Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Before we dive into this week’s tip, it has to be said: if you have a choice, you should probably avoid using a public computer. As a rule, these machines feature minimal security precautions, along with maximum risk to any data accessed by the PC. Although, if a situation ever arises in which you have no choice but to use a public computer, be sure to follow these security best practices.


Browse Privately
In the interest of a user’s convenience, most web browsers are configured to store informative things like browsing history, passwords, and downloads. On a private machine, these features can be pretty useful. However, if a public-access machine saves this data and you’re not careful, a stranger could access it and piece together your sensitive information.

Using a private browser helps to keep your personal browsing safe, even on a public computer. Private browsing is a function that’s built into many browsers that will erase any tracks you leave behind on the machine itself by wiping the local data. Although, be warned that private browsing only prevents the machine you are using from recalling what you accessed, but Internet providers, advertisers, and search engines still keep track of this information.

Make Use of a VPN
VPNs, or Virtual Private Networks, are great for private web browsing. Once you’ve logged in to your VPN, it shields your IP address and conceals your activity in a virtual tunnel, hidden under layers of encryption. Your identity and even your location are kept anonymous, thanks to the use of proxy servers the world over, protecting you from opportunistic attacks.

VPNs come in both free and reasonably-priced varieties. Additionally, if you plan on accessing your office network from an outside location using a VPN, it’s important to first setup your network so you can do this securely.

For more help securing your business assets in situations like this, as well as many other scenarios, give White Mountain IT Services a call at 603-889-0800.

Related Articles

  • Can You Spot the Signs of a Malicious Link? The Internet is notorious for being a minefield of threats, many of which lurk hidden behind innocent-looking links. In order to go about business safely, you need to be able to identify which links you can click; and, which should be skipped. Unfortunately, spotting fraudulent links isn’t an exact...
  • Is Your Password Security Up to Par? Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be gues...
  • At What Point Does a Service Become Spyware? Spyware, like other malware, is a problem for any organization. Since your business generates, collects, and uses considerable amounts of data, there are plenty of organizations that want to get their hands on it. You spend so much time and money protecting your data against threats on the Internet,...
  • Tip of the Week: Are You at Risk Due to the IoT? The Internet of Things is now a commonality. IoT devices are in our homes, in our offices, and in our pockets. While these devices are incredibly convenient, they also contribute to some major security risks. For today’s tip, we’ll review some of the ways to reduce these risks while still leveraging...
  • Tip of the Week: Did You Know Your Computer Can Do All This? Your computer is mostly just a machine used to accomplish specific tasks. This doesn’t mean that you shouldn’t know all of the advanced tips that help you get the most out of it, though. Here are some of the best shortcuts that you can use to take full advantage of your workstation. WindowsYour Win...
  • Tip of the Week: How To Put A Table Of Contents In A Google ... If you author a long document, having a table of contents can help your readers get the information they need fast. Here is how to insert a table of contents into a Google Doc. In order to use the Table of Contents feature, you need utilize the preset heading and title formatting option. This can b...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions