Contact us today!  830-515-4565

BusinessTechPros Blog

2 minutes reading time (325 words)

Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Before we dive into this week’s tip, it has to be said: if you have a choice, you should probably avoid using a public computer. As a rule, these machines feature minimal security precautions, along with maximum risk to any data accessed by the PC. Although, if a situation ever arises in which you have no choice but to use a public computer, be sure to follow these security best practices.

Browse Privately
In the interest of a user’s convenience, most web browsers are configured to store informative things like browsing history, passwords, and downloads. On a private machine, these features can be pretty useful. However, if a public-access machine saves this data and you’re not careful, a stranger could access it and piece together your sensitive information.

Using a private browser helps to keep your personal browsing safe, even on a public computer. Private browsing is a function that’s built into many browsers that will erase any tracks you leave behind on the machine itself by wiping the local data. Although, be warned that private browsing only prevents the machine you are using from recalling what you accessed, but Internet providers, advertisers, and search engines still keep track of this information.

Make Use of a VPN
VPNs, or Virtual Private Networks, are great for private web browsing. Once you’ve logged in to your VPN, it shields your IP address and conceals your activity in a virtual tunnel, hidden under layers of encryption. Your identity and even your location are kept anonymous, thanks to the use of proxy servers the world over, protecting you from opportunistic attacks.

VPNs come in both free and reasonably-priced varieties. Additionally, if you plan on accessing your office network from an outside location using a VPN, it’s important to first setup your network so you can do this securely.

For more help securing your business assets in situations like this, as well as many other scenarios, give BusinessTechPros a call at 830-515-4565.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 25, 2019

Captcha Image

Sign Up for Our Newsletter

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Tag Cloud

Security Tip of the Week Privacy Technology Cloud Business Computing Hackers Backup Best Practices Malware Business Continuity Hosted Solutions Hardware Save Money Internet Managed IT Services Windows 10 Innovation Computer Microsoft Disaster Recovery VoIP Software Network Security Google Mobility Recovery IT Services Outsourced IT Business Windows IT Support Managed IT Telephone Systems Apps Quick Tips Upgrade Saving Money Computers Operating System Server Smartphone Automation Business Management Hacking Data Cybercrime Browser Private Cloud Mobile Device Management User Tips Telephony Firewall communications Information Technology Budget Miscellaneous Wireless Technology Robot BDR Data Management Avoiding Downtime Best Practice Productivity VPN Law Enforcement SaaS Gadgets Applications Cybersecurity Android Ransomware BYOD Television Email Relocation Gmail Small Business Social DDoS Touchpad Samsung Unsupported Software Hard Drives IT Technicians Files Going Green Hosted Solution Mobile Device iPhone Disaster Audit Wireless Passwords Uninterrupted Power Supply Humor Virtualization Upgrades Mobile Computing Solid State Drive Automobile Government Cost Management Microsoft Office Health Facebook Compliance Administrator Video Games The Internet of Things Administration Streaming Media Employer-Employee Relationship Tech Support Safety Managed Service Provider Document Management HIPAA Lithium-ion battery App Social Engineering Sports Access Alert Value Data storage Colocation Search Internet of Things Chromecast Network Reputation Internet Exlporer Emergency Save Time Mobile Devices Remote Computing WiFi Google Drive HaaS Password Productivity Saving Time Hacker Chrome Proactive IT Laptop Office tips Risk Management Unified Threat Management Battery Office Transportation History End of Support Instant Messaging Benefits Avoid Downtime Antivirus Black Market Worker Artificial Intelligence Identity Theft Scalability Phone System Content Filtering Point of Sale Scam Social Media Efficiency Holiday Training Shadow IT Users Router Worker Commute Update Music Electronic Medical Records Employer Employee Relationship Entertainment Managing Stress Company Culture USB Keyboard Work/Life Balance How To Analytics Regulation PDF Computer Accessories Legal Advertising Education Smart Technology Virtual Reality Shortcut Communication Wi-Fi Thank You Current Events Big Data Managed IT Services Text Messaging Politics Smartphones Application Money Encryption Hiring/Firing Personal Information Workplace Tips Congratulations Office 365 Books Cleaning Data Backup Vendor Management Flexibility Experience

Top Blog

BusinessTechPros Blog
Don't be Afraid to ReplaceGot an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy workst...

Mobile? Grab this Article!

QR-Code