Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Network Profile?
Each time a Windows 10 device connects to a new network, it will ask the user if it should be able to be discovered by other devices on that network. Selecting “Yes” will set your network profile to Private, and selecting “No” will set it to Public.

The Private and Public settings are referring to the kind of network your device is connecting to, and what level of security your individual device is responsible for. If you are connected to your company’s network, with all its protections and other users with whom you need to collaborate, the “Private” network setting is the one you want to use. However, if you’re using your device in a public setting, on a network that is “Public”-ally accessible, you don’t want any Tom, Dick, or Harry Hacker to be able to connect to you.

Switching the Network Profile
Windows 10 offers a few different methods of switching the network profile that a device uses. One way is to use the built-in Settings application.

From the Start menu, access the Settings application. Go to Network and Internet, and then select the kind of connection you have established from the left panel menu. If you’re physically connected to the network, select Ethernet, and if you’re using a wireless connection, select WiFi. Then, click on Network in the right panel. You can then switch between a Public network profile and a Private network profile.

Domain Networks
Alternatively, enterprise workplaces often leverage a third network profile - a domain network. Unlike the Private or Public profiles, only a network administrator can set its use, and it can only be applied while the device is in the workplace.

Want to know more about your network, or need more help managing it? Reach out to Network Solutions Unlimited at 217-428-6449.

Wireless Charging Just Got an Upgrade… But is That...
Could Your Router be Infected with Malware?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 25 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Connectivity Augmented Reality Managed IT Chromecast Reputation IT Services Office 365 Health Wireless Compliance Artificial Intelligence Security Alexa for Business Law Enforcement Virtualization Financial Technology VoIP Data Backup Spam Telephone Systems Content Filter How To Data storage Employer Employee Relationship Financial Computer Forensics Tech Term Best Practices Phone System Two-factor Authentication Bluetooth Efficiency Computer Accessories Training Hybrid Cloud NFL Audit Technology OneNote Computer Fan Users Outlook Shadow IT Monitoring WPA3 Password Excel Shortcut Congratulations Saving Money Laptop Proactive Windows 10 Network Security Audiobook Hardware Mobile Books Gadgets Lifestyle Cache Projects IT Support Ransomware Identity Emergency Government Business Continuity Managed IT Services Hiring/Firing Keyboard Fraud Cast Two Factor Authentication IoT Software as a Service Automobile Unsupported Software Legislation Managed IT Service Webinar Social Media The Internet of Things Social Engineering Data Management Unified Threat Management USB intranet Hard Drive Education Router Humor Information Data Privacy Thank You Credit Cards Identity Theft Wireless Charging Facebook Document Management Google Drive Recovery Conferencing Chrome Updates Network Wireless Internet Smart Tech Relocation Tip of the Week Business Computing Specifications Flexibility Productivity Scam Communication Backup Android Business Management Electronic Medical Records Business Owner Legal MSP Mobile Security Smart Technology App Personal Information Commerce Black Market Benefits Printing Networking Data Storage Screen Mirroring Firewall Mobile Device Management Data Loss Update Unified Communications Patch Management Mobile Devices Save Money Employer-Employee Relationship Public Cloud BYOD Cloud Computing Adobe Managing Stress Evernote iOS Safety Software Public Computer Mobility Worker Commute Hacking Worker Apple Wi-Fi Data Security Smartphone Administration Data Transportation Word Analysis Consultant Files Risk Management Internet of Things Professional Services Troubleshooting Upgrades Ciminal Business Intelligence Travel Samsung WiFi Touchpad Chromebook Data Recovery Computing Managed IT Services HIPAA Cortana Cybercrime Remote Computing Retail Money User Error Internet Mobile Device Communications Video Games Employee-Employer Relationship Testing WIndows Server 2008 Maintenance Malware Business App store Windows 10 Streaming Media FAQ Alert Meetings Root Cause Analysis File Storage Cybersecurity Wireless Technology Computer Care Google Maps Licensing IT Management End of Support Microsoft Excel Tech Support Politics File Sharing Office Save Time Computers Physical Security Managed Service Provider Proactive IT Colocation Workplace Tips Antivirus Microsoft Word Management Regulation Information Technology Amazon IT Support Server Websites Monitors Comparison Holiday Quick Tips IT budget Hosted Solutions Bandwidth Value Google Assistant Hard Disk Drive Tablets Edge Internet exploMicrosoft Television Productivity Downtime Microsoft Nanotechnology VPN eWaste Upgrade Phishing CrashOverride Storage Instant Messaging Hackers Virtual Assistant Browser Device Security Workers Operating System Avoiding Downtime Search Big Data Gifts Spyware IT solutions Bring Your Own Device How to Sync Encryption Robot Gmail BDR Microsoft Office Google Docs Private Cloud iPhone Wasting Money Innovation Marketing Managed Service Application Miscellaneous Students Camera Automation Virtual Reality Customer Scalability Small Business Project Management Settings Going Green Identities Rootkit Content Advertising IT Solutions Devices Smartphones Remote Monitoring Budget Apps Cleaning Entertainment Data Breach Company Culture Blockchain Sports Printers Monitor Hosted Solution Emails Best Practice Privacy Memory WannaCry History Outsourced IT Vulnerability Internet Exlporer Google Spam Blocking HBO Dark Web Cloud Data Theft Vendor Passwords Techology Experience Content Filtering Gamification Assessment Redundancy Solid State Drive Windows Ink hacker Computing Infrastructure Sales Twitter Language Data Protection Hard Drives Charger Office Tips Touchscreen PowerPoint Collaboration User Tips SaaS Loyalty Computer Business Technology Email Windows Battery Virus Work/Life Balance Windows 10s Cost Management Disaster Recovery HaaS Applications Vendor Management PDF