Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Evaluating the Security of Your Chrome Extensions

Evaluating the Security of Your Chrome Extensions

Google Chrome is currently used by 69 percent of global desktop Internet users, as of July of 2020. With such a large amount of people using Chrome, its security becomes even more important… which makes it all the worse that many people are unaware of the permissions that some of its extensions claim.

Let’s go over how you can review how much of your data these Chrome extensions can access, and how you can adjust these permissions more to your liking.

Fair warning: This will naturally require you to change a few settings, so don’t be afraid to reach out to your IT provider to confirm these changes are okay to make and for assistance in doing so.

What Permissions Have Extensions Been Granted?

Here’s the thing—the extensions that you have installed into the Chrome browser, much like the applications that can be installed on a mobile device, will require some of your browsing data in order to function. Many extensions and applications, however, take claim of far greater permissions than their functionality requires in practice. In fact, a recent analysis of extension permissions shows that over a third of all extensions do this!

Here are a few steps that allow you to evaluate your Chrome extension permissions and help you to avoid granting them too much access in the future.

Step One: Evaluate Your Current Permissions

First, you will want to find out how many of your installed extensions currently ask for too much. To do so, you’ll need to type chrome:extensions into the address bar and go through the Details of each extension that appears on the page.

There, you’ll find a line annotated with Site access. There are various access levels that an extension can have once it is installed, including no access at all. What this means is that your web activity isn’t accessible by the extension at all. The other levels include:

  • On click – This means that an extension can access and alter data in your active tab when you click on the extension’s shortcut.
  • On specific sites – This means that only certain websites allow the extension to access and alter what is presented in the browser.
  • On all sites – This means that there are no restrictions on an extension, allowing it to access and alter data at any time.

Certain types of extensions may need this kind of access, while others will not. It is up to you to determine what access is appropriate for each to need, based on what they use to operate.

Step Two: Adjusting Your Current Permissions

If an extension doesn’t need the level of permissions that it demands, do everything you can to address this by adjusting its settings. If the extension allows this, these permissions can be adjusted by simply selecting your preferred option under Site access. Whenever possible, following a principle of least privilege is the safest bet for your data.

Step Three: Keep Permissions in Mind Moving Forward

Once your extensions’ access permissions are in check, you don’t want to just fall back into your old habits with any new extensions you add. Remember, these extensions prompt you with a brief dialog box explaining its default accessibility settings… pay attention to them. Whenever you activate an extension moving forward you need to be sure to keep these permissions in mind. It may be the difference between installing an extension or finding another option.

