Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Network Profile?
Each time a Windows 10 device connects to a new network, it will ask the user if it should be able to be discovered by other devices on that network. Selecting “Yes” will set your network profile to Private, and selecting “No” will set it to Public.

The Private and Public settings are referring to the kind of network your device is connecting to, and what level of security your individual device is responsible for. If you are connected to your company’s network, with all its protections and other users with whom you need to collaborate, the “Private” network setting is the one you want to use. However, if you’re using your device in a public setting, on a network that is “Public”-ally accessible, you don’t want any Tom, Dick, or Harry Hacker to be able to connect to you.

Switching the Network Profile
Windows 10 offers a few different methods of switching the network profile that a device uses. One way is to use the built-in Settings application.

From the Start menu, access the Settings application. Go to Network and Internet, and then select the kind of connection you have established from the left panel menu. If you’re physically connected to the network, select Ethernet, and if you’re using a wireless connection, select WiFi. Then, click on Network in the right panel. You can then switch between a Public network profile and a Private network profile.

Domain Networks
Alternatively, enterprise workplaces often leverage a third network profile - a domain network. Unlike the Private or Public profiles, only a network administrator can set its use, and it can only be applied while the device is in the workplace.

Want to know more about your network, or need more help managing it? Reach out to FRS Pros at 561-795-2000.

Wireless Charging Just Got an Upgrade… But is That...
Could Your Router be Infected with Malware?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Management Tech Term Business Computing Google Cloud Software Hackers User Tips Malware Hardware Computer Mobile Devices Windows Cybersecurity Microsoft Hosted Solutions Efficiency Data Backup Smartphone Innovation Cybercrime Productivity Browser Apps Internet of Things Android Data Recovery Data Security Smartphones Operating System Phishing Law Enforcement Outsourced IT Ransomware Office 365 Backup Email Mobile Device Management Business Continuity Data Vulnerability Money Business Alert IT Support Disaster Recovery Best Practice Microsoft Office Windows 10 Chrome Saving Money IT Services Collaboration IT Support VoIP Network Managed IT Services Server Telephone Systems Tech Support Gadgets Managed Service Provider Managed IT Unsupported Software Employer-Employee Relationship Router Small Business Communications Applications App Google Drive Cloud Computing Spam Blockchain Windows 10 Two-factor Authentication Computers Upgrade Information Virtualization Information Technology Robot Passwords BDR Miscellaneous Productivity Audit The Internet of Things Social Media Users Sports Data Protection VPN Patch Management iPhone Wireless Charging Google Docs Devices Application Automation Cost Management Managed IT Services Facebook Password Augmented Reality Data Breach Safety Quick Tips Commerce WannaCry Holiday Hacking Travel Hosted Solution Excel Gmail Avoiding Downtime Risk Management Fraud Save Money Managed Service SaaS Proactive IT Communication Wi-Fi Update Mobile Security Data Storage User Error Artificial Intelligence Budget Bring Your Own Device Politics WiFi Shortcut Wireless Technology Government Mobile Device OneNote Networking Data Management Google Assistant Cortana Computer Care Nanotechnology Charger Lithium-ion battery Identity Humor Screen Mirroring Data Loss Ciminal Streaming Media Hybrid Cloud Employee-Employer Relationship Unified Threat Management Word Device Security Wireless Internet Conferencing Data Theft Access Meetings Adobe Workers Value Solid State Drive Legislation Language Samsung Amazon Root Cause Analysis Data Privacy Emails Cast Project Management Chromecast Computing Legal Telephony Business Technology Upgrades Windows Ink Gamification Computer Fan Reputation Gifts Internet Exlporer Software as a Service Data storage Licensing Updates Encryption Hard Disk Drive History IT Management Comparison Antivirus Virtual Assistant Remote Computing Outlook Health Hard Drive Marketing BYOD Microsoft Excel IT budget Credit Cards App store Uninterrupted Power Supply Testing Google Maps Spyware Memory Bandwidth Settings Microsoft Word Computer Forensics IT Solutions Specifications Wireless Virus Alexa for Business Search Emergency Chromebook Webinar File Sharing Mobility Transportation Camera Consultant Laptop Apple Point of Sale Financial DDoS Remote Monitoring Tablets Maintenance Files Management Private Cloud Sales Proactive Recovery Sync Evernote Disaster Printing IT solutions Storage Social Engineering Identity Theft Going Green Social FAQ Projects Touchscreen Touchpad Edge Vendor NFL eWaste PowerPoint iOS WIndows Server 2008 Retail Websites Administrator Windows 10s HBO Identities Workplace Tips Vendor Management Relocation How To Books Printers Scam Video Games Experience Thank You Education Hiring/Firing Regulation Virtual Reality Personal Information Work/Life Balance Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Phone System Congratulations PDF Benefits Save Time Twitter Mobile Computing Computer Accessories Flexibility Music Text Messaging Battery Smart Technology Cache Instant Messaging Hacker es Monitors Scalability Analytics Office tips Training Entertainment Advertising Keyboard Television CrashOverride Black Market Cleaning Company Culture Big Data Automobile Office Managing Stress Compliance End of Support USB Worker HaaS