Contact us today!

FRS Pros Blog

The Chrome Browser is Redefining Your Security

The Chrome Browser is Redefining Your Security

When you are surfing the web, do you know if you are secure? Typically, your browser will tell you when a site is secure or not. This is especially important if you are putting in sensitive information, like passwords or credit card information. Google Chrome is stepping up it’s game to keep users safe.

How Chrome is Shaking Up the Conventional Advice
There are two major types of websites out there, HTTP and HTTPS. The primary difference between them is that the one with the S at the end signifies that the data was sent through a secure connection, meaning that there are extra layers of security there to shield it from any prying eyes. It’s been a best practice for a long time to make sure that any sensitive data sent to or from a website utilizes a secure connection. This is done by looking for the padlock icons in the address bar.

Google is finally stepping up its game by labeling businesses that don’t encrypt their communications with their host server. Chrome will notify users when they are surfing a site that isn’t using HTTPS. The idea is that this is supposed to put the pressure on websites that have yet to adopt HTTPS. Since Chrome is the most popular web browser, it makes sense that this approach could spark a revolution in website security. So far, the approach is seen as ideal by security professionals.

What Are Other Browsers Doing?
The other major web browsers, Safari, Firefox, and Edge, also have some plans for how they will handle unencrypted websites in the future. However, not all of them plan on flipping the script in such a dramatic way.

  • Firefox: It’s likely that Firefox will follow a similar path to Google Chrome. Firefox is still subscribing to the “confirming the page is secure” method. Firefox will also tell you whether or not the HTTP page contains a login form with a padlock that is stricken through. There is even a warning that pops up when the cursor moves over any of these fields. In the future, the browser will display all HTTP pages with the strike-through padlock, even if there aren’t any forms.
  • Safari: Apple has yet to deviate from tradition. By this, we mean that the browser just confirms that the connection is secured by showing the lock. However, Apple has taken other, different steps toward ensuring the security of its users. If a user attempts to log into an HTTP page, the page will inform them with alerts popping up into the field and the address bar, much like Firefox does now.
  • Edge: Microsoft Edge only tells a user when a page is protected, but there are other options in place that allow the user to access even more information about their connection. This information can reveal if the connection isn’t encrypted, identifying it a potential risk. This same feature doesn’t extend to the input fields on unencrypted pages, though. We don’t feel like Edge is doing enough to warn users about unsafe browsing.

Are you unsure of how to keep your business secure? Reach out to FRS Pros at 561-795-2000.

In Business, What’s the Differences Between Intell...
Getting to Know Technology: Username


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, October 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Internet Privacy Network Security Google Business Management Tech Term Business Computing Cloud Software User Tips Hackers Hardware Browser Computer Malware Cybersecurity Windows Efficiency Microsoft Mobile Devices Data Backup Hosted Solutions Smartphone Productivity Innovation Cybercrime Apps Data Security Outsourced IT IT Services Operating System Smartphones Internet of Things Windows 10 Android Data Recovery Email Backup Business Continuity Phishing IT Support Upgrade Data Money Business VoIP Alert Mobile Device Management Office 365 Law Enforcement Ransomware Vulnerability Collaboration Network Chrome Saving Money IT Support Managed IT Services Server Communications Microsoft Office Disaster Recovery Best Practice Information Small Business Employer-Employee Relationship Router Applications Windows 10 Google Drive Computers Managed Service Provider Virtualization Managed IT Unsupported Software Information Technology Telephone Systems App Passwords Tech Support Cloud Computing Spam Gadgets Blockchain Two-factor Authentication Managed Service Automation Risk Management Password Facebook Touchscreen Data Storage User Error Mobile Security Bring Your Own Device WiFi Quick Tips Hacking Mobile Device OneNote Wi-Fi Update Hosted Solution Cortana Google Assistant Gmail Networking Audit Shortcut Politics Avoiding Downtime Save Money Data Protection Workplace Tips BDR Budget Google Docs Project Management Patch Management Wireless Charging Communication Users Cost Management Managed IT Services Artificial Intelligence Wireless Technology Devices Government Augmented Reality Data Management WannaCry Application Data Breach Commerce Robot Productivity Safety Miscellaneous Sports Travel The Internet of Things Social Media Excel Proactive IT VPN iPhone SaaS Holiday Fraud IT solutions Emergency Reputation Internet Exlporer Sales Proactive Management Tablets Maintenance Storage Social Engineering Printing Telephone Point of Sale Data storage Sync Evernote History Edge Projects iOS WIndows Server 2008 Remote Computing Health Uninterrupted Power Supply FAQ Vendor Windows 10s HBO Retail Websites PowerPoint Identity Theft NFL eWaste Wireless Identities Computer Care Hyperlink Nanotechnology Settings Screen Mirroring Data Loss Ciminal Identity Search Charger Hybrid Cloud Unified Threat Management Mobility Employee-Employer Relationship Solid State Drive Transportation DDoS Conferencing Data Theft Wireless Internet Meetings Laptop Vendor Management Files Word Device Security Private Cloud Recovery Legislation Language Value Root Cause Analysis Scam Disaster Adobe Workers Emails Cast Data Privacy Windows 7 Computer Fan Amazon Upgrades Business Technology Hard Disk Drive IT Management Going Green Social Gifts Computing Gamification Touchpad Samsung Windows Ink BYOD Administrator Comparison Licensing Updates Software as a Service Marketing Streaming Media Microsoft Excel IT budget Hard Drive Display Lithium-ion battery Outlook Virtual Assistant Legal Testing IT Solutions Encryption Credit Cards App store Memory Antivirus Humor Google Maps Spyware Bandwidth Webinar Access Specifications Virus Computer Forensics Microsoft Word Chromecast File Sharing Chromebook Co-Managed Services Alexa for Business Consultant Camera Telephony Financial Remote Monitoring Apple Television CrashOverride PDF Mobile Computing Company Culture Scalability Analytics Keyboard Entertainment Black Market Cleaning Text Messaging Big Data Automobile Office Compliance Printers Managing Stress USB Worker Office tips How To Books Wasting Time Advertising Regulation Education Hiring/Firing Video Games Experience Virtual Reality Work/Life Balance Current Events Electronic Medical Records Twitter Accessory Crowdsourcing Employer Employee Relationship Benefits End of Support Phone System HaaS Save Time Relocation Thank You Cache Peripheral Computer Accessories Training Monitors Battery Smart Technology es Flexibility Music Personal Information Instant Messaging Hacker Congratulations