facebook linkedin twitter

Computerware Blog

Tip of the Week: How to Secure Your Internet Browser

Tip of the Week: How to Secure Your Internet Browser

Most people today spend a lot of time on the Internet, which means that most people spend a lot of time using a browser. Little do they know, selecting the wrong one could easily put their cybersecurity at risk, along with dozens of other actions. For this week’s tip, we’ll go over how to make your Internet browser as secure as possible.

Update (And Turn on Notifications)

We can safely say that the more up-to-date a browser is, the more secure it is going to be. This is because many of the changes that these updates address have to do with the browser’s security features, including any anti-phishing, anti-malware, and plugin security measures. You should also turn on your browser’s auto-update function, which will let you know whenever an updated version is available.

Customize Your Security Settings

Or, in other words, set them to be as high as possible. Here are some suggestions:

Cookies - Disable them, or only enable them if you trust the website and they are required.
Pop-Up Windows - Block them from opening automatically, only enable them for trusted websites, or have the browser ask for confirmation
Block Reported Attack/Fake Sites - If it is available, block malicious sites by enabling this feature
Camera and Microphone Usage - Block from running automatically, and have the browser ask for confirmation
Javascript - Block from running automatically, only enable it for trusted websites, and have the browser ask for confirmation
Plugins and Add-Ons - Block from running automatically, or have the browser ask for confirmation

Leverage Antivirus

Is antivirus perfect? No. Is it better to use it? Absolutely. An up-to-date antivirus solution can provide quite the strong defense against most malicious code, and their threat definitions can be updated automatically, meaning that it would only get better and more effective over time. For your company, your antivirus should be centrally managed, not installed on each individual device.

Use a Limited Account

Instead of using your administrator account for your daily use, consider creating a secondary one with limited privileges to use instead. Many threats leverage the access of the user in order to deliver whatever payload they have, so the less access the user has, the better. An administrator account is really only necessary when you’re making changes to the device, so limiting its use won’t be an inconvenience.

Browser Compartmentalization

There are many different options out there for web browsing - far more than just the likes of Chrome, Edge, and Safari. There is also nothing to restrict you to only using one, which is why another means of improving your security exists: browser compartmentalization.

Basically, browser compartmentalization is to use multiple browsers, assigning certain activities to each. Any online accounts will only be accessed via Browser A, while Browser B would be reserved for browsing (with its history and cookies disabled). As long as you stick to the rules, browser compartmentalization can be an effective way of making your browsing more secure.

Try a Browser Made for Security

Speaking of web browsing options, many browsers are designed with their security as the top priority. There’s Firefox, for instance, which can be customized to be security-centric, as well as a few open-source versions, like GNU IceCat, Waterfox, and Pale Moon. If you’re more used to Google Chrome, there are secure browsers based on Chromium, the code base behind Chrome. These include Iridium Browser, Ungoogled Chromium, and Brave.

Use a VPN

A VPN (short for Virtual Private Network) takes your Internet activity and conceals it behind encryption, boosting your security considerably. There are many VPN services out there, so you will want to lean on a trusted resource like Computerware to help you select and implement one that best fits your needs.

Computerware can help you improve your business’ security and productivity with reliable IT solutions. To learn more about what we can do, reach out to us at (703) 821-8200.

