Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Evaluating the Security of Your Chrome Extensions

Evaluating the Security of Your Chrome Extensions

Google Chrome is currently used by 69 percent of global desktop Internet users, as of July of 2020. With such a large amount of people using Chrome, its security becomes even more important… which makes it all the worse that many people are unaware of the permissions that some of its extensions claim.

Let’s go over how you can review how much of your data these Chrome extensions can access, and how you can adjust these permissions more to your liking.

Fair warning: This will naturally require you to change a few settings, so don’t be afraid to reach out to your IT provider to confirm these changes are okay to make and for assistance in doing so.

What Permissions Have Extensions Been Granted?

Here’s the thing—the extensions that you have installed into the Chrome browser, much like the applications that can be installed on a mobile device, will require some of your browsing data in order to function. Many extensions and applications, however, take claim of far greater permissions than their functionality requires in practice. In fact, a recent analysis of extension permissions shows that over a third of all extensions do this!

Here are a few steps that allow you to evaluate your Chrome extension permissions and help you to avoid granting them too much access in the future.

Step One: Evaluate Your Current Permissions

First, you will want to find out how many of your installed extensions currently ask for too much. To do so, you’ll need to type chrome:extensions into the address bar and go through the Details of each extension that appears on the page.

There, you’ll find a line annotated with Site access. There are various access levels that an extension can have once it is installed, including no access at all. What this means is that your web activity isn’t accessible by the extension at all. The other levels include:

  • On click – This means that an extension can access and alter data in your active tab when you click on the extension’s shortcut.
  • On specific sites – This means that only certain websites allow the extension to access and alter what is presented in the browser.
  • On all sites – This means that there are no restrictions on an extension, allowing it to access and alter data at any time.

Certain types of extensions may need this kind of access, while others will not. It is up to you to determine what access is appropriate for each to need, based on what they use to operate.

Step Two: Adjusting Your Current Permissions

If an extension doesn’t need the level of permissions that it demands, do everything you can to address this by adjusting its settings. If the extension allows this, these permissions can be adjusted by simply selecting your preferred option under Site access. Whenever possible, following a principle of least privilege is the safest bet for your data.

Step Three: Keep Permissions in Mind Moving Forward

Once your extensions’ access permissions are in check, you don’t want to just fall back into your old habits with any new extensions you add. Remember, these extensions prompt you with a brief dialog box explaining its default accessibility settings… pay attention to them. Whenever you activate an extension moving forward you need to be sure to keep these permissions in mind. It may be the difference between installing an extension or finding another option.

