Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: heavily revised the https faq (typical users don't need to know what protocol, hostname and file name means); removed additional two faqs at the bottom of the page (either info is referenced elsewhere, or it's too technical for the typical user)

...

Expand
titleIs there contact info listed for the company who owns the website?Contact the Company

Check the website itself before conducting business with the website. Usually, at bottom of a website, there is an option called "Contact Us." If you do not trust a website, contact the company using the contact information listed. If you do not receive a response (or you notice the phone number is out of service), the site may not be legitimate.

...

Is the Website Secure?


Expand
titleCheck the Icon in the Address BarDo you see a locked padlock in the address bar?

If there is a 🔒 symbol located before the address in the address bar, you are using a private connection. If a website has private connections, it usually is a secure website.


Expand
titleCheck the Protocol in the Address BarDoes the address (or URL) begin with https?

"http" stands for "hypertext transfer protocol"; the s in "https" stands for "secure."  All websites used to begin with "http," but recently, with all the security breaches and advances in technology, more and more websites are moving to "https."

"https" helps to ensure that the website you're visiting is actually the site you intended to visit.

Please know that there are still many legitimate websites using the old "http."  Not all legitimate sites use or need to use a secure connection. This does not mean that you cannot trust a legitimate website, but you should exercise caution when using the site.

Also know that a site isn't automatically safe because it begins with "https".  This only helps to ensure scammers aren't impersonating sites they don't own.  But scammers could simply purchase the "https" security certifications for their illegitimate websites.

Web addresses are split into three different parts: the protocol (https://), the hostname (www.example.com), and the file name. If the protocol is "https" for a site, you are using a secure page. Below is an example of a secure URL:

parts of a web addressImage Removed


Expand
titleCheck the Website's Privacy Policy

A website's Privacy Policy will state how data is collected on the company's website. If you're concerned about the data the website may be gathering, refer to their Privacy Policy. If you're unable to find the website's privacy policy, the site may not be secure.

Below is an example of what appears at the bottom of most uwf.edu webpages:

Image Added


Expand
titleImportant Tips if a Website is not Secure
  • Do not log into a website unless you trust it. Please make sure that the website is legitimate by following the tips listed in the "Is the Website Legitimate?" section of this article.
  • If you do not feel comfortable logging into the website, do not log in.
  • If you logged into a site, be sure to log out as soon as you're finished using it.

...

Expand
titleHow can I check if a page is behind a login?

Open an incognito window in Google Chrome. To open an incognito window in Windows, Linux, or Chrome OS: Press Ctrl + Shift + n. For Mac OS: Press ⌘ + Shift + n.

. Next, paste the link in the address bar and press "Enter" to see if a login is required on the webpage.

incognito mode

FAQs

Expand
titleAre all legitimate websites secure?

No. Not all legitimate sites use or need to use a secure connection. This does not mean that you cannot trust a legitimate website, but you should exercise caution when using the site.

Expand
titleAre all secure websites legitimate?

No. Some sites will behave and look like a legitimate site, when in fact they are used to lure visitors to enter sensitive data. One example of these sorts of activities is a "man-in-the-middle attack." In this scenario, an attacker sets up a site that looks like its legitimate counterpart (such as a banking site). However, the site is designed to have the victim enter sensitive data (such as passwords, SSNS, etc) for the attacker to gather. For more information on man-in-the-middle attacks, please read TechTarget's article.



Include Page
ILP:_Help Desk Footer
ILP:_Help Desk Footer

...