Some security risks don’t look suspicious. They look helpful.
Browser extensions can add convenience, but they often have more access than most users realize. Many can read and change data across the websites you visit, meaning they can see what you type, view your activity, and interact with your sessions. In the wrong hands, this can expose sensitive information, including access to UTMB systems.
Why This Matters
Because extensions run inside your browser, they can access login pages, email content, and active sessions. A malicious or compromised extension could capture credentials or take actions as you while you are logged in.
In some cases, extensions may be added or modified without a user’s full awareness, especially if a system is compromised or administrative access is misused. This makes it important to periodically review what is installed in your browser.
In a healthcare environment like UTMB, this risk is especially important. Unauthorized access can impact patient data, internal systems, and overall security. Recent examples include fake or malicious extensions, such as AI-related tools, that appeared legitimate but quietly collected user data.
What to Watch For
Be cautious if an extension:
- Requests access to all websites you visit
- Comes from an unknown or unverified developer
- Has little information, few reviews, or a vague purpose
- Appears installed that you do not recognize or remember adding
If the permissions seem excessive for what it does, that is a strong warning sign.
Safer Habits
Only install extensions you truly need and use trusted developers from official browser stores. Review permissions before installing and avoid extensions that request more access than expected.
Regularly review your installed extensions and remove anything you do not recognize or no longer use. Fewer extensions mean less risk.
Reporting Suspicious Activity
If you notice an unfamiliar extension, unusual browser behavior, or suspect your account may be compromised, report it immediately to UTMB Information Security at cirt@utmb.edu.
Final Thoughts
Browser extensions may seem small, but they can have significant access to your activity. Being selective about what you install and regularly reviewing your browser are simple steps that help protect both your information and UTMB systems.