Contact us today!  830-515-4565

BusinessTechPros Blog

Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Before we dive into this week’s tip, it has to be said: if you have a choice, you should probably avoid using a public computer. As a rule, these machines feature minimal security precautions, along with maximum risk to any data accessed by the PC. Although, if a situation ever arises in which you have no choice but to use a public computer, be sure to follow these security best practices.

Browse Privately
In the interest of a user’s convenience, most web browsers are configured to store informative things like browsing history, passwords, and downloads. On a private machine, these features can be pretty useful. However, if a public-access machine saves this data and you’re not careful, a stranger could access it and piece together your sensitive information.

Using a private browser helps to keep your personal browsing safe, even on a public computer. Private browsing is a function that’s built into many browsers that will erase any tracks you leave behind on the machine itself by wiping the local data. Although, be warned that private browsing only prevents the machine you are using from recalling what you accessed, but Internet providers, advertisers, and search engines still keep track of this information.

Make Use of a VPN
VPNs, or Virtual Private Networks, are great for private web browsing. Once you’ve logged in to your VPN, it shields your IP address and conceals your activity in a virtual tunnel, hidden under layers of encryption. Your identity and even your location are kept anonymous, thanks to the use of proxy servers the world over, protecting you from opportunistic attacks.

VPNs come in both free and reasonably-priced varieties. Additionally, if you plan on accessing your office network from an outside location using a VPN, it’s important to first setup your network so you can do this securely.

For more help securing your business assets in situations like this, as well as many other scenarios, give BusinessTechPros a call at 830-515-4565.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17, 2019

Captcha Image

Sign Up for Our Newsletter

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Tag Cloud

Security Tip of the Week Privacy Technology Cloud Business Computing Hackers Backup Best Practices Malware Hosted Solutions Business Continuity Hardware Managed IT Services Save Money Internet VoIP Software Network Security Innovation Windows 10 Computer Microsoft Disaster Recovery IT Services Windows IT Support Business Outsourced IT Google Recovery Mobility Hacking Cybercrime Automation Telephone Systems Apps Business Management Data Saving Money Managed IT Computers Upgrade Operating System Quick Tips Server Smartphone BYOD Applications Ransomware Private Cloud Telephony Firewall Browser Wireless Technology BDR Data Management Mobile Device Management User Tips communications Best Practice Budget Information Technology Productivity Miscellaneous Robot SaaS Avoiding Downtime Cybersecurity Gadgets Android VPN Law Enforcement Access Alert Document Management Social Engineering Unified Threat Management Chromecast Network Office Data storage Colocation HIPAA Search Remote Computing Reputation Television Gmail Save Time Samsung Google Drive Small Business Unsupported Software DDoS Hacker Mobile Device Proactive IT Laptop Audit Chrome IT Technicians Files Transportation History Disaster Office tips Risk Management Upgrades Uninterrupted Power Supply Battery Email Relocation Cost Management Touchpad Virtualization Compliance Social Going Green Hosted Solution Safety Hard Drives iPhone App Humor Tech Support Passwords Wireless Mobile Computing Lithium-ion battery Government Sports Value Emergency Administrator Internet of Things Solid State Drive Automobile Microsoft Office Health WiFi Streaming Media Employer-Employee Relationship Internet Exlporer Facebook Productivity The Internet of Things Administration Mobile Devices Video Games Managed Service Provider HaaS Password Saving Time How To Analytics Cleaning Data Backup PDF Vendor Management Congratulations Advertising Education Legal Virtual Reality Benefits Communication Wi-Fi Current Events Big Data Worker Text Messaging Content Filtering Smartphones Application Scam Politics Money Encryption Personal Information Workplace Tips Office 365 Books Users Training Experience Electronic Medical Records Employer Employee Relationship Flexibility End of Support Instant Messaging Avoid Downtime Antivirus Black Market Keyboard Artificial Intelligence Identity Theft Company Culture Scalability Phone System Regulation Point of Sale Computer Accessories Social Media Efficiency Smart Technology Holiday Shadow IT Shortcut Router Worker Commute Update Music Managed IT Services Thank You Managing Stress Entertainment USB Hiring/Firing Work/Life Balance

Top Blog

BusinessTechPros Blog
Don't be Afraid to ReplaceGot an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy workst...

Mobile? Grab this Article!