Contact us today!

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Network Profile?
Each time a Windows 10 device connects to a new network, it will ask the user if it should be able to be discovered by other devices on that network. Selecting “Yes” will set your network profile to Private, and selecting “No” will set it to Public.

The Private and Public settings are referring to the kind of network your device is connecting to, and what level of security your individual device is responsible for. If you are connected to your company’s network, with all its protections and other users with whom you need to collaborate, the “Private” network setting is the one you want to use. However, if you’re using your device in a public setting, on a network that is “Public”-ally accessible, you don’t want any Tom, Dick, or Harry Hacker to be able to connect to you.

Switching the Network Profile
Windows 10 offers a few different methods of switching the network profile that a device uses. One way is to use the built-in Settings application.

From the Start menu, access the Settings application. Go to Network and Internet, and then select the kind of connection you have established from the left panel menu. If you’re physically connected to the network, select Ethernet, and if you’re using a wireless connection, select WiFi. Then, click on Network in the right panel. You can then switch between a Public network profile and a Private network profile.

Domain Networks
Alternatively, enterprise workplaces often leverage a third network profile - a domain network. Unlike the Private or Public profiles, only a network administrator can set its use, and it can only be applied while the device is in the workplace.

Want to know more about your network, or need more help managing it? Reach out to FRS Pros at 561-795-2000.

Wireless Charging Just Got an Upgrade… But is That...
Could Your Router be Infected with Malware?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 17 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Business Management Business Computing Software Cloud Network Security Google Tech Term Hackers Hardware Cybersecurity Malware Windows User Tips Microsoft Computer Hosted Solutions Mobile Devices Cybercrime Data Backup Data Recovery Innovation Data Security Browser Apps Productivity Operating System Smartphone Android Backup Vulnerability Business Continuity Office 365 Money Email Alert Phishing Outsourced IT Efficiency Law Enforcement Ransomware Internet of Things Mobile Device Management Chrome IT Services Business Saving Money Network Smartphones Managed IT Services IT Support Disaster Recovery Server IT Support Best Practice App Windows 10 Google Drive Cloud Computing Spam Small Business Blockchain Data Two-factor Authentication Windows 10 Collaboration Microsoft Office Computers Virtualization Information Technology VoIP Managed Service Provider Telephone Systems Managed IT Tech Support Gadgets Unsupported Software Employer-Employee Relationship Router Communications Applications Data Breach Automation Quick Tips Password Hosted Solution Avoiding Downtime Travel Proactive IT Excel Hacking Application Fraud Gmail Save Money Safety Data Storage Artificial Intelligence WiFi Upgrade OneNote Government User Error Holiday Risk Management Audit Networking Robot Cortana Wireless Technology Miscellaneous Data Management Data Protection Social Media Wi-Fi The Internet of Things Update VPN iPhone Productivity Patch Management Wireless Charging Cost Management Managed IT Services Shortcut Google Docs Sports Politics Mobile Security Facebook Devices WannaCry Google Assistant BDR Commerce Identity Outlook Internet Exlporer Hybrid Cloud Microsoft Excel IT budget IT Solutions Settings Credit Cards App store Wireless Internet Wireless Google Maps Spyware Webinar Samsung Virus Value Mobility Microsoft Word Uninterrupted Power Supply Consultant Search Specifications Legal Data Privacy Laptop SaaS Remote Monitoring Amazon Transportation File Sharing Encryption Gamification Private Cloud Apple IT solutions Antivirus Sales Proactive Tablets Maintenance Touchscreen iOS WIndows Server 2008 Hard Drive Touchpad Sync Evernote DDoS Virtual Assistant Going Green Social Storage Social Engineering Files FAQ Recovery Memory Edge Disaster Windows 10s HBO Retail Websites Budget Computer Care Nanotechnology Emergency Computer Forensics NFL eWaste Screen Mirroring Chromebook Humor Passwords Unified Threat Management Point of Sale Alexa for Business Identities Charger Administrator Meetings Financial Data Loss Ciminal Solid State Drive Conferencing Data Theft Streaming Media Root Cause Analysis Management Word Device Security Lithium-ion battery Emails Cast Identity Theft Computer Fan Printing Adobe Workers Upgrades Legislation Language Access Bring Your Own Device Reputation Project Management Hard Disk Drive IT Management Data storage Gifts Computing Chromecast Augmented Reality PowerPoint History Windows Ink Marketing BYOD Vendor Management Licensing Updates Telephony Remote Computing Health Comparison Text Messaging Education Cache Hiring/Firing Video Games Experience Virtual Reality Users Work/Life Balance Training Current Events Monitors Electronic Medical Records Crowdsourcing Employer Employee Relationship Phone System Office tips es Benefits Advertising Television CrashOverride Save Time Company Culture Twitter Communication Computer Accessories Flexibility Music Battery Smart Technology Mobile Device Instant Messaging Hacker HaaS End of Support Scalability Analytics Relocation Keyboard Entertainment Black Market Cleaning Personal Information Big Data Thank You Automobile Office PDF Managing Stress USB Worker Mobile Computing Workplace Tips How To Books Congratulations Scam