Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Evaluating the Security of Your Chrome Extensions

Evaluating the Security of Your Chrome Extensions

Google Chrome is currently used by 69 percent of global desktop Internet users, as of July of 2020. With such a large amount of people using Chrome, its security becomes even more important… which makes it all the worse that many people are unaware of the permissions that some of its extensions claim.

Let’s go over how you can review how much of your data these Chrome extensions can access, and how you can adjust these permissions more to your liking.

Fair warning: This will naturally require you to change a few settings, so don’t be afraid to reach out to your IT provider to confirm these changes are okay to make and for assistance in doing so.

What Permissions Have Extensions Been Granted?

Here’s the thing—the extensions that you have installed into the Chrome browser, much like the applications that can be installed on a mobile device, will require some of your browsing data in order to function. Many extensions and applications, however, take claim of far greater permissions than their functionality requires in practice. In fact, a recent analysis of extension permissions shows that over a third of all extensions do this!

Here are a few steps that allow you to evaluate your Chrome extension permissions and help you to avoid granting them too much access in the future.

Step One: Evaluate Your Current Permissions

First, you will want to find out how many of your installed extensions currently ask for too much. To do so, you’ll need to type chrome:extensions into the address bar and go through the Details of each extension that appears on the page.

There, you’ll find a line annotated with Site access. There are various access levels that an extension can have once it is installed, including no access at all. What this means is that your web activity isn’t accessible by the extension at all. The other levels include:

  • On click – This means that an extension can access and alter data in your active tab when you click on the extension’s shortcut.
  • On specific sites – This means that only certain websites allow the extension to access and alter what is presented in the browser.
  • On all sites – This means that there are no restrictions on an extension, allowing it to access and alter data at any time.

Certain types of extensions may need this kind of access, while others will not. It is up to you to determine what access is appropriate for each to need, based on what they use to operate.

Step Two: Adjusting Your Current Permissions

If an extension doesn’t need the level of permissions that it demands, do everything you can to address this by adjusting its settings. If the extension allows this, these permissions can be adjusted by simply selecting your preferred option under Site access. Whenever possible, following a principle of least privilege is the safest bet for your data.

Step Three: Keep Permissions in Mind Moving Forward

Once your extensions’ access permissions are in check, you don’t want to just fall back into your old habits with any new extensions you add. Remember, these extensions prompt you with a brief dialog box explaining its default accessibility settings… pay attention to them. Whenever you activate an extension moving forward you need to be sure to keep these permissions in mind. It may be the difference between installing an extension or finding another option.

