Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Before we dive into this week’s tip, it has to be said: if you have a choice, you should probably avoid using a public computer. As a rule, these machines feature minimal security precautions, along with maximum risk to any data accessed by the PC. Although, if a situation ever arises in which you have no choice but to use a public computer, be sure to follow these security best practices.


Browse Privately
In the interest of a user’s convenience, most web browsers are configured to store informative things like browsing history, passwords, and downloads. On a private machine, these features can be pretty useful. However, if a public-access machine saves this data and you’re not careful, a stranger could access it and piece together your sensitive information.

Using a private browser helps to keep your personal browsing safe, even on a public computer. Private browsing is a function that’s built into many browsers that will erase any tracks you leave behind on the machine itself by wiping the local data. Although, be warned that private browsing only prevents the machine you are using from recalling what you accessed, but Internet providers, advertisers, and search engines still keep track of this information.

Make Use of a VPN
VPNs, or Virtual Private Networks, are great for private web browsing. Once you’ve logged in to your VPN, it shields your IP address and conceals your activity in a virtual tunnel, hidden under layers of encryption. Your identity and even your location are kept anonymous, thanks to the use of proxy servers the world over, protecting you from opportunistic attacks.

VPNs come in both free and reasonably-priced varieties. Additionally, if you plan on accessing your office network from an outside location using a VPN, it’s important to first setup your network so you can do this securely.

For more help securing your business assets in situations like this, as well as many other scenarios, give White Mountain IT Services a call at 603-889-0800.

Related Articles

  • Tip of the Week: 2 Easy Ways You Can Minimize Network Securi... Security issues can have any number of causes, meaning that every business needs to have a comprehensive security solution. This doesn’t mean, however, that there aren’t additional, small measures to implement that can give your organization’s security an added boost. Here, we’ll talk about two: kee...
  • Tip of the Week: How Using an Inconspicuous SSID for Your Wi... When you turn on your device’s Wi-Fi capabilities, do you ever take the time to look at some of the names of your neighbors’ connections? You’ll see some rather boring names as well; some might just use the name of their organization or the family’s name, or even just the default SSID used by the ro...
  • A New Concept Might Take Reverse-Engineering to the Next Lev... Even the most innocent Internet user can fall victim to the stray hacking attack, and it’s all thanks to the manner in which malware reverse-engineers software. This process is how a hacker finds vulnerabilities in software. However, a new security concept might be able to protect software from the ...
  • A Simple Guide to Understanding HIPAA Security has never been easy for any business that deals with sensitive information. Nowadays, even a small business that uses an Internet connection has to worry about hackers and malware of all types. This is especially problematic for small healthcare offices that need to keep sensitive informati...
  • Alert: Users of 7-Zip Should Immediately Upgrade to the Late... One of the latest vulnerabilities in open-source software can be found in 7zip, a file archiver and decompresser. 7zip has been found to have several security vulnerabilities which have software developers rushing to fix their products. The damage done extends far beyond 7zip, reaching both people w...
  • How Your Business Can Benefit From a Virtual Private Network Most of your business’ technology is a direct result of your need to quickly and securely disseminate information. While there are solutions meant to improve efficiency peppered in there, the vast majority of IT solutions are designed to create, share, or protect information. On today’s Internet the...
Before we dive into this week’s tip, it has to be said: if you have a choice, you should probably avoid using a public computer. As a rule, these machines feature minimal security precautions, along with maximum risk to any data accessed by the PC. A...

- Security Education and Awareness -

FREE Cyber Security Toolkit includes Whitepapers, Tools and More!

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

cloud desktop2 Cloud Desktop Login

 

Open Positions