Network Management Corporation Blogs

3 minutes reading time (514 words)

Can You Tell if Your Browsing is Secured?

Can You Tell if Your Browsing is Secured?

Your choice of browser can easily impact your security, as each handles how it informs you whether or not your connection is encrypted differently. This is especially important to recognize, especially when the Chrome browser will soon run counter to the advice users have received for quite some time.

How Chrome is Shaking Up the Conventional Advice
There are two different kinds of websites that use hypertext transfer protocol to deliver content. The first, HTTP, lacks the security that the “S” in HTTPS signifies. If your URL does include HTTPS, it means that the data that you input into the website is protected by encryption measures, keeping it safe from any prying eyes. Historically, this meant that best practices demanded that a user check for a padlock icon in the URL to be sure their browsing was secure.

However, Google is finally acting on a promise to take the opposite tack and instead label those websites that haven’t taken the time to encrypt their communications with their host server. The hope is that this will pressure websites to adopt HTTPS, especially seeing that Chrome is the most commonly-used browser. This approach has been lauded by security pros.

What Other Browsers are Doing
The remaining three of the big four browsers, Safari, Firefox, and Edge, also have plans to change things about their approach to security, but not all of them have plans to flip the script entirely.

Firefox - While Firefox will very likely follow in Chrome’s footsteps at some point, as of right now it still subscribes to the “confirming the page is secure” approach. However, Firefox also alerts the user if a HTTP page contains a login form by displaying a padlock with a strike-through in the URL, and by adding a warning that displays when the cursor moves over one of the fields. There are also plans to make all HTTP pages display the strike-through padlock, no login forms required.

Safari - As of yet, Apple has stuck with tradition, in that they will confirm that a website’s connection is secured through a digital certificate and encryption. However, it is also important to recognize that Apple has also taken additional steps to ensure security, albeit different ones. For example, if a user is on an HTTP page and tries to input login credentials or other sensitive data, the browser will alert them in a similar way as Firefox will, alerts popping up both at the field in question and in the URL bar.

Edge - Again, like Apple, Edge only informs a user when a page is protected, although there is the option to access additional information that explains that the user’s connection isn’t encrypted and could therefore pose some risk. However, this does not extend to input fields on HTTP sites, so you will not be warned before inputting sensitive information into these fields.

In today’s day and age, it is crucial that your business remains secure. Paying attention to the security of the websites you frequent is just one part of that. For assistance with the rest of your cybersecurity, reach out to BNMC at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, August 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Malware Business Computing Microsoft Software Hackers Internet Google Computer IT Services Hosted Solutions Ransomware Business Mobile Devices Network Security Tech Term Small Business Managed IT Services Android Backup Smartphone Windows Data Management User Tips Efficiency Saving Money Data Recovery Business Continuity IT Support Hardware Internet of Things Cloud Computing Data Backup Cybersecurity Data App Browser Innovation Windows 10 Business Management Encryption Facebook Server Remote Monitoring Gmail Artificial Intelligence Windows 10 Managed IT Services Communication Smartphones Office 365 Productivity Tip of the week Outsourced IT Chrome Word Managed Service Provider Phishing Productivity Vulnerability Analytics communications Network IT Support Infrastructure Money Disaster Recovery Passwords Big Data Government Settings Applications Google Drive Bandwidth Antivirus Content Filtering Microsoft Office Upgrade Employer-Employee Relationship YouTube Risk Management IT Management Social Media Robot Website Office Tips Data storage Telephone Systems The Internet of Things Spam Computing Virtual Reality Outlook WiFi HIPAA LiFi VoIP Firewall Two-factor Authentication Hosted Solution Mobile Security Maintenance SaaS Avoiding Downtime Administration Scam Holiday Mouse Miscellaneous Business Intelligence BYOD Wireless Alert Workplace Tips Apple Storage Company Culture Mobile Device VPN Data Security Paperless Office Vendor Management Monitors Managing Stress Save Money Server Management Business Technology Virtual Private Network Information Automation Unified Threat Management Data loss End of Support Continuity Safety Downloads Fraud Cost Management Onboarding Mail Merge Blockchain Alt Codes Identity Remote Computing VoIP Unified Threat Management Screen Reader Charging desktop Slack Shortcut Distributed Denial of Service Bring Your Own Device Operating System Smart Office Digital Payment Firefox Superfish Social Wires Disaster Bluetooth Comparison Licensing Budget Dongle Digital Network Congestion Humor Solar Collaboration Cybercrime Information Technology Assessment Downtime Address Permissions Typing Writing User Error Current Events Smart Tech Monitoring Wi-Fi Marketing Patch Management Managed IT Service Best Practice Work Customer Relationship Management Router Voice over Internet Protocol Uninterrupted Power Supply Gadgets Specifications Cooperation Service Level Agreement Document Management Spyware Computers Cryptocurrency Compliance File Sharing Heating/Cooling Multi-Factor Security Apps Hotspot Internet Exlporer Computer Care IBM Dark Data Retail Time Management Printer IT solutions Going Green Connectivity Solid State Drive Spying Break Fix IT Technicians Google Docs Optimization Networking Education Hacks Modem FinTech Analysis Politics Users Halloween Search Black Friday Staff Leominster Identity Theft Display Bitcoin Regulations Servers Google Calendar Language Google Wallet Value Training Corporate Profile Customer Service Emergency Automobile Office Samsung Network Management Access Control Printing IoT Hard Disk Drive Employee-Employer Relationship Dark Web Business Growth Mirgation Recycling Password Cookies MSP Dell Managed Service Tech Support Scary Stories Cyber Monday Augmented Reality Legal K-12 Schools Windows 8 Social Networking Cabling Running Cable Legislation Unified Communications Computing Infrastructure Drones Professional Services WannaCry Chromebook Google Maps Social Engineering Touchscreen SharePoint Star Wars PowerPoint Buisness Microsoft Excel Hacker Chatbots eWaste Virtual Desktop Quick Tips Techology Nanotechnology Development Websites Sports Managed IT Smart Technology Deep Learning Wearable Technology Network upgrade Lenovo Motherboard Cables Laptop Statistics Tablet Alerts USB How To Crowdsourcing IT Consultant Mobile Computing Cameras Personal Information Botnet BDR Meetings 3D Printing Tracking Cortana Cleaning Processors Regulation CCTV Machine Learning Webcam Unsupported Software Virtualization Update Error Computer Repair Relocation Point of Sale Ben McDonald shares Mobile Data Travel How To Work/Life Balance Recovery G Suite Health Private Cloud Supercomputer CrashOverride Black Market Motion Sickness Law Enforcement Staffing Administrator Notifications Taxes Electronic Medical Records Twitter Mobile Device Management Web Server what was your? Physical Security IT Budget Upgrades Gadget GPS Emoji

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3