Archives - Browser Extensions

Use the HTTPS Everywhere plugin on Google Chrome

The “S” in HTTPS in a URL is an indication that you can trust that website with your personal information. To avoid using sites without the “S,” you can install a plugin on Google Chrome, which automatically switches sites from HTTP to HTTPS. To add the plugin: Go to Home in the Chrome web store. […]

Browse securely with the HTTPS Everywhere plug-in

The HTTPS Everywhere plug-in claims to enhance security by encrypting user communications with a wide variety of websites. It’s available for most major online and mobile browsers, like Chrome, Firefox, Edge and Opera.

New computer — secure your web browser

When you first install a web browser on a new computer, it will not usually have secure settings by default, you will need to adjust your browser’s security settings manually. Securing your browser is another critical step in improving your computer’s security by reducing attacks that take advantage of unsecured web browsers.

Weed out old Chrome Extensions

Outdated Chrome Extensions can be exploited by malicious actors. Periodically review your Extensions to make sure they appear in good working order and that they’re properly updated. If you’re no longer using an Extension, delete it, particularly if it appears to no longer be supported by the developer.

Set up a VPN for remote access to workplace applications

Some companies require employees to use virtual private networks (VPNs) to access applications while out of the office. Even if not a technical requirement, though, it’s a good idea to use a VPN so that you avoid risks such as data interception from man-in-the-middle attacks, as well as ISP surveillance. VPNs are available as both […]

Remove unused browser extensions to improve performance and security

Browser extensions can be useful, but they can also consume inordinate CPU resources and potentially expose sensitive data. Regularly review your extensions to see if you really need them and remove any that aren’t used or essential. Also pay attention to the permissions each one asks for when you install it.