Mytek Logo
MyTek Logo

The Chrome Browser is Redefining Phoenix IT Security

by | Jul 27, 2018 | MyTek Blog, Security


Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

System vulnerabilities, data hackers, and ransomware are big vulnerabilities that Phoenix small businesses have to deal with. 47% of cyberattacks are targeted toward small businesses so it is no wonder that IT security is at the top of the list for small businesses owners. But do you really know if your business and employees are safe from security threats? MyTek Technology Solutions continues to share important only security tips so your Arizona business can prosper. Since 2009, we have been supporting the technology needs of Phoenix small businesses and we would like to continue to help you succeed. Today, we’re going to discuss webpage security.

How Chrome is Shaking Up the Conventional Advice For IT Security

Whether a site is secure or not, your browser will tell you. This can be incredibly important, especially if you are using and putting in sensitive information like credit card numbers and passwords. Google Chrome is stepping up its security game. With the two major website types out there, HTTP and HTTPS, there is a primary difference between them. The one with the S at the end has its data sent through a secure connection, while the other doesn’t. HTTPS has extra layers of security that are in place to shield your data from threats. This best practice has been used for a long time, and you can make sure your connection is secure by looking for the lock symbol on the left side of the address bar.

If you are using a site that is HTTP instead of HTTPS, Google Chrome will now notify you to let you know that the website you are on is not secure. This is a way to put pressure on these websites to use HTTPS because otherwise, they might lose a lot of their traffic. Since Chrome is such a popular web browser, it makes a lot of sense that this security method is going to be used a lot more commonly. Not only is this good for your business while your employees are exploring the web, but it is important that your business website is HTTPS so that you are not losing traffic to your website and that your customers feel safe while on it.

What Are Other Browsers Doing for IT Security?

While not all of the major web browsers are going to flip the script like this in such a dramatic way, most of them have plans as to how they will be handling HTTP or unencrypted websites.

  • Firefox: In a similar way to Chrome, Firefox is using the “confirming the page is secure” method. This browser tells you whether an HTTP page has a login form with a padlock that has a strike through it, and there will be a warning pop up as you hover over different parts of the page. This browser is going to begin displaying all HTTP pages with a padlock with a strikethrough. 
  • Safari: Apple simply confirms that the connection is secure by showing a lock. Safari also will warn you when you get to an HTTP page by showing you a pop-up in the field and the address bar.
  • Edge: Edge offers an option that allows the user to look at additional information about the webpage they are on and its connection. With this information, you can discover if a page is encrypted or not and identify it as a risk. This feature doesn’t work in the input fields, so we feel like Edge is not doing enough to want their users.

Unsure If You Need Phoenix Small Business Technical Support?

Are you worried about keeping your business secure? If business technology is a worrying topic that you need help with, MyTek is the right answer. We can help assess your business and walk you through any security solutions we would recommend, in our complimentary business technology assessment. Give us a call today at 623-312-2440 to learn more and come back to our blog for more important tech tips.


Tim - Team

Tim Tiller, LMSW

Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.


Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.


Top 5 Hardware Monitoring Software 

Did you know that almost 40% of servers had at least one outage in the last twelve months? Veeam reports that the most common reason for outrages is infrastructure failure which puts the current hardware monitoring practices under the scanner. Hardware failures are...

Types of Mobile Malware & How to Defend Against Them

Malware has a long history of undermining computer security and stealing critical data. With the rapid growth of mobile usage, we're now seeing a new breed of mobile malware infecting smartphones and tablets. The new-age mobile malware are more advanced, seamless, and...

How to Protect Your Data Privacy & Enhance IT Security

Every time you use a device, you enter, modify or access data. Some of your usages are routine and public but sometimes you perform tasks that are confidential in your personal life or business. Naturally, this type of data is private and it should be kept that way....

Mobile? Grab this Article!

QR Code

Blog Archive

Generated by Feedzy
Share This