Web Browser Lockdown

Jordan

I’m part of the generation, at least in this part of the world, who got to watch the internet grow up as I did.  I don’t remember my dad buying our first computer, but I definitely remember having one before the internet was something normal people had access to. I remember the days of being able to access a free dial up email account that came with a few megabits of free data each month. Fast forward to today, almost everyone I know has WiFi and most of my friends carry a phone with nearly unlimited high-speed internet access. In fact, many of the things I do in my job on a daily basis are simply not possible without the internet.

While I love having easy access to the internet, having so much of our lives on the internet has created a whole new set of challenges. The two primary issues that come to mind are security and privacy. Each of which are big enough topics that many articles and even books have been written about them. For this article I will try to focus more on the security side of things though it is very important to think about the privacy implications of your choices and the ‘features’ you opt into as you go along, and whether the benefits are worth the risk imposed by the invasion of your privacy, and in this regard what’s good or bad become much more subjective.  On the other hand when I refer to internet security I’m talking about things to do to help you keep from getting hacked or infected with a virus, which I think we can all universally agree would be a bad thing.

So what can you do to protect yourself? Well if you’re a regular reader you may recognize many of these since keeping safe from bad things that come from the internet is what many of our articles boil down to.  There is a scale of how much trouble you are willing to go through.

So on a scale of 1-5, where 1 is pretty easy and offers the least protection to 5 being completely virus proof here are our recommendations

  1. Don’t use the built in web browser – The built in web browsers tend to be the slowest to get fixed when a problem is found, and also tend to have the most attention trying to break them so for the simplest fix we recommend: Google Chrome , or Firefox.
  2. If you’re ready to take it up a notch without going to crazy the next recommendation we would have is to install the Disconnect.me add on for your browser which blocks many third party connections when you’re browsing the web or you could even level up to the Aviator browser , built off of Google chrome but with all the nobs, dials and switches set by default for maximum security and disconnect.me installed by default.
  3. If you want still better privacy and security here is a list of our favorite add-ons for browsers. We think the value of having these installed is well worth the added security, but be warned using these plug-ins will require maintenance and some tweaking to get some webpages to load right. For Aviator and Chrome the best javascript blocker I’ve found is called ScriptSafe but is listed in the chrome web store as ScriptNo. For Firefox we use a plug-in called NoScript. These plug-ins will block all Javascript code in the web pages from running by default, but will allow you to selectively enable domains as needed to get the page to load. I also really like the Ghostery plug in, available on both Chrome based browsers and Firefox. Ghostery is more of a privacy tool, providing very granular site by site control over whether your browser loads content provided by tracking companies, and/or accepts third party cookies. All of these recommended browsers also support several Password managers including Lastpass so make sure to get yourself a good password manager as well.
  4. Now we’re going really hard core, almost off the deep end in fact. So you’ve configured your primary browser with all the best plug-ins but still you want more. Well I think the best I can do for you is to give you some pointers and let you go exploring yourself. For added security you get get this cool program called a Hypervisor which will allow you to run other computers (call virtual machines) on your computer as if each computer was its own applications. The two most commonly used are VirtualBox (free for personal or commercial use) and VMware Player (free for personal use only).  You can then install operating systems like Ubuntu , PCbsd , Tails , Whonix or other free operating systems each with their own securely configured browsers and segment your browsing habits into different security zones and use a different browser in a different virtual machine for each type of browsing. Another hyper secure distribution of Linux that is worth mentioning although it doesn’t work in VirtualBox due to the fact it requires having its own Virtual machines running inside of it is Qubes OS.
  5. I know there are some of you out there who got to the end of #4 and said to yourself “Is that it? Is that really all I can do to protect myself and my family?” Well for the real security conscious there is Level 5! Its a little long and complicated so rather then putting all that here Please see the Onions article titled “ After Checking Your Bank Account, Remember To Log Out, Close The Web Browser, And Throw Your Computer Into The Ocean ” While this article is geared toward banking it is equally applicable to any account that may require a username and password to access.

That’s it now all you have to do is pick your level of security and begin to implement the above prescription. If anyone would be interested in a walk through on how to set up your your browser at Level 3 or on using Virtual Machines like Level 4, please let me know in the coments. Have a great week and as always stay safe out there.

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers