Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

Full disclosure: we don’t recommend doing anything important, or really anything at all, on a public computer. However, we understand that sometimes life works out in an unideal fashion, and sometimes you can be stuck doing something you shouldn’t, and otherwise wouldn’t. Even in these cases, there are steps you can take to preserve your security.

Despite the explosion in mobile device connectivity, the use of public computers is still remarkably common. Unfortunately, the same remarks can’t be said about their relative security. These open devices tend to have few solutions in place--if any--especially when compared to the average privately-held device.

However, as we go through the steps you need to take while using a public computer, we will also go through some alternatives that you really should consider implementing before you find yourself in this risky situation.

Use a Private Browser
The default settings for most web browsers are designed, more or less, for a single user’s exclusive use. This is why your browser collects data like your history, what you’ve downloaded, and account credentials. It’s all done to make the user’s experience simpler--which, on a private machine, isn’t necessarily a bad thing.

However, these capabilities don’t just go away because more than one person uses the computer, and so if you enter some sensitive credentials, the next user may be able to access and utilize them as well. Using a private browser prevents you from leaving those digital footprints on the machine by having it “forget” what you were just using it to access.

Keep in mind, private browsers aren’t a cure-all when it comes to your online security. Even though the computer itself won’t have a record of your browsing, it doesn’t mean that private browsers wipe your trail from the Internet as well. In order to do that, there are other measures you’ll have to take.

Use a Virtual Private Network
Virtual Private Networks, or VPNs, are a step up from a private browser. Once a user logs in to their VPN, their IP address is effectively shielded from view, and their activity is processed through an encrypted virtual tunnel. Using proxy servers that span across the globe, your identity and location are shielded enough that you will never be the target of an opportunistic attack.

As far as price is concerned with a VPN, there are free options out there, as well as many very reasonably priced, paid varieties. Your VPN would need to be set up on your office network before you plan on using it from an outside location.

When it comes to doing business while travelling, it’s only natural that the urge is there to use whatever is available. However, if you must decide between productivity and security, it is much more prudent to prioritize security. After all, without your security, you may just find that your finished product has been tampered with or stolen.

On the topic of security, it cannot be said enough that using a public computer in any professional capacity is simply not a risk that is worth taking. There is simply no way that you may be sure that your data is absolutely safe.

Total Tech Care can help you maintain your security in situations like these. Give us a call at 866-348-2602 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Windows Upgrade Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Cloud Computing Data Recovery Office Windows 10 Passwords Chrome Virtualization Social Media Gadgets Saving Money Holiday Tech Term Microsoft Office Automation Managed IT Services Managed Service Operating System Facebook Computers Cybercrime Artificial Intelligence Hacking Internet of Things Health BYOD Mobile Device Management Wi-Fi Networking IT Support Managed Service Provider Remote Office 365 Telephone Systems Information Technology Covid-19 Alert Information Spam Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Encryption Big Data Applications App History Law Enforcement Mobile Computing Human Resources Application Data Breach Password Money Remote Monitoring How To Office Tips Training Government VPN Blockchain Data Storage Private Cloud Patch Management Paperless Office Managed IT Remote Computing Apps Mobile Office Data Security Google Drive Wireless Avoiding Downtime Flexibility Marketing Gmail WiFi Settings IT solutions Vulnerability Entertainment Windows 7 Website Word Budget Two-factor Authentication Bring Your Own Device Data Management Work/Life Balance Servers Mouse Infrastructure Voice over Internet Protocol HaaS End of Support Meetings Physical Security Education Safety Data Protection HIPAA Sports Risk Management Hacker Redundancy Keyboard Vendor The Internet of Things Lithium-ion battery Managed Services Display Conferencing Software as a Service Employee/Employer Relationship Firewall Telephone System Staff Save Time Scam Machine Learning RMM USB Connectivity Remote Work Virtual Reality Apple Cleaning Social Vendor Management User Error Fraud Shadow IT Compliance Wearable Technology Legal OneNote Procurement Computer Care Current Events Net Neutrality Retail Remote Worker Hard Drives Workplace Strategy Instant Messaging Telephony Internet Exlporer Help Desk Robot Cryptocurrency Excel Samsung Printing Biometrics PDF Virtual Desktop Value Comparison Spam Blocking Managed Services Provider Proactive IT Virus Electronic Medical Records DDoS CES Database Best Practice Unified Threat Management YouTube Computer Accessories Hiring/Firing SharePoint Business Technology Content Management Remote Workers Black Market Access Control Processor Customer Service Virtual Assistant Authentication Environment Document Management Solid State Drive Hard Drive Wireless Technology Printer Fax Server How to Bluetooth Business Intelligence Downtime Audit Worker Data storage Update SaaS IT Management Computing Automobile Botnet Google Docs IT Consultant IT Plan Computing Infrastructure Identity Theft Network Congestion Going Green eWaste Humor Digital Signage Unsupported Software Charger Augmented Reality Battery Cost Management Audiobook Twitter Sync AI Consultant Emails IT Infrastructure Search Engine Bing Social Networking NIST FinTech Business Mangement Touchpad Analytics Social Network Trending Smart Tech Politics Addiction Advertising Best Available Amazon Netflix Investment Two Factor Authentication Running Cable Employees WIndows 7 Recycling Root Cause Analysis Employee/Employer Relationships Knowledge ISP Notifications Music Wiring Memory Windows 365 Practices HBO Cache Skype Video Conferencing Amazon Web Services ROI Shortcuts Safe Mode Sales Criminal Data loss Bitcoin Outlook Personal Relocation Leadership Cryptomining Troubleshooting GDPR Point of Sale Hosted Computing Wireless Internet Start Menu Supply Chain Management Online Shopping Loyalty Windows Media Player File Sharing Science Monitoring Video Games User Screen Mirroring Batteries PowerPoint Inventory Frequently Asked Questions Digitize Specifications Books Camera Windows 8.1 Worker Commute Experience Wire Mobile Evernote Windows 10s Windows Server 2008 R2 Travel Distributed Denial of Service Customer Relationship Management Customer relationships Scalability Managing Stress Cast Tip of the week IT Assessment Millennials webinar Manufacturing Emergency Printers Analyitcs Email Best Practices Business Owner Programming Smart Office Professional Services Wireless Charging Public Cloud NarrowBand Cameras Employer Employee Relationship Assessment Security Cameras Computer Tips Search Managed IT Service Windows Server 2008 OneDrive iPhone Workforce Biometric Security Virtual Private Network Virtual CIO Tools Peripheral Cables Antivirus Television Windows 8 Digital Security Cameras Using Data Nanotechnology Copiers Files Telecommuting 5G IT service Project Management Quick Tip Cortana Chromecast Printer Server Public Computer Smartwatch Tablet Ergonomics Digital Signature Regulations Development Colocation OLED Uninterrupted Power Supply Transportation Domains Warranty HVAC PCI DSS Google Apps Computer Fan Virtual Machine Rootkit Monitor Employee IaaS Maintenance 2FA Analysis Fiber Optics Devices Messaging Workers Cabling Benefits Administrator Bloatware Enterprise Content Management Policy FENG Hypervisor Reputation IBM Streaming Media MSP Tablets Dark mode Accountants Trend Micro Content Thought Leadership Flash SMS Credit Cards Default App Tech Support Smart Technology Microchip Entrepreneur Password Management Procedure Techology Password Manager Saving Time Laptop Shopping Customers Multi-Factor Security Supercomputer Google Search Shortcut dark theme Software Tips

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code