Contact us today!
217-428-6449

Network Solutions Unlimited Blog

The Chrome Browser is Redefining Your Security

The Chrome Browser is Redefining Your Security

When you are surfing the web, do you know if you are secure? Typically, your browser will tell you when a site is secure or not. This is especially important if you are putting in sensitive information, like passwords or credit card information. Google Chrome is stepping up it’s game to keep users safe.

How Chrome is Shaking Up the Conventional Advice
There are two major types of websites out there, HTTP and HTTPS. The primary difference between them is that the one with the S at the end signifies that the data was sent through a secure connection, meaning that there are extra layers of security there to shield it from any prying eyes. It’s been a best practice for a long time to make sure that any sensitive data sent to or from a website utilizes a secure connection. This is done by looking for the padlock icons in the address bar.

Google is finally stepping up its game by labeling businesses that don’t encrypt their communications with their host server. Chrome will notify users when they are surfing a site that isn’t using HTTPS. The idea is that this is supposed to put the pressure on websites that have yet to adopt HTTPS. Since Chrome is the most popular web browser, it makes sense that this approach could spark a revolution in website security. So far, the approach is seen as ideal by security professionals.

What Are Other Browsers Doing?
The other major web browsers, Safari, Firefox, and Edge, also have some plans for how they will handle unencrypted websites in the future. However, not all of them plan on flipping the script in such a dramatic way.

  • Firefox: It’s likely that Firefox will follow a similar path to Google Chrome. Firefox is still subscribing to the “confirming the page is secure” method. Firefox will also tell you whether or not the HTTP page contains a login form with a padlock that is stricken through. There is even a warning that pops up when the cursor moves over any of these fields. In the future, the browser will display all HTTP pages with the strike-through padlock, even if there aren’t any forms.
  • Safari: Apple has yet to deviate from tradition. By this, we mean that the browser just confirms that the connection is secured by showing the lock. However, Apple has taken other, different steps toward ensuring the security of its users. If a user attempts to log into an HTTP page, the page will inform them with alerts popping up into the field and the address bar, much like Firefox does now.
  • Edge: Microsoft Edge only tells a user when a page is protected, but there are other options in place that allow the user to access even more information about their connection. This information can reveal if the connection isn’t encrypted, identifying it a potential risk. This same feature doesn’t extend to the input fields on unencrypted pages, though. We don’t feel like Edge is doing enough to warn users about unsafe browsing.

Are you unsure of how to keep your business secure? Reach out to Network Solutions Unlimited at 217-428-6449.

In Business, What’s the Differences Between Intell...
Getting to Know Technology: Username
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

FAQ Compliance Printers Hosted Solutions Tech Term Private Cloud Peripheral VPN Identities Evernote App Best Practice Data Backup OneNote Transportation Project Management Phone System Spyware Language Bring Your Own Device Windows Ink Specifications Email Remote Monitoring Outlook Remote Computing Excel Wireless Internet intranet Black Market Customer Co-Managed Services Internet exploMicrosoft Windows 10s Phishing Save Money Sales Word End of Support Miscellaneous WPA3 Computer Care Hard Disk Drive Relocation Emergency Microsoft Office Business Computing Financial Technology Wireless Charging The Internet of Things Benefits Two Factor Authentication Samsung Government Comparison SaaS Bandwidth Alexa for Business Avoiding Downtime Travel WiFi Tip of the Week Professional Services BYOD Maintenance Network Meetings Data Privacy Upgrade Managed Service Blockchain Save Time Hacking HBO Chromecast Students CrashOverride Network Security Managed Service Provider App store Smart Tech Sports Emails Edge Small Business Value Telephone Systems Mobile Security Work/Life Balance Cortana IT Support Camera Webinar Managing Stress Training Computing Infrastructure Books Office 365 Search File Sharing Projects Memory Lifestyle Disaster Recovery Going Green Social Media Computer Sync Best Practices Computing Mobile Device Management Tech Support Ransomware Accessory Management Monitor Information Technology Legislation Tablets Document Management Vulnerability Virtualization Law Enforcement Applications Touchscreen Wireless Technology BDR Gifts Browser Chromebook Identity Outsourced IT Virtual Reality Google Commerce Telephone Connectivity Microsoft Excel Cleaning Wasting Time Content Microsoft Word Update Office Tips Cost Management Assessment Websites Hard Drive Colocation Worker Hyperlink Virtual Assistant Data storage Instant Messaging Identity Theft Quick Tips Google Drive Google Maps Flexibility Shadow IT Storage Devices Conferencing Hiring/Firing Spam Licensing History Vendor Management Innovation Managed IT Service Public Computer Cybersecurity Entertainment IT Services Robot Content Filter Encryption Data Theft VoIP Smartphone Productivity Business Owner Windows 10 Hosted Solution Internet of Things Security Wi-Fi Budget Users Microsoft Augmented Reality Battery Saving Money NFL Charger Cloud Computing Router Social Engineering IT Management Rootkit Business Technology Facebook Windows 10 Regulation iPhone Artificial Intelligence Dark Web Collaboration Marketing Business Management Troubleshooting Cache Retail Apps Big Data Networking Proactive IT Television Scalability Screen Mirroring Unified Threat Management Thank You Cast Employer-Employee Relationship Managed IT Services File Storage Mobility Chrome Mobile Device Efficiency Shortcut Backup Software Password Application Holiday Legal Operating System Automation Mobile Devices Hardware Monitors Data Loss Bluetooth Computer Fan Adobe Touchpad Workers User Error Business Continuity Wireless Recovery PowerPoint Alert Hard Drives Antivirus PDF IoT MSP Worker Commute Display Device Security Loyalty Smart Technology Data Management Data Keyboard Reputation Data Security Company Culture Settings How To Upgrades Nanotechnology Computers Cloud USB Credit Cards Files hacker HaaS Communication Office Updates Health Windows 7 Twitter Passwords Experience Business Software as a Service Data Breach Vendor Employer Employee Relationship iOS User Tips Unified Communications Data Storage Data Protection Productivity Gmail Workplace Tips Unsupported Software Advertising Consultant Computer Forensics Android Printing Safety Apple Monitoring Computer Accessories Proactive Malware Firewall Hybrid Cloud Hackers Internet Gadgets Redundancy Audit Managed IT Services Content Filtering WIndows Server 2008 Amazon Data Recovery Ciminal Gamification Mobile Privacy Smartphones Downtime How to Politics Education Electronic Medical Records Financial Testing Audiobook IT budget Internet Exlporer Video Games IT Support Fraud Technology Virus Windows Physical Security Humor HIPAA eWaste Employee-Employer Relationship IT solutions IT Solutions Communications Streaming Media Managed IT Public Cloud WannaCry Google Docs Cybercrime Spam Blocking Personal Information Server Laptop Administration Two-factor Authentication Information Wasting Money Root Cause Analysis Risk Management Money Techology Scam Google Assistant Solid State Drive Analysis Patch Management Automobile Congratulations Business Intelligence