Total Tech Care can help you manage all your business technology through our proactive managed services and support. To find out more about our services, reach out to our team by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 26 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Server Save Money Cloud Computing Data Recovery Windows 10 Passwords Social Media Saving Money Holiday Tech Term Gadgets Chrome Virtualization Automation Managed Service Managed IT Services Microsoft Office Cybercrime Operating System Artificial Intelligence Computers Facebook BYOD Mobile Device Management Health Networking IT Support Internet of Things Hacking Wi-Fi Information Technology Covid-19 Information Managed Service Provider Alert Spam Remote Office 365 Telephone Systems Router Recovery Employer-Employee Relationship Bandwidth BDR Social Engineering Mobility Applications Data Breach Application Human Resources Law Enforcement Big Data Remote Monitoring Password Money App Mobile Computing History Encryption Paperless Office VPN Government Remote Computing Private Cloud How To Mobile Office Managed IT Apps Data Storage Patch Management Office Tips Training Blockchain Website Budget Google Drive Gmail Servers Settings Avoiding Downtime Infrastructure Voice over Internet Protocol Two-factor Authentication Data Security Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Flexibility Marketing Vulnerability WiFi Wireless IT solutions Windows 7 Entertainment Word Lithium-ion battery Managed Services Safety Software as a Service Display Telephone System Staff HIPAA USB Sports Machine Learning Redundancy Keyboard Connectivity Remote Work Vendor Management Firewall Employee/Employer Relationship RMM Virtual Reality Apple Social Save Time User Error Data Protection Meetings Cleaning Risk Management Hacker Conferencing End of Support Scam Education Physical Security Vendor The Internet of Things IT Management SharePoint Remote Workers Botnet PDF IT Plan Processor Update Customer Service IT Consultant Proactive IT Environment Unsupported Software Hard Drive Google Docs Best Practice Fax Server Identity Theft YouTube Charger Humor Black Market SaaS Compliance Computing OneNote Computer Care Current Events Augmented Reality Document Management Telephony Solid State Drive Fraud Wireless Technology Samsung Network Congestion How to Downtime eWaste Digital Signage Remote Worker Value Cryptocurrency Data storage Spam Blocking Electronic Medical Records Automobile Virus Procurement Wearable Technology Computing Infrastructure Comparison Net Neutrality Hiring/Firing Retail Hard Drives Workplace Strategy Going Green Instant Messaging Unified Threat Management Robot Computer Accessories Excel CES Help Desk Printing Biometrics Virtual Desktop Business Technology Battery Content Management Shadow IT Access Control Legal Business Intelligence Managed Services Provider Printer Virtual Assistant DDoS Authentication Audit Database Bluetooth Internet Exlporer Worker Cables Windows Server 2008 R2 Public Computer Notifications Transportation Customer Relationship Management Printer Server Customer relationships Regulations Distributed Denial of Service Nanotechnology IT Assessment Computer Fan Telecommuting Manufacturing Rootkit Analyitcs Project Management Email Best Practices Cortana Programming Relocation Workers Security Cameras Benefits Computer Tips Digital Signature Managed IT Service OneDrive FENG Biometric Security Warranty Virtual CIO HVAC Peripheral Video Games Google Apps IBM Antivirus Smart Technology Windows 8 Digital Security Cameras Worker Commute Flash Analysis Using Data Experience Devices Copiers 5G IT service Administrator Enterprise Content Management Quick Tip Scalability Software Tips Supercomputer Emails Smartwatch Tablet MSP Ergonomics Business Owner Sync Accountants Thought Leadership Development Credit Cards OLED NarrowBand Domains Microchip Password Management PCI DSS Search Password Manager Virtual Machine Consultant iPhone Netflix IaaS Multi-Factor Security Employee Two Factor Authentication Maintenance Analytics 2FA Fiber Optics Twitter Messaging Root Cause Analysis Cabling Bloatware Search Engine Music NIST Policy HBO Business Mangement Hypervisor Knowledge Best Available Files Trending WIndows 7 Tablets Dark mode Skype Smart Tech Trend Micro Addiction SMS Data loss Amazon Default App Chromecast Entrepreneur Troubleshooting Procedure Outlook Recycling Saving Time Leadership Colocation Google Search Uninterrupted Power Supply Shortcut Wiring dark theme Start Menu Practices Shopping Cache AI Screen Mirroring Amazon Web Services IT Infrastructure Loyalty Cost Management Books Social Networking Safe Mode FinTech Frequently Asked Questions Criminal Monitor Bing Windows 10s User PowerPoint GDPR Windows Media Player Mobile Hosted Computing Social Network Wireless Internet Cast Online Shopping Investment Streaming Media Emergency File Sharing Employees Tip of the week Employee/Employer Relationships Reputation webinar Running Cable Public Cloud Specifications ISP Managing Stress Tech Support Employer Employee Relationship Memory Camera Windows 365 Content Professional Services Inventory Wire Video Conferencing Techology Evernote ROI Laptop Assessment Cameras Sales Windows Server 2008 Bitcoin Customers Travel Shortcuts Millennials Cryptomining Printers Point of Sale Audiobook Tools Personal Smart Office Supply Chain Management Wireless Charging Touchpad Television Science Monitoring Batteries Digitize Advertising Workforce Virtual Private Network Windows 8.1 Politics

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code