Total Tech Care can help you manage all your business technology through our proactive managed services and support. To find out more about our services, reach out to our team by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Smartphones Business Continuity Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Phishing Managed IT Services Upgrade Windows Outsourced IT Data Backup Ransomware Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Gadgets Virtualization Saving Money Holiday Social Media Chrome Tech Term Automation Managed Service Managed IT Services Microsoft Office Computers Artificial Intelligence Facebook Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Networking IT Support Health Hacking Internet of Things Spam Alert Office 365 Telephone Systems Remote Information Technology Information Managed Service Provider Covid-19 Bandwidth Recovery Employer-Employee Relationship Router Social Engineering BDR Mobility Remote Monitoring Mobile Computing Password Money App History Application Encryption Applications Data Breach Human Resources Big Data Law Enforcement How To Mobile Office Managed IT Data Storage Apps Patch Management Office Tips Training Blockchain Paperless Office VPN Government Remote Computing Private Cloud HaaS Flexibility Marketing Bring Your Own Device WiFi Data Management IT solutions Work/Life Balance Entertainment Website Budget Vulnerability Wireless Windows 7 Word Gmail Google Drive Servers Settings Avoiding Downtime Two-factor Authentication Infrastructure Voice over Internet Protocol Data Security Mouse RMM User Error Save Time Meetings Data Protection Cleaning Risk Management Hacker Conferencing USB End of Support Scam The Internet of Things Lithium-ion battery Education Physical Security Safety Staff Software as a Service Telephone System Sports HIPAA Vendor Management Machine Learning Redundancy Vendor Keyboard Connectivity Firewall Remote Work Managed Services Display Virtual Reality Apple Social Employee/Employer Relationship Solid State Drive Wireless Technology Fraud Unified Threat Management How to Value Downtime Remote Worker Computing Computer Accessories Spam Blocking Electronic Medical Records Cryptocurrency Data storage Wearable Technology Automobile Hard Drives Hiring/Firing Retail Instant Messaging Computing Infrastructure Comparison Robot Excel Printer Digital Signage Going Green Bluetooth CES Biometrics Virtual Desktop Content Management Business Intelligence Procurement Battery Business Technology Net Neutrality Access Control DDoS Shadow IT Workplace Strategy Audit Legal Worker IT Consultant SharePoint IT Management Help Desk Virtual Assistant Authentication Internet Exlporer Printing Botnet Humor IT Plan PDF Customer Service Environment Managed Services Provider Update Unsupported Software Database Proactive IT Fax Server Charger Best Practice Google Docs Remote Workers Compliance SaaS YouTube Identity Theft OneNote Processor Computer Care Black Market Current Events Telephony Hard Drive Samsung Network Congestion eWaste Virus Document Management Augmented Reality PowerPoint 5G Search Engine Windows Media Player Twitter User Skype Copiers Tablets Quick Tip Entrepreneur Data loss NIST Business Mangement Files Troubleshooting Smart Tech Ergonomics Trending Outlook Leadership Smartwatch OLED Addiction Chromecast Amazon Shortcut Managing Stress Start Menu Development Recycling PCI DSS Cost Management Screen Mirroring Virtual Machine Loyalty Wiring Colocation Books Practices Uninterrupted Power Supply 2FA Social Networking Frequently Asked Questions Fiber Optics Cameras Employee Windows 10s Cabling Cache Amazon Web Services Mobile Messaging Criminal Policy Cast Hypervisor Safe Mode Monitor GDPR Emergency Hosted Computing Running Cable Dark mode Tip of the week Trend Micro webinar Memory Public Cloud Default App Employer Employee Relationship Wireless Internet Online Shopping Professional Services SMS Streaming Media Procedure Saving Time Assessment File Sharing Reputation Camera Inventory Tech Support dark theme Specifications Windows Server 2008 Shopping Printer Server Content Google Search AI IT Infrastructure Techology Wire Laptop Evernote Tools FinTech Travel Television Bing Customers Printers Millennials Social Network Science Audiobook Investment Smart Office Touchpad Wireless Charging Employees Employee/Employer Relationships Public Computer ISP Virtual Private Network Advertising Transportation Distributed Denial of Service Windows 365 Workforce Customer Relationship Management Regulations Politics Video Conferencing Analyitcs Computer Fan ROI Rootkit Cables Notifications Sales Programming Bitcoin Shortcuts Workers Cryptomining Project Management Benefits Nanotechnology Point of Sale Telecommuting Personal Supply Chain Management FENG Cortana Digital Signature Antivirus Monitoring Consultant Batteries IBM Relocation Warranty Smart Technology Windows 8.1 Flash Digitize Windows 8 Analytics Windows Server 2008 R2 Video Games HVAC Google Apps IT service Analysis Customer relationships Best Available Software Tips Worker Commute Supercomputer Experience Emails Manufacturing Administrator Devices Email Best Practices WIndows 7 Sync IT Assessment Tablet Scalability Enterprise Content Management Domains Accountants Computer Tips Managed IT Service Business Owner Security Cameras MSP Netflix Biometric Security Microchip Two Factor Authentication Thought Leadership IaaS NarrowBand Virtual CIO Credit Cards Maintenance OneDrive Peripheral Bloatware Root Cause Analysis Search Password Management Password Manager iPhone Music Digital Security Cameras Multi-Factor Security HBO Using Data Knowledge

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code