How Can I Use a Public Computer Safely?

How Can I Use a Public Computer Safely?

Essential Tips for Safety on a Public PC

Public computers are rare, but you might need one at some point. When that time comes, it’s good to know how to protect your privacy on a public machine.

Bryan Ferraro, owner of Alliance Technology Partners, a St. Louis IT consulting company shares essential tips for using public computers and make sure your information is safe and secure.

Before we all carried computers in our pockets, the main way to get internet access was via a public cafe. You paid a few dollars and got a computer all to yourself. Public computers are rare in many parts of the world, but you might need one at some point. If you’re abroad and your phone is stolen or you have no Wi-Fi access, a hotel business center or library computer can save your day. When that time comes, it’s good to know the precautions that can protect your privacy on a public machine.

Are Public Computers a Risk?

Public computers are a risk for several reasons. Because they’re public, these machines don’t have the same password and other protection your personal devices offer. There is no strong disk encryption to keep prying eyes off sensitive information. If you leave any information on the machine, it’s there for the next user to access at will. That’s a real problem because you may also be compromising your own identity on and off the cyber trail.

Other nasty surprises include germs left on public keyboards and mice. Previous users could have left behind viruses designed to skim information for future users.

How Can You Minimize the Risk?

Check whether there’s anything suspicious plugged into the computer. For example, a USB keylogger can capture every keystroke you make. This device is placed between the computer and keyboard and records everything you type. The owner comes back to dump the logs and looks for passwords, email addresses and credit card numbers. Avoid machines with odd gadgets plugged in them.

How Can I Set Browser Privacy Modes?

If you need to browse the web, set the browser to privacy mode. For examples, Chrome has an incognito mode. When you’re browsing from a private Window, the browser won’t record your information. When you finish, the browsing history, logins, passwords and other information disappear.

Privacy mode won’t keep information away from the ISP or proxy server. So avoid prohibited sites. To hide your activity on a public machine, you need a VPN and may want to consider the Tor browser.

What About Apps and the Machine’s Operating System?

Privacy mode is a great start to protecting yourself on a public computer. However, if you can avoid using any software on the PC, that’s even better. Ideally, you can avoid the machines OS completely. Portable apps provide part of the solution. They are self-contained and require no installation. You just load up a portable app onto a flash drive and plug it into any device to use it.

If you choose this route, include a portable antivirus package, browser and office suite. There’s also virtual machine software that runs a clean OS in Linux or similar systems. You won’t even have to reboot the PC. You probably won’t be allowed to do this, but you can boot a portable OS from a flash drive and none of your personal information will make it to the public PC’s permanent storage.

How Can You Clean Up After Yourself?

Of course, even with advanced planning, portable apps and a live OS, sometimes you’ll be caught off your guard. In that case, you might end up using a public computer without all the available protection. If so, make sure to decontaminate the machine when you’re done working.

Delete your browsing history and data. You can run a free space file shredder to ensure your deleted information can’t be pieced back together by a pro. Likewise, be sure there’s nothing in the computer’s recycle bin. Further, if you logged into any services, change your passwords once you have access to a safe computer again. If you have two-factor authentication, make sure it’s switched on for all the services you use.

Doesn’t This Seem Like Overkill?

Maybe you think this is a lot of work for a contingency plan you may never need. However, cybercriminals lay traps for unsuspecting users where it’s least expected. To prevent identify and information theft, taking these steps gives you the peace of mind that you’re covered as well as possible.

Prep that emergency flash drive and throw it in your bag when you’re traveling far from home and you’ll always be ready.

Comments are closed.