Total Tech Care can help you manage all your business technology through our proactive managed services and support. To find out more about our services, reach out to our team by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Business Continuity Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Managed IT Services Windows Phishing Upgrade Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Chrome Virtualization Gadgets Saving Money Holiday Tech Term Social Media Microsoft Office Managed IT Services Managed Service Automation Operating System Computers Artificial Intelligence Facebook Cybercrime Hacking Internet of Things BYOD Wi-Fi Mobile Device Management Networking IT Support Health Remote Spam Office 365 Covid-19 Information Alert Telephone Systems Information Technology Managed Service Provider Social Engineering Mobility Router BDR Bandwidth Recovery Employer-Employee Relationship Big Data Data Breach Law Enforcement Remote Monitoring Mobile Computing App Application History Password Money Encryption Applications Human Resources Remote Computing Government Mobile Office Blockchain Paperless Office Private Cloud Managed IT How To Office Tips Training Apps VPN Data Storage Patch Management Two-factor Authentication Windows 7 Word Mouse Servers HaaS Avoiding Downtime Flexibility Marketing WiFi IT solutions Data Security Entertainment Website Budget Bring Your Own Device Wireless Data Management Infrastructure Work/Life Balance Voice over Internet Protocol Gmail Settings Vulnerability Google Drive HIPAA Scam Sports Virtual Reality Redundancy Apple Keyboard Social Vendor Management User Error Vendor Managed Services Meetings Staff Software as a Service Display Telephone System Machine Learning Save Time Connectivity Remote Work Risk Management Employee/Employer Relationship Hacker USB RMM Cleaning The Internet of Things Lithium-ion battery End of Support Education Physical Security Conferencing Firewall Data Protection Safety Workplace Strategy SaaS Comparison Net Neutrality PDF Audit Worker CES Help Desk IT Management Printing Proactive IT Botnet Network Congestion Content Management eWaste Virus Best Practice IT Plan Business Technology Access Control YouTube Black Market Unified Threat Management Managed Services Provider Computer Accessories Unsupported Software Virtual Assistant Authentication Database Charger Remote Workers Wearable Technology Document Management Wireless Technology Compliance Retail Solid State Drive Hard Drives How to Instant Messaging Downtime OneNote Computer Care Processor Current Events Update Robot Printer Excel Telephony Bluetooth Biometrics Data storage Samsung Hard Drive Automobile Google Docs Virtual Desktop Identity Theft Value Computing DDoS Computing Infrastructure Going Green Spam Blocking Electronic Medical Records IT Consultant SharePoint Augmented Reality Humor Hiring/Firing Fraud Battery Digital Signage Customer Service Shadow IT Remote Worker Environment Legal Cryptocurrency Fax Server Internet Exlporer Business Intelligence Procurement GDPR Hosted Computing Social Network WIndows 7 Tablet Wireless Internet Online Shopping Investment Domains Employee/Employer Relationships Relocation File Sharing Employees Public Computer Regulations Camera Windows 365 Inventory IaaS Transportation Specifications ISP Maintenance Bloatware Computer Fan Wire Video Conferencing Rootkit Evernote ROI Video Games Bitcoin Worker Commute Travel Shortcuts Sales Printers Point of Sale Windows Media Player Workers Personal Experience Benefits Millennials Cryptomining User PowerPoint Tablets Scalability Entrepreneur FENG Smart Office Supply Chain Management Wireless Charging IBM Batteries Business Owner Monitoring NarrowBand Flash Virtual Private Network Windows 8.1 Digitize Smart Technology Workforce Managing Stress Shortcut Search Cost Management Cables Windows Server 2008 R2 Supercomputer Social Networking iPhone Cameras Software Tips Customer relationships Sync Project Management Email Best Practices Emails Nanotechnology IT Assessment Telecommuting Manufacturing Cortana Digital Signature Managed IT Service Running Cable Security Cameras Files Computer Tips Memory Chromecast Warranty Virtual CIO Netflix OneDrive Two Factor Authentication Biometric Security Root Cause Analysis HVAC Peripheral Google Apps Knowledge Analysis Using Data Music Colocation Printer Server Uninterrupted Power Supply HBO Digital Security Cameras Skype Administrator Devices Copiers 5G Monitor Data loss Enterprise Content Management Quick Tip Leadership Accountants Troubleshooting Smartwatch Science Outlook MSP Ergonomics Start Menu Microchip Thought Leadership Development Credit Cards OLED Reputation Streaming Media Screen Mirroring Password Management PCI DSS Loyalty Password Manager Virtual Machine Fiber Optics Distributed Denial of Service Content Books Multi-Factor Security Employee Customer Relationship Management Tech Support Frequently Asked Questions 2FA Analyitcs Laptop Mobile Search Engine Windows 10s Twitter Messaging Cabling Techology Programming Customers Cast NIST Policy Business Mangement Hypervisor webinar Smart Tech Trend Micro Audiobook Emergency Trending Tip of the week Dark mode Touchpad Professional Services Public Cloud Addiction SMS Employer Employee Relationship Amazon Default App Antivirus Consultant Procedure Assessment Recycling Saving Time Practices Shopping Politics Google Search Advertising Analytics Windows 8 Windows Server 2008 Wiring dark theme Tools Cache AI Amazon Web Services IT Infrastructure IT service Bing Best Available Notifications Safe Mode FinTech Television Criminal

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code