top of page

Why you need to control Browser Extensions

  • Writer: Brady Woudstra
    Brady Woudstra
  • Mar 13
  • 2 min read

Web browser extensions can be incredibly useful. Password managers, grammar tools, and productivity add-ons can save time and improve workflows.


The problem is that many extensions request access to far more data than users realize. Some can read everything on a webpage, access browsing history, or interact with corporate applications like email, CRMs, or financial systems.


Without oversight, employees can unknowingly install extensions that introduce security risks to your organization.


With a few simple settings, you can help lower the risk by limiting which browser extensions can be installed and remove unnecessary ones.


Why Browser Extensions Can Be Risky

When someone installs an extension in Chrome, Edge, or FireFox, they are often granting that software permission to interact with data inside the browser.


Depending on the extension, this could include access to:

  • Email content

  • Documents in Google Workspace or Microsoft 365

  • Login sessions and authentication tokens

  • Browsing activity

  • Data entered into forms


Even legitimate extensions can become risky if they are sold to a new developer, compromised, or updated with malicious code.


There have been several real-world incidents where popular extensions were used to collect data or inject ads into webpages. (https://thehackernews.com/2026/01/researchers-uncover-chrome-extensions.html or https://www.malwarebytes.com/blog/news/2025/12/sleeper-browser-extensions-woke-up-as-spyware-on-4-million-devices)


We see lots of different types of malicious extensions - some include PDF converters, YouTube downloaders, "ad blockers", Coupon finders, and many more.


A Better Approach: Only Allow Approved Extensions

Instead of letting every employee install whatever they want, a safer approach is to:

  • Allow only approved extensions

  • Block all others by default

  • Remove extensions that are no longer needed


This approach keeps useful tools available while preventing unknown or risky extensions from being installed.


How to Control Extensions in Google Workspace

If your organization uses Chrome with Google Workspace, administrators can control browser extensions through the Google Admin Console.


The policy settings allow you to:

  • Block all extensions by default

  • Allow specific approved extensions

  • Force install required extensions

  • Remove extensions that users installed previously


settings #1
Navigating the the Settings area for Apps & Extensions

Settings #2
Edit the Settings

Settings #3
Stronger settings to minimize risk - but make sure to create the Allow list before blocking extensions.

  • Settiings #4
    Configuring the allow list for Web Apps and Extensions - Yellow + Button in the bottom corner

These settings can be found in the Chrome management section of the Admin Console and applied to specific organizational units or groups.


The official Google documentation explains the configuration options in detail.


Other Management Options

If your organization manages devices with Group Policy, Microsoft Intune, or another device management platform, you can control extensions using the Chrome Enterprise policies.


Similarly, Microsoft Edge and FireFox also provide management and control options for minimizing risk and securing your environments.


This approach works especially well when Chrome is deployed using the Chrome Enterprise installer, allowing policies to be enforced across managed devices. https://chromeenterprise.google/download/


Want Help Reviewing Your Settings?

Many organizations already have the tools they need to improve security in platforms like Microsoft 365, Google Workspace, and device management systems.


We help businesses identify these opportunities and implement practical improvements that reduce risk without adding unnecessary complexity.


Schedule a conversation to review your environment and identify quick wins for improving your cybersecurity posture.

Schedule a free consultation

 
 
bottom of page