094 90 48200    Get SUPPORT

Aniar IT Services Blog

Evaluating the Security of Your Chrome Extensions

Evaluating the Security of Your Chrome Extensions

Google Chrome is currently used by 69 percent of global desktop Internet users, as of July of 2020. With such a large amount of people using Chrome, its security becomes even more important… which makes it all the worse that many people are unaware of the permissions that some of its extensions claim.

Let’s go over how you can review how much of your data these Chrome extensions can access, and how you can adjust these permissions more to your liking.

Fair warning: This will naturally require you to change a few settings, so don’t be afraid to reach out to your IT provider to confirm these changes are okay to make and for assistance in doing so.

What Permissions Have Extensions Been Granted?

Here’s the thing—the extensions that you have installed into the Chrome browser, much like the applications that can be installed on a mobile device, will require some of your browsing data in order to function. Many extensions and applications, however, take claim of far greater permissions than their functionality requires in practice. In fact, a recent analysis of extension permissions shows that over a third of all extensions do this!

Here are a few steps that allow you to evaluate your Chrome extension permissions and help you to avoid granting them too much access in the future.

Step One: Evaluate Your Current Permissions

First, you will want to find out how many of your installed extensions currently ask for too much. To do so, you’ll need to type chrome:extensions into the address bar and go through the Details of each extension that appears on the page.

There, you’ll find a line annotated with Site access. There are various access levels that an extension can have once it is installed, including no access at all. What this means is that your web activity isn’t accessible by the extension at all. The other levels include:

  • On click – This means that an extension can access and alter data in your active tab when you click on the extension’s shortcut.
  • On specific sites – This means that only certain websites allow the extension to access and alter what is presented in the browser.
  • On all sites – This means that there are no restrictions on an extension, allowing it to access and alter data at any time.

Certain types of extensions may need this kind of access, while others will not. It is up to you to determine what access is appropriate for each to need, based on what they use to operate.

Step Two: Adjusting Your Current Permissions

If an extension doesn’t need the level of permissions that it demands, do everything you can to address this by adjusting its settings. If the extension allows this, these permissions can be adjusted by simply selecting your preferred option under Site access. Whenever possible, following a principle of least privilege is the safest bet for your data.

Step Three: Keep Permissions in Mind Moving Forward

Once your extensions’ access permissions are in check, you don’t want to just fall back into your old habits with any new extensions you add. Remember, these extensions prompt you with a brief dialog box explaining its default accessibility settings… pay attention to them. Whenever you activate an extension moving forward you need to be sure to keep these permissions in mind. It may be the difference between installing an extension or finding another option.

Aniar IT Services can help you manage all your business technology through our proactive managed services and support. To find out more about our services, reach out to our team by calling 094 90 48200.

Include Your Staff in Your Security Strategies
There’s Scheduling, and Then There’s SMART Schedul...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 21 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Productivity Business Computing Best Practices Cloud Email Privacy Network Security User Tips Workplace Tips Innovation Hosted Solutions Efficiency Google Internet Data Microsoft IT Support Hackers Software Hardware Data Backup Business Collaboration Communication Small Business Managed IT Services Cybersecurity VoIP Data Recovery Windows 10 Smartphones Tech Term Phishing Mobile Device Computer Cloud Computing IT Services Smartphone Communications Users Malware Mobile Devices Android Gadgets Backup Outsourced IT Business Continuity Network Artificial Intelligence Browser Saving Money Windows Facebook Information Disaster Recovery Miscellaneous Managed Service Business Management Internet of Things BDR Quick Tips Chrome Upgrade Server Spam Passwords BYOD Office 365 How To Automation Social Media Router Apps Applications Encryption Microsoft Office Windows 7 Computers Data Security Blockchain Data Storage Mobile Office Paperless Office Save Money Holiday Word Covid-19 Cybercrime Wi-Fi Operating System Money Display Managed IT Human Resources Infrastructure Remote Monitoring Settings Networking Staff Bandwidth Virtualization Government Remote Work Data Protection Patch Management HIPAA Mobile Device Management History Ransomware Vulnerability Two-factor Authentication Telephone System Connectivity Data Breach Sports Machine Learning Access Control Vendor Management Compliance Digital Signage Law Enforcement Meetings Google Drive Hard Drive Cryptocurrency Telephony CES Training Fraud Software as a Service Scam Update Audit Office Business Intelligence Education Managed Services Provider Private Cloud IT Plan Keyboard Content Management Botnet Big Data VPN OneNote Password Procurement Website Unsupported Software Virtual Assistant Managed IT services Business Technology Redundancy Voice over Internet Protocol Telephone Systems Employee/Employer Relationship Health Social Engineering Wireless Avoiding Downtime Spam Blocking Identity Theft Servers Bring Your Own Device Comparison IT Management Processor Vendor Augmented Reality Help Desk Google Docs App Data Management Virtual Reality Professional Services Printer Tip of the week Solid State Drive Workers Going Green Specifications 5G Managed IT Service Mobile Computing Windows 10s Evernote Cleaning Development Trending Downtime Cryptomining FinTech The Internet of Things Screen Mirroring ROI Personal HaaS Hacker Recycling Devices Project Management Quick Tip Cabling Fiber Optics YouTube Mouse Windows Server 2008 Physical Security Authentication Saving Time Google Search Employer-Employee Relationship Smart Office HBO Practices Messaging Safe Mode Security Cameras Root Cause Analysis Cache Remote Worker Database Telecommuting Apple Cast Amazon GDPR Digitize Shortcuts eWaste Thought Leadership Bitcoin Regulations Cables Trend Micro Microchip Computer Care Supply Chain Management Save Time Wireless Internet OLED Using Data Document Management Camera Outlook Public Cloud Charger Hosted Computing SMS Smartwatch Skype Wiring Travel Conferencing Amazon Web Services Accountants Remote Computing IT Assessment Enterprise Content Management Mobility Legal Batteries PCI DSS Data loss Default App Shopping Search Engine Computer Fan Password Manager Nanotechnology Managed Services Proactive IT Tools Work/Life Balance USB Biometric Security Information Technology Printers Frequently Asked Questions Recovery Software Tips Wireless Charging Inventory Virtual Machine AI Start Menu Firewall RMM Windows Server 2008 R2 OneDrive Password Management Social Sync Multi-Factor Security Criminal Twitter Virtual Private Network Millennials Cortana Policy Alert Digital Signature IT Infrastructure Social Network Bing WiFi FENG Business Mangement Smart Tech MSP Net Neutrality Electronic Medical Records Wire Manufacturing Computing Entertainment Warranty Excel Google Apps Hypervisor Remote Employee Remote Workers Unified Threat Management Employees Online Shopping Copiers NIST Addiction Value Workforce Procedure Credit Cards PDF Investment Printing HVAC Flash Gmail Peripheral File Sharing ISP Tech Support Hiring/Firing Wireless Technology IBM Safety Productivity Fun Marketing Budget Regulation Customer Relationship Management Personal Information Competition IP Address Company Culture Emergency Customer Service Financial Hard Drives Search Domains Managing Stress Windows 10 CrashOverride Public Speaking Presentation Managed Service Provider Lithium-ion battery