Can You Tell if Your Browsing is Secured?

Can You Tell if Your Browsing is Secured?

Your choice of browser can easily impact your security, as each handles how it informs you whether or not your connection is encrypted differently. This is especially important to recognize, especially when the Chrome browser will soon run counter to the advice users have received for quite some time.

How Chrome is Shaking Up the Conventional Advice
There are two different kinds of websites that use hypertext transfer protocol to deliver content. The first, HTTP, lacks the security that the “S” in HTTPS signifies. If your URL does include HTTPS, it means that the data that you input into the website is protected by encryption measures, keeping it safe from any prying eyes. Historically, this meant that best practices demanded that a user check for a padlock icon in the URL to be sure their browsing was secure.

However, Google is finally acting on a promise to take the opposite tack and instead label those websites that haven’t taken the time to encrypt their communications with their host server. The hope is that this will pressure websites to adopt HTTPS, especially seeing that Chrome is the most commonly-used browser. This approach has been lauded by security pros.

What Other Browsers are Doing
The remaining three of the big four browsers, Safari, Firefox, and Edge, also have plans to change things about their approach to security, but not all of them have plans to flip the script entirely.

Firefox - While Firefox will very likely follow in Chrome’s footsteps at some point, as of right now it still subscribes to the “confirming the page is secure” approach. However, Firefox also alerts the user if a HTTP page contains a login form by displaying a padlock with a strike-through in the URL, and by adding a warning that displays when the cursor moves over one of the fields. There are also plans to make all HTTP pages display the strike-through padlock, no login forms required.

Safari - As of yet, Apple has stuck with tradition, in that they will confirm that a website’s connection is secured through a digital certificate and encryption. However, it is also important to recognize that Apple has also taken additional steps to ensure security, albeit different ones. For example, if a user is on an HTTP page and tries to input login credentials or other sensitive data, the browser will alert them in a similar way as Firefox will, alerts popping up both at the field in question and in the URL bar.

Edge - Again, like Apple, Edge only informs a user when a page is protected, although there is the option to access additional information that explains that the user’s connection isn’t encrypted and could therefore pose some risk. However, this does not extend to input fields on HTTP sites, so you will not be warned before inputting sensitive information into these fields.

In today’s day and age, it is crucial that your business remains secure. Paying attention to the security of the websites you frequent is just one part of that. For assistance with the rest of your cybersecurity, reach out to BNMC at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, December 17 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Malware Business Computing Business Network Security Hackers User Tips Software Internet Microsoft Google Computer Tech Term IT Services Mobile Devices Hosted Solutions Ransomware Efficiency Smartphone Communication Small Business IT Support Productivity Data Managed IT Services Android Backup Cloud Computing Business Continuity Hardware Windows 10 Windows Internet of Things Browser Innovation Managed IT Services Data Recovery Saving Money Data Management Cybersecurity Productivity Data Backup Microsoft Office Business Management Workplace Tips App Upgrade Windows 10 Disaster Recovery Mobile Device Encryption Office 365 Artificial Intelligence Passwords Gmail Remote Monitoring Server Facebook Outsourced IT Word Website Analytics Employer-Employee Relationship communications Tip of the week Smartphones Network BYOD Vulnerability Chrome Infrastructure IT Support Managed Service Provider Money Phishing Applications Miscellaneous Company Culture Office Tips Managed Service Big Data Government Antivirus VoIP Data storage Settings IT Management Users YouTube Maintenance Google Drive Save Money Robot Content Filtering Social Media Bandwidth Risk Management Automation Wireless End of Support Apple Education Virtual Reality Employee-Employer Relationship Laptop Storage Two-factor Authentication Managing Stress Printing The Internet of Things Avoiding Downtime Paperless Office SaaS Scam Information Development Holiday Alert HIPAA Unified Threat Management Data loss Telephone Systems Outlook Spam Computing Display Operating System Access Control desktop WiFi VPN Mobile Security Data Security LiFi Firewall Server Management Vendor Management Hosted Solution Business Technology Monitors Touchscreen Business Intelligence Administration Virtual Private Network Mouse Quick Tips Running Cable Human Error Staff Leominster File Sharing Cryptocurrency Statistics Tablet Websites Analysis Modem FinTech Computer Care IBM Apps How To Lenovo Value Google Docs Downloads Buisness Regulations Solid State Drive IT solutions Going Green Mail Merge Blockchain Language VoIP Unified Threat Management Safety Sports Mirgation Recycling Hacks Shortcut Distributed Denial of Service Virtual Desktop IoT Identity Theft Remote Computing Device Augmented Reality K-12 Schools Bitcoin Bluetooth Comparison Cookies MSP Training Corporate Profile Google Wallet Firefox Superfish Computing Infrastructure Professional Services Automobile Business Growth Social Networking Hard Disk Drive Address Permissions Network Congestion LED Legal User Error Chatbots eWaste Dell Password Patch Management Managed IT Service PowerPoint Star Wars Writing Mobility Wearable Technology Network upgrade Cabling Windows 8 Specifications Wi-Fi Nanotechnology WannaCry Unified Communications Drones Customer Relationship Management Alerts USB Google Maps Hacker Heating/Cooling Multi-Factor Security Downtime Motherboard Cables Computers Cybercrime Co-Managed IT Deep Learning Time Management Printer Marketing Identity Continuity Mobile Device Management Break Fix Dark Data Update Onboarding Fraud Cost Management Networking Gadgets Retail Print Toner Smart Office Search Black Friday Slack Screen Reader Charging Content Licensing Dongle Alt Codes Servers Google Calendar Politics Wires Emergency Digital Payment Bring Your Own Device Network Management Solar Dark Web Customer Service Digital Signage Assessment Office Halloween Samsung Work Disaster Social Cyber Monday Monitoring Smart Tech Digital Budget Streaming Cooperation Service Level Agreement Collaboration Typing Humor Legislation Tech Support Router Voice over Internet Protocol Information Technology Best Practice SharePoint Compliance Current Events Microsoft Excel Chromebook Troubleshooting Hotspot Internet Exlporer Techology Social Engineering Scary Stories IT Technicians Optimization Uninterrupted Power Supply Managed IT Smart Technology Spying Connectivity Document Management Spyware Twitter Physical Security Error Upgrades Gadget Emoji Printers Crowdsourcing Point of Sale Ben McDonald shares Travel Personal Information Botnet 3D Printing G Suite Cortana CrashOverride Supercomputer Processors Motion Sickness Machine Learning Staffing Administrator Unsupported Software Taxes Virtualization IT Budget Web Server what was your? Computer Repair Relocation GPS Mobile Data BDR IT Consultant How To Work/Life Balance Cameras Mobile Computing Recovery Meetings Health Private Cloud Regulation Tracking Cleaning Black Market Law Enforcement CCTV Notifications Webcam Electronic Medical Records

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3