Should You Consider Microsoft 365?
Two-Factor Authentication Works to Remove Security...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Business Computing Cloud Software Business Management Hackers Data Hardware Microsoft Workplace Tips Backup Managed Service Provider Network Security Productivity Business Hosted Solutions Email Malware Saving Money IT Services Efficiency Computer IT Support Google User Tips Productivity Innovation Small Business Smartphones Quick Tips Mobile Devices Microsoft Office Data Backup Business Continuity VoIP Social Media Collaboration Gadgets Disaster Recovery Android Network Data Recovery Upgrade communications Mobile Office Server IT Support Communication Virtualization Smartphone Mobile Device Management Miscellaneous Ransomware Phishing Windows 10 Windows Tech Term Cybersecurity Holiday Operating System Unified Threat Management Vendor Management Apps Facebook Remote Monitoring Passwords Automation Users Managed IT services BYOD Remote Computing Mobile Computing BDR Outsourced IT Analytics Managed IT Services WiFi Mobile Device Internet of Things Artificial Intelligence Apple Data Management The Internet of Things Marketing Browser History Save Money Firewall Alert App Cloud Computing Encryption Big data IT Consultant Spam Office 365 Two-factor Authentication Help Desk Office Antivirus Printer Cybercrime Health Windows 10 Content Filtering Information Technology Going Green Bring Your Own Device Gmail Bandwidth Business Technology Maintenance Managed IT Government Search Virus Tech Support Employer-Employee Relationship Cost Management Information Best Practice Lithium-ion Battery Hiring/Firing Training Hard Drives Outlook Budget Windows 8 Saving Time Computers VPN Wireless Technology Managed Service Blockchain Education Recovery Update Retail Networking Phone System Hacking Money Document Management Healthcare IBM Access Control Customer Service It Management Travel Mobility Website Administration Compliance Data Loss Data storage Risk Management Avoiding Downtime Password Value iPhone Legal Save Time Hacker Downtime Current Events Regulations SaaS Running Cable Proactive IT Augmented Reality File Sharing PowerPoint Hard Drive Law Enforcement Applications Twitter Humor Intranet Storage Patch Management Solid State Drive Social Engineering Flexibility Scam Black Market Cryptocurrency Word Data Breach Laptop Business Intelligence Private Cloud Cortana Business Growth Digital Payment Project Management Digital Telephony Websites Router Management Machine Learning Comparison Tablet Excel Paperless Office Vulnerabilities Telephone Systems Company Culture Sports User Computing Computer Repair Customer Relationship Management Disaster End of Support Social Networking Fax Server Hosted Solution Social Robot Windows 7 Wireless Data Security Securty Google Maps DDoS Politics Virtual Reality Downloads Emails Bluetooth Streaming Media Conferencing Automobile Chromebook Voice over Internet Protocol Redundancy Computing Infrastructure Hack Inbound Marketing Memory Monitoring How To eWaste Google Docs Net Neutrality Evernote Experience Chrome Download Monitors Virtual Assistant Cleaning Wi-Fi Pain Points Office Tips User Error Processors Start Menu Tech Terms Computer Accessories Co-managed IT Microchip Taxes Mobile Technology YouTube Distributed Denial of Service USB Presentation Cooperation Software as a Service Unified Communications Settings Trending Public Cloud Licensing Vendor Uninterrupted Power Supply Mouse Lifestyle Specifications Safety Vulnerability Virtual Desktop Processor Statistics Bitcoin Programming Identity Theft Gaming Console IT service Network Congestion Documents Data Protection Distribution Webcam Entertainment Teamwork Heating/Cooling Text Messaging Upgrades Microserver HTML External Harddrive Professional Services Fiber-Optic Database In Internet of Things Data Analysis Employees WannaCry GDPR Time Management Freedom of Information LiFi Analytic Telephone System PDF SQL Server Corporate Profile Recycling Mobile Security Tech Hypervisor Assessment SharePoint Get More Done Product Reviews Multi-Factor Security Cost Scalability Thin CLient Integration Software License Trends Motion Sickness Best Available 3D Keyboard Ebay Deep Learning Turn Key Devices Messenger Tracking Smart Phones Domains Tip of the week Work/Life Balance Printer Server Read Fraud Tactics Fileless Malware Hybrid Cloud Google Calendar UTM Content Rental Service Meetings Public Speaking Modem Touchscreen News Visible Light Communication Trojan Proxy Server Azure VoIP Adminstration Shortcut Pirating Information Term Consultation IT consulting Legislation Error Cabling Leadership Electronic Medical Records Transportation Knowledge Device Management Organize IT Plan Enterprise Resource Planning Web Server Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Content Management email scam Addiction Administrator Entrepreneur Directions Display Multi-factor Authentication Supercomputer HIPAA SSID Fake News Advertising Flash Environment Dark Web Free Resource Audit CIO Competition Processing Data Warehousing Windows XP Wireless Headphones Telephone Worker Electronic Payment Health IT Employee/Employer Relationship Staffing Google Wallet online Currency Migration Connected Devices Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society Webinar Network Management Managed IT Service Wasting Time LinkedIn Device security MSP Employer Employee Relationship IP Address Microsoft Excel G Suite Upselling Bookmark Computer Care Micrsooft Physical Security Application Video Surveillance Google Play Google Drive Windows Server 2008 Nanotechnology Social Network Human Resources Employer/Employee Relationships Drones Desktop Finance Hacks Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets Saving ZTime Microsoft 365 Archive Business Cards Service Level Agreement Banking Botnet Username Medical IT Permissions Language Unified Threat Management Backup and Disaster Recovery Sync Browsers Electricity Printing Notifications CCTV Digital Signature Debate Security Cameras Point of Contact Best Practives Screen Reader Customer Resource management Harddrive User Tip Proactive Maintenance Gamification Navigation Virtual Machine cache Television switches Writing Smart Tech Reliable Computing Solutions Music Piracy Upload Business Metrics Computer Malfunction GPS Managing Stress Printers Regulation CrashOverride Managed Services Provider 3D Printing Capital Personal Information Productuvuty Financial

toner1