Rivercity Technology Services LTD Logo
HomeAbout Us
Technology Services
Icon showing a support technician
IT Support Services
Cybersecurity Risk Management at one predictable flat rate.
Icon of light bulbs on a laptop screen
IT Consulting
Business optimization through the smart use of technology.
Icon showing a hand holding a phone
Business Phone Services
VoIP Telephone solutions from RCT. 
Icon showing a database and a cloud
Backups & Recovery
Cloud & On Premise - ready to recover!
Icon showing computer code on a monitor
Software Development
Web & Mobile App development
Icon showing website wireframes
Website Development & Hosting
Web design and full hosting & maintenance packages!
Icon showing an envelope being opened
Modern Email Management
Microsoft 365 email provisioning, security & management.
“You’re giving me the ‘it’s not you, it’s me’ routine? I invented ‘it’s not you, it’s me.’ Nobody tells me it’s them not me; if it’s anybody, it’s me.”
- George Costanza
Learning CenterContact Us
Book A Consultation
Close-up of a browser address bar

Do You Know if You Are Using a Malicious Browser Extension?

While many of the thousands upon thousands of browser extensions out there are made to help us save time, get more work done and personalize our online experience, not all give us that. Downloading a malicious browser extension without realizing it can be very harmful. It can affect your productivity and flood your work with annoying and unwanted advertising.

This type of malicious software is called adware and it is specifically designed to bombard you with adverts. Adware will also change your search engine and send you affiliate pages when making purchases, this type of activity is how the extension creators gain revenue. 

Cybersecurity word cloud with the words "Adware," "Permissions," "Analysis," "End-user" etc.

According to a recent report from a cyber security company, it is estimated that over the last couple of years more than 4 million of its customers have been a victim of adware hiding within their browsers. And because it hides within the browser, people don't realize they are being attacked.

In a worst-case scenario, these malicious extensions are hiding vicious malware that can infect your computer. This can lead to private data, such as logins and payments, being stolen by cybercriminals. Then, of course, there is a chance that it can spread across an entire network. To keep everything safe, make sure you are only downloading from a reliable and trusted source. This will greatly reduce the risk of an attack from browser extensions. Read reviews and look at ratings. If a browser extension seems too good to be true it probably is.

As the business owner, you might also look into controlling which extensions can be installed by your team. We can definitely help you with this, as well as making sure your software protection is up to date and providing security training (we make it FUN) for your team! 

Until next time, keep fit and have fun!

(TYYV) The Yada Yada Version:

While many of the hundreds of thousands of browser extensions out there are safe, there are many that are not. And yada yada yada you don't want to fall victim to adware as it can greatly harm your business.

Mitch Redekopp
Article Written by Mitch Redekopp
Related Articles
Featured image
USB Is About to Get an Exciting New Upgrade!
The USB first came out in 1996, so we all know what they are. We have been using them with our computers for over 20 years and we are now about to use them with...
2022 - Copyright, All Rights Reserved
crossmenu