What is HTTPS Encryption and Why is it Important for Your Business?

What is HTTPS Encryption and Why is it Important for Your Business?

Encryption has become a very important part of maintaining an acceptable standard of security while browsing the web and storing data. Large enterprises and organizations have been using encryption for a long time, and even the average consumer uses encryption each and every time an online purchase is made. Did you know that the protection afforded users by encryption is made possible thanks to security certificates?


Websites that have security certificates take advantage of HTTPS, which stands for Hypertext Transfer Protocol with an S at the end for security. These certificates are used to provide security for a website’s visitor. Ordinarily, when a user plugs data into a form, like an email address or Social Security number, this data wouldn’t be protected while in transit. However, thanks to most organizations that collect this type of data now having security certificates on their websites, your data is safe. For examples of how HTTPS is used, look no further than banking websites or just about any online retailer like Amazon or eBay.

A great way to describe online encryption is by comparing it to a pipe. With a normal HTTP connection, your data is traveling through a transparent pipe. Anyone looking at it from the outside can see that which flows through it. Hackers can spy on it and steal data while it’s moving from one location to the next. If you’re using an HTTPS connection, however, the pipe has more of an opaque tint to it. While you can still see the insides, it’s unclear what is traveling through it and very difficult to get a clear glimpse of it. This is why it’s so difficult for hackers to take advantage of encrypted data. They might have the data, but it’s often so jumbled and difficult to piece together that it’s not worth the effort, or impossible, to decipher it.

While you can’t expect your employees to understand the finer details of how HTTPS works, you can expect them to understand online security best practices--especially those which pertain to keeping credentials like passwords and usernames secure. Make sure that your employees know not to input sensitive data into websites without first checking for these security identifiers.

Make Sure It Has a Security Certificate
Before plugging in a password or sensitive credential to a website, make sure that it’s protected by a security certificate. To find out if it’s equipped with one, look for a green padlock icon that appears next to the URL’s name in the address bar. Granted, even if it has a security certificate, you want to check which type of encryption it’s using, as there is a significant difference between SSL and TLS. For example, SSL is vulnerable to threats like POODLE (a man-in-the-middle exploit), making TLS a more desirable protection.

Be Wary of Suspicious URLs and Domains
Hackers will often create fake sites that are designed to mimic a reputable organization’s own website, only it will be designed to harvest credentials. These sites might have misspellings in the domain name, or numbers in the place of letters to make it look as legitimate as possible. Before plugging in your credentials, make sure that you’re actually looking at the organization’s website. Be sure to check the domain and cross-reference it with the information that you have on file.

For more great ways to keep yourself safe online, reach out to White Mountain IT Services today at 603-889-0800.

Related Articles

  • Scammers and Skimmers Are a Bad Combination Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering t...
  • Your Employees Can Be One Of Your Biggest Security Risks A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when t...
  • Why You Should Pay Attention to Data Security Notifications If you’ve watched the news lately, chances are you’ve seen the Equifax breach and the ridiculous fallout it has caused. Over 133 million personal records have been stolen. While it’s difficult not to feel individually victimized by such a breach, it’s important to remember that it’s often not your s...
  • Hackers May Meet Their Match With AI There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. ...
  • Major Cyber Threats Are Less Of A Worry With Professional He... There are dozens of surveys and reports produced each year that evaluate digital threats and cybercrime. Not every publication applies to every business - but many of them do have some important take aways about the best practices of handling IT. Here’s few highlights from the 2017 Cyberthreat Defen...
  • Your State Dictates Data Security Notifications… Will You Be... In the last few months, there have been several high-profile data security breaches that resulted in the theft of millions upon millions of non-public information records. Though much of the focus in the aftermath of the breaches was on personal identity theft and prevention, it’s important to keep ...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Coverage Area -

Onsite computer support services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions