M
y advice when it comes to the Google Chrome web browser isn’t as brutal as many in the security space. In short, I don’t shout, “Do. Not. Use.” Rather, use it if you like it, but be aware that it’s the primary browser targeted by threat actors because of its reach. That means being particularly cautious, employing the best of best security practices, and doing so without fail. That same advice applies to all browser usage, and when it comes to the security of your networks and data, every browser is an avenue of attack on the threat map. (I’m tempted to say threat satnav as increasingly victims are targeted to that degree of specificity, but I digress.) Again, it’s that important word: reach. You’re at greater risk of getting swept up by the broad brush of “less-targeted” attacks, shall we call them, when using Chrome as there are simply more people to catch in each digital dustpan. I’m oversimplifying, of course, but you get the point.
A good example of what I’m talking about comes by way of browser extensions and the risk posed by these seemingly harmless creatures of convenience. More to the point, the risk posed by rogue extensions.
Again, this applies to all browsers that allow extensions, add-ons and plugins, but reach, reach, reach.