Menu Close

The Chrome Browser is Redefining Phoenix IT Security

System vulnerabilities, data hackers, and ransomware are big vulnerabilities that Phoenix small businesses have to deal with. 47% of cyberattacks are targeted toward small businesses so it is no wonder that IT security is at the top of the list for small businesses owners. But do you really know if your business and employees are safe from security threats? MyTek Technology Solutions continues to share important only security tips so your Arizona business can prosper. Since 2009, we have been supporting the technology needs of Phoenix small businesses and we would like to continue to help you succeed. Today, we’re going to discuss webpage security.

How Chrome is Shaking Up the Conventional Advice For IT Security

Whether a site is secure or not, your browser will tell you. This can be incredibly important, especially if you are using and putting in sensitive information like credit card numbers and passwords. Google Chrome is stepping up its security game. With the two major website types out there, HTTP and HTTPS, there is a primary difference between them. The one with the S at the end has its data sent through a secure connection, while the other doesn’t. HTTPS has extra layers of security that are in place to shield your data from threats. This best practice has been used for a long time, and you can make sure your connection is secure by looking for the lock symbol on the left side of the address bar.

If you are using a site that is HTTP instead of HTTPS, Google Chrome will now notify you to let you know that the website you are on is not secure. This is a way to put pressure on these websites to use HTTPS because otherwise, they might lose a lot of their traffic. Since Chrome is such a popular web browser, it makes a lot of sense that this security method is going to be used a lot more commonly. Not only is this good for your business while your employees are exploring the web, but it is important that your business website is HTTPS so that you are not losing traffic to your website and that your customers feel safe while on it.

What Are Other Browsers Doing for IT Security?

While not all of the major web browsers are going to flip the script like this in such a dramatic way, most of them have plans as to how they will be handling HTTP or unencrypted websites.

  • Firefox: In a similar way to Chrome, Firefox is using the “confirming the page is secure” method. This browser tells you whether an HTTP page has a login form with a padlock that has a strike through it, and there will be a warning pop up as you hover over different parts of the page. This browser is going to begin displaying all HTTP pages with a padlock with a strikethrough. 
  • Safari: Apple simply confirms that the connection is secure by showing a lock. Safari also will warn you when you get to an HTTP page by showing you a pop-up in the field and the address bar.
  • Edge: Edge offers an option that allows the user to look at additional information about the webpage they are on and its connection. With this information, you can discover if a page is encrypted or not and identify it as a risk. This feature doesn’t work in the input fields, so we feel like Edge is not doing enough to want their users.

Unsure If You Need Phoenix Small Business Technical Support?

Are you worried about keeping your business secure? If business technology is a worrying topic that you need help with, MyTek is the right answer. We can help assess your business and walk you through any security solutions we would recommend, in our complimentary business technology assessment. Give us a call today at 623-312-2440 to learn more and come back to our blog for more important tech tips.

Table of Contents

"*" indicates required fields

This field is for validation purposes and should be left unchanged.


Our goal is to reinvent the managed IT experience for growing Arizona businesses through a partnership with no long-term commitments, technology options that are flexible to meet your needs and infrastructure and strategy that position your technology as a competitive advantage.

Download Our Price Sheet