MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Network Profile?
Each time a Windows 10 device connects to a new network, it will ask the user if it should be able to be discovered by other devices on that network. Selecting “Yes” will set your network profile to Private, and selecting “No” will set it to Public.

The Private and Public settings are referring to the kind of network your device is connecting to, and what level of security your individual device is responsible for. If you are connected to your company’s network, with all its protections and other users with whom you need to collaborate, the “Private” network setting is the one you want to use. However, if you’re using your device in a public setting, on a network that is “Public”-ally accessible, you don’t want any Tom, Dick, or Harry Hacker to be able to connect to you.

Switching the Network Profile
Windows 10 offers a few different methods of switching the network profile that a device uses. One way is to use the built-in Settings application.

From the Start menu, access the Settings application. Go to Network and Internet, and then select the kind of connection you have established from the left panel menu. If you’re physically connected to the network, select Ethernet, and if you’re using a wireless connection, select WiFi. Then, click on Network in the right panel. You can then switch between a Public network profile and a Private network profile.

Domain Networks
Alternatively, enterprise workplaces often leverage a third network profile - a domain network. Unlike the Private or Public profiles, only a network administrator can set its use, and it can only be applied while the device is in the workplace.

Want to know more about your network, or need more help managing it? Reach out to MERIT Solutions at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Malware Software Productivity Internet Managed IT Services Hosted Solutions Business Management Backup Mobile Devices google Computer Business Microsoft Disaster Recovery Outsourced IT IT Support Hardware communications VoIP Business Continuity Windows 10 Innovation IT Services Cybersecurity Email User Tips Data Backup Efficiency Cybercrime Windows Tech Term Mobility Saving Money Mobile Device Management Managed IT Server Ransomware Small Business Data Recovery Apps Internet of Things Operating System Productivity browser Data Law Enforcement Smartphone Office 365 Android Virtualization Telephone Systems BDR Money Save Money Smartphones Hosted Solution Data Security Quick Tips Passwords Cloud Computing Phishing Recovery Communication Network VPN Microsoft Office BYOD IT Support Automation Password Holiday Managed Service Provider Information Technology Chrome Application Data Breach App Budget Data Management Facebook Government Two-factor Authentication Wireless Google Drive Hacking Collaboration Avoiding Downtime Update Risk Management Alert Gadgets Unsupported Software Workplace Tips Health Miscellaneous Computers Vulnerability Work/Life Balance upgrade Best Practice Cost Management Social Social Media Wi-Fi search Antivirus Current Events Audit Employer-Employee Relationship Compliance Personal Information Tech Support User Error Politics Wireless Technology Data Protection Gmail USB Cleaning Save Time Telephony Blockchain Users Identity Theft Office tips Applications Private Cloud History Artificial Intelligence Remote Computing Social Engineering Flexibility Spam Shortcut Streaming Media Proactive IT Managed IT Services Router The Internet of Things Firewall Going Green Humor Disaster OneNote Samsung Bandwidth Content Filtering Networking eWaste Battery HaaS Data Loss Sports Marketing Project Management Automobile Google Docs Value Hacker MSP Internet Exlporer Solid State Drive Saving Time Office Computer Care Phone System iPhone Redundancy Travel IT solutions Management Mobile Computing Commerce Legal Transportation Encryption DDoS Cortana Patch Management Windows 10 Robot Mobile Security Television Devices Big Data End of Support Apple Google Assistant Excel Wireless Charging Education Vendor Management WiFi Fraud Data Storage SaaS Benefits Hard Drive Google Maps PowerPoint Specifications Edge Screen Mirroring remote Data storage Virus Sync Dark Web Unified Threat Management Amazon Yahoo Chromebook Software as a Service Meetings Emails Training Entertainment Administration Wireless Internet Sales Chromecast Ciminal Cast Server 2008 Proactive Adobe Upgrades Electronic Medical Records Running Cable Virtual Assistant Workers Point of Sale Ali Rowghani Smart Tech Settings Company Culture Trending HIPAA Colocation Gamification Retail Black Market Websites Licensing WannaCry Consultant Safety Hard Drives Alexa for Business Updates Smart Technology Connectivity Files Lithium-ion battery Webinar Memory Conferencing Avoid Downtime Administrator HBO Microsoft Word Shadow IT server installation dvd "cannot install required files" Data Theft Mobile Document Management stock Content Filter Microsoft Excel Remote Monitoring intranet IT solutions Experience Relocation Students Gifts Access Computing Professional Services tweet Monitoring File Sharing IT budget IT Management Windows 10s Unified Communications Video Games Virtual Reality calculator Analysis Nanotechnology PDF Scam Twitter Storage Maintenance WIndows Server 2008 Hard Disk Drive Music Financial Credit Cards control App store Tablets Root Cause Analysis Text Messaging Employer Employee Relationship WSJ Financial Technology Device Security Identities Analytics Bring Your Own Device FAQ Exchange Distributed Denial of Service Instant Messaging altivista NFL Augmented Reality Keyboard Touchscreen Computer Accessories Worker Commute Printing Lifestyle Business Intelligence SBS IoT Outlook Mobile Device Hybrid Cloud Charger Managing Stress compaq Laptop Identity Word Uninterrupted Power Supply Legislation Spyware Managed IT Service Language iOS Books Wearable Technology Business Technology Scalability Hiring/Firing hp Touchpad Data Privacy Windows Ink Reputation Computer Forensics Comparison How To domain Regulation Computer Fan Advertising Wasting Money Evernote Cache Monitors Emergency Thank You Congratulations Worker CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...