Tips to Stay Safe while Surfing the Web, Part 1: Web Browser Settings | CISA (2024)

Description

The Bottom Line

If you are a high-risk target, it is important that you take extra precautions when it comes to your online activity. Web browsers, such as Google Chrome and Microsoft Edge, are a rich target for threat actors because they collect extensive amounts of personal information. In addition, threat actors often use web browsers to spread malware since people rely on them heavily for access to the internet. To mitigate these risks, you should:

  1. Keep your browser up to date and routinely close out of it.
  2. Block third-party cookies and remove those already on your browser.
  3. Manage the advertising settings in your browser.
  4. Properly vet extensions before adding them to your browser.

The Problem

Threat actors often exploit vulnerabilities in web browsers to spread malware.

Web browsers are very attractive targets for cyber threat actors since they are one of the most commonly used apps. If you do not take the proper security precautions, threat actors can exploit vulnerabilities in your web browser and disseminate malware.

Web browsers collect mountains of personal information, which could be lost or exposed in a data breach.

Web browsers include several mechanisms that accumulate and store information that reveals a lot about your interests, habits, work, and identity. Since it can be hard to know who can access this information, surfing the web without taking measures to safeguard your privacy puts you at risk.

Here are some common ways that web browsers collect information about you:

  1. Site permissions. Websites will often request permission from your browser to access several categories of data, including your device’s:
    • Geolocational data
    • Camera
    • Microphone

Malicious websites could abuse access to your location, camera, and microphone to monitor your activity, conversations, and whereabouts.

Websites might also request your permission to send you pop-up notifications. When pop-up notification permissions are enabled on your web browser, a threat actor could use pop-up notifications as part of a phishing campaign or to deliver malware. The intention is to frustrate or overwhelm the user with pop-ups to get them to click on a link they otherwise would not have.

  1. Third-party cookies. Third-party cookies instruct your web browser to collect, store, and share information about your browsing habits, including your website history, search history, the links you click on, the content you interact with on social media, etc., and share this information with the cookie owner. Data brokers and advertising networks often use third-party cookies to compile and sell your information. Threat actors can also develop third-party cookies to obtain information about potential targets. In sum, third-party cookies pose risks to your privacy due to the vast amount of intimate information they can obtain and the difficulty of knowing who is receiving the information they collect.
  2. Stored data. In addition to third-party cookies, browsers themselves also store your information, including:
    • Browsing history – Your browser can record every website you have ever visited.
    • Saved form data – Your browser saves your personal data to autofill certain information fields on forms for you (e.g., name, email address, date of birth, address, phone number, and credit card information).
    • Locational data – Even without a Global Positioning System (GPS) device, your browser can use your IP address, Wi-Fi, and Bluetooth to collect and share information about your location with websites.
    • Account credentials – Many browsers give you the option to store your account credentials. This makes your credentials vulnerable to leakage if a cyber threat actor successfully exploits vulnerabilities in the browser or your operating system.
    • Download history – Your browser can show every file you have downloaded and the file path to where you have it stored on your device, making it easy for threat actors to find data of interest.
    • Personal data – Your browser can also collect data about your browsing habits and device activity and share it with third parties to deliver targeted advertisem*nts to you.

The Solution

Protect yourself against malware.

  • Keep your browser up to date with the latest security patches.
    • If available, turn on automatic updates.
    • Restart your browser regularly to allow the security updates to take effect. (Note: Some browsers may automatically download the newest updates but require the application to be closed and restarted to activate the newest update.)
  • If you are logged into an account associated with your web browser (e.g., you’re logged into your Google account while using Google Chrome, or logged into your Microsoft account while using Microsoft Edge), enable multifactor authentication to protect your account. (See Project Upskill Topic 2.2.)

Manage the advertising settings in your browser.

  • Turn off ad personalization in your browser settings. This can help limit access to some of your browser's stored data, including your browsing history.

Limit the amount of data that websites and third parties can obtain through your browser.

  • Block third-party cookies in your browser settings. Most browsers have this option under “Privacy & Security” in Settings. (Note: First-party cookies, or cookies that belong to the website you are visiting, may be required for the website to function properly. Accordingly, you can allow first-party cookies while rejecting third-party cookies that are not required for website functionality.)
  • Additionally, to clear third-party cookies that are already stored on your browser, you should select the option to "clear cookies" in your browser settings. (Note: This will remove all your cookies, not just the third-party ones, so you may find yourself needing to log back into some online accounts and services.)
  • Note: See USSOCOM’s Social Media Smart Cards for specific instructions on how to complete these steps for some of the most popular browsers.

Restrict site permissions as much as possible.

  • Do not give websites access to your location, camera, or microphone unless these permissions are required for the website to function properly.

Properly vet browser extensions.

  • Follow Project Upskill Topic 1.4 to ensure any browser extensions meet your privacy and security needs.
  • One extension that CISA recommends is AdBlock. AdBlock can help block advertisem*nts and unwanted pop-ups that carry malware. You can find a link to AdBlock on our webpage Free Cybersecurity Services and Tools | CISA.

Takeaways

Do

  • Update your browser regularly.
  • Close out of your browser regularly.
  • Enable MFA if your browser is connected with an account.
  • Turn off ad personalization in your browser settings.
  • Block third-party cookies in your browser settings.

Do Not

  • Neglect to update your browser with the latest security patches.
  • Give websites access to your location, camera, or microphone unless required for website functionality.
  • Install a browser extension without vetting it first.

Project Upskill is a product of theJoint Cyber Defense Collaborative.

Tips to Stay Safe while Surfing the Web, Part 1: Web Browser Settings | CISA (2024)
Top Articles
MacKenzie Scott Just Gave Away Another $640 Million. Here’s Where the Money Went
Why Do Canadians Pay More Than Americans?
What Did Bimbo Airhead Reply When Asked
UPS Paketshop: Filialen & Standorte
Amc Near My Location
Craigslist Vans
Kaydengodly
Bucks County Job Requisitions
Pitt Authorized User
Premier Boating Center Conroe
Sport Clip Hours
Diablo 3 Metascore
2016 Ford Fusion Belt Diagram
Mineral Wells Independent School District
Colorado mayor, police respond to Trump's claims that Venezuelan gang is 'taking over'
What Happened To Anna Citron Lansky
Locate At&T Store Near Me
Niche Crime Rate
Wgu Academy Phone Number
Project, Time & Expense Tracking Software for Business
Www.publicsurplus.com Motor Pool
Craigslist Battle Ground Washington
Valic Eremit
Hctc Speed Test
Arrest Gif
Jesus Revolution Showtimes Near Regal Stonecrest
Speedstepper
Free T33N Leaks
2004 Honda Odyssey Firing Order
Frank Vascellaro
Korg Forums :: View topic
Robot or human?
Does Iherb Accept Ebt
Western Gold Gateway
Vanessa West Tripod Jeffrey Dahmer
Bimmerpost version for Porsche forum?
How To Get Soul Reaper Knife In Critical Legends
Wsbtv Fish And Game Report
NHL training camps open with Swayman's status with the Bruins among the many questions
Dr Adj Redist Cadv Prin Amex Charge
Anhedönia Last Name Origin
Gasoline Prices At Sam's Club
Promo Code Blackout Bingo 2023
Shell Gas Stations Prices
Rs3 Nature Spirit Quick Guide
4k Movie, Streaming, Blu-Ray Disc, and Home Theater Product Reviews & News
Oklahoma City Farm & Garden Craigslist
Matt Brickman Wikipedia
Suzanne Olsen Swift River
Affidea ExpressCare - Affidea Ireland
Ravenna Greataxe
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 5968

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.