Contact us today!
217-428-6449

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Network Profile?
Each time a Windows 10 device connects to a new network, it will ask the user if it should be able to be discovered by other devices on that network. Selecting “Yes” will set your network profile to Private, and selecting “No” will set it to Public.

The Private and Public settings are referring to the kind of network your device is connecting to, and what level of security your individual device is responsible for. If you are connected to your company’s network, with all its protections and other users with whom you need to collaborate, the “Private” network setting is the one you want to use. However, if you’re using your device in a public setting, on a network that is “Public”-ally accessible, you don’t want any Tom, Dick, or Harry Hacker to be able to connect to you.

Switching the Network Profile
Windows 10 offers a few different methods of switching the network profile that a device uses. One way is to use the built-in Settings application.

From the Start menu, access the Settings application. Go to Network and Internet, and then select the kind of connection you have established from the left panel menu. If you’re physically connected to the network, select Ethernet, and if you’re using a wireless connection, select WiFi. Then, click on Network in the right panel. You can then switch between a Public network profile and a Private network profile.

Domain Networks
Alternatively, enterprise workplaces often leverage a third network profile - a domain network. Unlike the Private or Public profiles, only a network administrator can set its use, and it can only be applied while the device is in the workplace.

Want to know more about your network, or need more help managing it? Reach out to Network Solutions Unlimited at 217-428-6449.

Wireless Charging Just Got an Upgrade… But is That...
Could Your Router be Infected with Malware?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Office OneNote Colocation Printing Adobe Data Management Bandwidth Managed IT Service Automobile Business Instant Messaging Meetings Licensing Unified Threat Management Users Value Smartphones Email Best Practices Business Technology Consultant Health Amazon Managing Stress Congratulations Thank You Risk Management Sports Regulation IT budget Edge Android Office Tips Hackers Virtual Assistant Conferencing Computer Forensics Google Drive Video Games Battery How to Business Owner Gifts Emergency Chrome Phone System Solid State Drive Virtualization Data Privacy FAQ Content Filtering Compliance Hosted Solution eWaste Transportation Analysis Patch Management Wi-Fi Connectivity Management Avoiding Downtime Audiobook Spam Blocking Alert Computer Upgrade Smart Technology Charger Windows Phishing USB Encryption Windows 10 Customer Remote Monitoring Money Personal Information Wireless Technology Spam Upgrades Search Files Big Data Monitors Computer Fan Project Management App Update Ciminal Credit Cards Remote Computing Virus Microsoft Antivirus Mobile Security Screen Mirroring Humor Microsoft Word Hybrid Cloud Google Maps IT Support Websites Wireless Charging Government MSP Dark Web Technology Spyware Chromecast Proactive IT Hacking Legislation User Tips Word Innovation Keyboard Monitoring Unified Communications Hardware Internet of Things Professional Services Internet exploMicrosoft Employer-Employee Relationship Hiring/Firing WannaCry User Error Worker Travel Techology Sales Computer Accessories Chromebook Social Media Outsourced IT Flexibility Financial Technology Electronic Medical Records Redundancy Computer Care Bluetooth Network Security Settings Data Protection Collaboration Devices Productivity Software as a Service Employer Employee Relationship Audit Automation Virtual Reality Company Culture Education Windows Ink Small Business Backup Smartphone Content Scalability Facebook Computing Infrastructure Wasting Money Marketing Safety Root Cause Analysis Communications Business Intelligence IT Solutions Legal Saving Money Mobile Devices Tech Support Cybercrime Data Breach Privacy Gmail Quick Tips Workplace Tips Television Worker Commute Device Security Touchscreen Vendor Management Windows 10s Efficiency Identity Memory Bring Your Own Device Tablets Cloud Computing Google Information Going Green Identities Work/Life Balance Physical Security Communication Storage Unsupported Software Browser Business Management Budget Rootkit Managed IT Advertising Software Mobile Device Network Document Management Internet Exlporer Comparison HaaS SaaS Politics Excel Recovery Administration Business Computing Data Storage Mobile Device Management Smart Tech Productivity Managed Service Provider VoIP Wireless Internet Computers Best Practice Social Engineering App store Public Cloud Wireless Reputation How To Shortcut Business Continuity Data Loss Password Miscellaneous Windows 10 Computing Financial Experience Scam Students Two-factor Authentication Save Time Managed IT Services Samsung Commerce Specifications Two Factor Authentication BDR hacker Nanotechnology Training WIndows Server 2008 Laptop Shadow IT Proactive Gamification Webinar Networking End of Support Workers Save Money IT solutions Gadgets intranet iPhone Microsoft Excel Information Technology Retail Streaming Media HIPAA iOS Telephone Systems Hard Drives Passwords Alexa for Business Data Recovery Office 365 Blockchain Applications Benefits Cleaning Apple Hosted Solutions Augmented Reality Books Operating System Public Computer Microsoft Office PowerPoint Cybersecurity CrashOverride Disaster Recovery IT Support The Internet of Things WiFi VPN Outlook Hard Disk Drive Tech Term IT Management Black Market Downtime PDF Emails Apps Assessment Touchpad Law Enforcement Google Docs Lifestyle Entertainment Security Updates IoT History Application Monitor Loyalty File Sharing Identity Theft Private Cloud Sync Vulnerability Hard Drive Robot Cast Content Filter Data Security Data storage NFL IT Services Cloud Artificial Intelligence Cache Internet Data Backup Fraud Firewall Ransomware Google Assistant BYOD Server Managed IT Services Router Cost Management Data Theft Language Mobile Holiday Tip of the Week HBO Malware Data Evernote Maintenance Relocation Mobility Troubleshooting Twitter Cortana