Archives - Browser Extensions


Weed out old Chrome Extensions

Outdated Chrome Extensions can be exploited by malicious actors. Periodically review your Extensions to make sure they appear in good working order and that they’re properly updated. If you’re no longer using an Extension, delete it, particularly if it appears to no longer be supported by the developer.

Set up a VPN for remote access to workplace applications

Some companies require employees to use virtual private networks (VPNs) to access applications while out of the office. Even if not a technical requirement, though, it’s a good idea to use a VPN so that you avoid risks such as data interception from man-in-the-middle attacks, as well as ISP surveillance. VPNs are available as both […]

Remove unused browser extensions to improve performance and security

Browser extensions can be useful, but they can also consume inordinate CPU resources and potentially expose sensitive data. Regularly review your extensions to see if you really need them and remove any that aren’t used or essential. Also pay attention to the permissions each one asks for when you install it.

Block browser notifications unless you are actively trying to set them up

Many websites now give you the option to receive notifications directly from them, similar to an app. The prompt will usually provide options for “Allow” or “Block.” Most of the time, you’ll want to block them since they can be very intrusive and potentially lead you to risky sites.

Use the HTTPS Everywhere browser extension

This browser extension from the Electronic Frontier Foundation provides an extra layer of protection for your web browsing. It will encrypt your connection to different sites and services so that it is more difficult for anyone to track your activity. The extension is free to download and is available for most major web browsers.

What is a browser plug-in?

Occasionally browsers require the installation of additional software known as plug-ins to provide additional functionality. Like Java and ActiveX controls, plug-ins may be used in an attack, so before installing them, make sure that they are necessary and that the site you have to download them from is trustworthy.