Can You Tell if Your Browsing is Secured?

Can You Tell if Your Browsing is Secured?

Your choice of browser can easily impact your security, as each handles how it informs you whether or not your connection is encrypted differently. This is especially important to recognize, especially when the Chrome browser will soon run counter to the advice users have received for quite some time.

How Chrome is Shaking Up the Conventional Advice
There are two different kinds of websites that use hypertext transfer protocol to deliver content. The first, HTTP, lacks the security that the “S” in HTTPS signifies. If your URL does include HTTPS, it means that the data that you input into the website is protected by encryption measures, keeping it safe from any prying eyes. Historically, this meant that best practices demanded that a user check for a padlock icon in the URL to be sure their browsing was secure.

However, Google is finally acting on a promise to take the opposite tack and instead label those websites that haven’t taken the time to encrypt their communications with their host server. The hope is that this will pressure websites to adopt HTTPS, especially seeing that Chrome is the most commonly-used browser. This approach has been lauded by security pros.

What Other Browsers are Doing
The remaining three of the big four browsers, Safari, Firefox, and Edge, also have plans to change things about their approach to security, but not all of them have plans to flip the script entirely.

Firefox - While Firefox will very likely follow in Chrome’s footsteps at some point, as of right now it still subscribes to the “confirming the page is secure” approach. However, Firefox also alerts the user if a HTTP page contains a login form by displaying a padlock with a strike-through in the URL, and by adding a warning that displays when the cursor moves over one of the fields. There are also plans to make all HTTP pages display the strike-through padlock, no login forms required.

Safari - As of yet, Apple has stuck with tradition, in that they will confirm that a website’s connection is secured through a digital certificate and encryption. However, it is also important to recognize that Apple has also taken additional steps to ensure security, albeit different ones. For example, if a user is on an HTTP page and tries to input login credentials or other sensitive data, the browser will alert them in a similar way as Firefox will, alerts popping up both at the field in question and in the URL bar.

Edge - Again, like Apple, Edge only informs a user when a page is protected, although there is the option to access additional information that explains that the user’s connection isn’t encrypted and could therefore pose some risk. However, this does not extend to input fields on HTTP sites, so you will not be warned before inputting sensitive information into these fields.

In today’s day and age, it is crucial that your business remains secure. Paying attention to the security of the websites you frequent is just one part of that. For assistance with the rest of your cybersecurity, reach out to BNMC at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, October 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Computing Microsoft Software Computer Network Security Internet Google IT Services Hosted Solutions Business Tech Term Ransomware Mobile Devices User Tips Managed IT Services Small Business Android Backup Efficiency Productivity Smartphone Windows IT Support Data Management Internet of Things Cloud Computing Saving Money Browser Business Continuity Data Recovery Innovation Hardware Windows 10 Managed IT Services Data Backup Data App Cybersecurity Communication Encryption Passwords Windows 10 Microsoft Office Business Management Facebook Server Gmail Artificial Intelligence Remote Monitoring Disaster Recovery Smartphones Productivity Infrastructure Chrome Upgrade Managed Service Provider Tip of the week Analytics Phishing Workplace Tips communications Outsourced IT Word Vulnerability Applications Network Employer-Employee Relationship Website Money IT Support Office 365 Government Big Data Google Drive BYOD Content Filtering Bandwidth Settings Miscellaneous Antivirus Maintenance Robot Save Money YouTube Risk Management Social Media Data storage Office Tips IT Management Touchscreen WiFi SaaS Paperless Office Laptop Virtual Private Network Operating System The Internet of Things LiFi Company Culture Hosted Solution Holiday VoIP Administration Unified Threat Management Managing Stress Mouse Alert Data loss Telephone Systems Display Information Two-factor Authentication desktop Avoiding Downtime Apple Vendor Management Firewall Monitors Scam Storage HIPAA Users Automation Mobile Security Wireless End of Support Virtual Reality VPN Business Intelligence Data Security Mobile Device Server Management Spam Computing Business Technology Outlook Staff Leominster SharePoint Dell Modem Bring Your Own Device FinTech Microsoft Excel Wi-Fi Cabling Regulations Managed IT Smart Technology Budget Writing WannaCry Employee-Employer Relationship Language Quick Tips Value Techology Social Google Maps Mirgation Statistics Recycling Tablet Information Technology Computers Managed Service How To IoT Lenovo Typing Humor LED Augmented Reality K-12 Schools Downloads Current Events Dark Data Update Cookies Mail Merge Best Practice MSP Blockchain Professional Services Unified Threat Management Cybercrime Social Networking Shortcut Distributed Denial of Service Retail Downtime PowerPoint Computing Infrastructure VoIP Politics Chatbots Bluetooth Apps eWaste Comparison Marketing Firefox Star Wars Superfish Cryptocurrency Co-Managed IT Wearable Technology IT solutions Network upgrade Going Green Customer Service Gadgets Nanotechnology Address Development Permissions Google Docs Digital Payment Alerts Education USB User Error Hacks Disaster Motherboard Patch Management Cables Managed IT Service Office Samsung Digital Onboarding Tech Support Collaboration Identity Continuity Specifications Google Wallet Slack Fraud Customer Relationship Management Cost Management Bitcoin Content Heating/Cooling Smart Office Multi-Factor Security Printing Chromebook Halloween Screen Reader Business Growth Charging Licensing Time Management Dongle Printer Password Uninterrupted Power Supply Wires Break Fix Legal Social Engineering Document Management Spyware Digital Signage Websites File Sharing Search Unified Communications Solar Black Friday Drones Computer Care IBM Monitoring Assessment Networking Windows 8 Streaming Servers Work Google Calendar Solid State Drive Scary Stories Smart Tech Emergency Hacker Troubleshooting Cooperation Network Management Service Level Agreement Access Control Running Cable Router Deep Learning Voice over Internet Protocol Dark Web Safety Identity Theft Compliance Cyber Monday Remote Computing Training Corporate Profile Buisness Spying Hotspot Internet Exlporer Automobile Virtual Desktop IT Technicians Optimization Legislation Network Congestion Hard Disk Drive Sports Analysis Connectivity Alt Codes Printers Mobile Computing Supercomputer CrashOverride Machine Learning Motion Sickness Processors Staffing Administrator Virtualization Taxes Unsupported Software Web Server what was your? IT Budget Computer Repair Relocation GPS IT Consultant Mobile Data Recovery Cameras How To Work/Life Balance Health Private Cloud Meetings Tracking Black Market Cleaning CCTV Law Enforcement Electronic Medical Records Webcam BDR Notifications Physical Security Twitter Error Emoji Regulation Upgrades Gadget Mobile Device Management Point of Sale Ben McDonald shares Crowdsourcing Personal Information Botnet Travel Cortana G Suite 3D Printing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3