Five Tips for Safe Web Surfing, Whether at Your Desk or On-the-Go

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips for Safe Web Surfing, Whether at Your Desk or On-the-Go-2 Next

  • Before entering sensitive information into a website, look for the security padlock symbol. The padlock is one way of checking that a website is safe and indicates that the information you submit is secure.
  • Double-click the icon. It will display the certificate information for the page you are viewing to guarantee that you are on a safe, secure website. Make sure the certificate is current and issued to the same company you are visiting.
  • Don’t be fooled by a padlock that appears on the Web page itself because it is possible for a cyber criminal to copy the image. So, double check that the padlock is in the window frame of the browser itself.
  • After validating the padlock, you can also check the text before the website name in the address bar. The “https” is another indication that the page you are viewing is secure.
  • Pay attention to the Web address. Check the address and if you click on a link, look to make sure that the address stayed the same. If it has changed, then it has taken you to a fraudulent Web address where cyber criminals can monitor and access your information.

You've heard it before: Create stronger, better, more unique passwords. But it doesn't stop there. Courtesy of AppRiver, we bring you five must-heed tips to help your users securely conduct their daily Web activity from app downloads to bill pay, Web browsing, email checking and more.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.