5 ChromeOS settings you should change for a more secure Chromebook

ChromeOS is not merely a simplified operating system.
ChromeOS is also a relatively secure operating system - thanks to its multiple layers of protection for preventing things like viruses and malware from harming your device and accessing your data.
This is an essential security move, whether or not you use ChromeOS. Two-step verification adds yet another layer of security to the login process of online accounts.
First, make sure you've enabled 2FA on your Google account.
Let's say you install a basic game on ChromeOS and, by default, it enables access to the camera or the mic - or both.
ChromeOS makes it possible to enable/disable access to either piece of hardware.
To do that, open Settings and go to Privacy And Security > Privacy Controls.
Click on either one, scroll through the list of apps, and disable access for any app that shouldn't need to use the feature.
With this feature, you can set ChromeOS to use DNS over HTTPS- which encrypts all of your DNS activity so no one can spy on you.
Also: 5 things ChromeOS needs to rival MacOS. To enable this feature, go to Settings > Privacy and Security.
To learn more about using DNS over HTTPS, check out How to configure specific DNS servers on your Chromebook.
Out of the box, ChromeOS - and the Chrome browser - will sync everything to your Google account, so that any browser or Chromebook you have associated with your account can use the same data.
Also: ChromeOS finally steals a faster multitasking feature from Windows and MacOS. With ChromeOS sync, you get only four options to enable or disable: apps, settings, Wi-Fi networks, and wallpaper.
I disable all four because I don't want any of those settings - especially Wi-Fi networks - winding up in the wrong hands.
To customize your sync, go to ChromeOS Settings > Privacy and Security > Sync and Google Services > Manage what you sync.
There are times I have house guests who'll need to use a laptop to browse - but who don't use ChromeOS. Although I'm happy to let them use a Chromebook, I do not want to simply hand over my laptop and let them use my account.
Instead, I use guest browsing - aka guest mode - a special, minimal) account with zero access to my data - it's nothing more than a web browser that doesn't save data from login to login.
Also: 5 ways to improve your Chrome browser's security.
To enable guest browsing, go to Settings > Privacy and Security > Manage Other People.
Once you've taken care of these settings, ChromeOS will be a bit more secure.


This Cyber News was published on www.zdnet.com. Publication date: Tue, 02 Jul 2024 21:43:09 +0000


Cyber News related to 5 ChromeOS settings you should change for a more secure Chromebook

5 ChromeOS settings you should change for a more secure Chromebook - ChromeOS is not merely a simplified operating system. ChromeOS is also a relatively secure operating system - thanks to its multiple layers of protection for preventing things like viruses and malware from harming your device and accessing your data. ...
2 days ago Zdnet.com
Chromebook SH1MMER exploit promises admin jailbreak The Register - Users of enterprise-managed Chromebooks now, for better or worse, have a way to break the shackles of administrative control through an exploit called SHI1MMER. SH1MMER - you may pronounce the "1" as an "i" - is a shim exploit, or more specifically, ...
1 year ago Packetstormsecurity.com
New Sh1mmer ChromeBook exploit unenrolls managed devices - A new exploit called 'Sh1mmer' allows users to unenroll an enterprise-managed Chromebook, enabling them to install any apps they wish and bypass device restrictions. When Chromebooks are enrolled with a school or an enterprise, they are managed by ...
1 year ago Bleepingcomputer.com
New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices - A new exploit has been devised to "Unenroll" enterprise- or school-managed Chromebooks from administrative control. Enrolling ChromeOS devices makes it possible to enforce device policies as set by the organization via the Google Admin console, ...
1 year ago Thehackernews.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
The dark side of Optimize Mac Storage: What you need to know if you rely on it - During the course of the past few days, it's become clear to me that there is a serious architectural problem with how Apple manages files on the Mac with iCloud, and that design flaw can lead to extensive data loss. If you have more data in your ...
1 year ago Zdnet.com
How to Set Up a VLAN in 12 Steps: Creation & Configuration - Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps - particularly steps five through eight - may be completed simultaneously, in a slightly different order, or ...
6 months ago Esecurityplanet.com
How to lock a file or folder in MacOS Finder - Of course, when you have those types of sensitive documents, you'd want them stored more securely than within a locked file. If the files are less sensitive yet you still don't want anyone monkeying with them, MacOS Finder has a feature that can help ...
5 months ago Zdnet.com
VMware vCenter RCE Vulnerability: What You Need to Know - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 week ago Securityboulevard.com
5 Types of Crypto You Didn't Know Existed - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Hackread.com
Particle Network's Intent-Centric Approach Aims to Simplify and Secure Web3 - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
7 months ago Hackread.com
Hackers Advertising of Pulse Connect Secure VPN RCE 0-Day - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Cybersecuritynews.com
Secure Your API With JWT: Kong OpenID Connect - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Feeds.dzone.com
NSA, CISA Released Guidance And Best Practices To Secure The AI - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Cybersecuritynews.com
Webinar: How to secure Microsoft Copilot & Gen AI - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 week ago Securityboulevard.com
AnyDesk Urges Password Change Amid Security Breach - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
5 months ago Hackread.com
Microsoft Alerts More Users in Update to Midnight Blizzard Hack - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 days ago Gbhackers.com
Microsoft tells more customers their emails have been stolen The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
4 days ago Go.theregister.com
Android 15's Private Space feature could better protect your sensitive data - You probably already secure your Android phone with a PIN, a facial scan, or a fingerprint. If you've ever wanted to give certain data an extra later of protection, Android 15 will let you do just that via a new feature called Private Space. As ...
2 months ago Zdnet.com
Lee County student Chromebooks hacked in 'Cyber Monday prank' - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
7 months ago Nbc-2.com
Google to Delete Inactive Gmail Accounts From Today - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
7 months ago Hackread.com
US Man Jailed 8 Years for SIM Swapping and Apple Support Impersonation - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
7 months ago Hackread.com
Stellar Cyber Bridges Cybersecurity Skills Gap with First-of-Its-Kind University Program - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
7 months ago Hackread.com
Microsoft Outlook Vulnerability Exploited by Russian Forest Blizzard APT - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
7 months ago Hackread.com
Int'l Dog Breeding Org WALA Exposes 25GB of Pet Owners Data - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
7 months ago Hackread.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)