Google released a new version of Chrome last week for Windows, Mac, and Linux which includes several new security fixes. If you haven’t installed the update yet on your computer, now is the time! As is the case with similar updates, this new version addresses vulnerabilities that an attacker could exploit to take control of your organization’s systems.
It’s always good to be conscious of when your browser needs an update. If you or someone in your organization follows general cybersecurity news, you may periodically see articles about new updates or versions of applications your organization uses. Or, you may have noticed the little “Update” that suddenly appeared on your Chrome tab. Whatever the case, don’t wait and give hackers a chance to access your systems.
Need help implementing the update? Just follow the steps below.
How to Update Chrome
If you open Google Chrome and look to the top right corner of the page, you should see a small red or yellow oblong shape (red if more time has passed since the update has been released) containing the word “Update,” as pictured below. Click the column of dots to the right of “Update.”
This should open up a small drop-down menu that looks like the one pictured below. Click “Relaunch to Update Chrome” at the top.
This will initiate a pop up like the one below. Hit the “Relaunch” button. All your Chrome tabs will close, then almost immediately reopen. This only takes about a second and — boom! — you’ve installed the latest version of Chrome.
Periodic Updates
Aside from the benefits of working with the most up-to-date version of Google Chrome, this is also a good reminder to check and see if any of your other applications have new updates that need to be installed. Make sure you’re doing regular updates and patching in order to keep your systems secure and minimize vulnerabilities that could lead to breaches of sensitive data.
If you work for a larger organization, updates may be managed by in-house or third party IT. Or, your organization may have a software management policy, which forbids unauthorized software installation or updates on a computer system, workstation, or network server. If this is the case, you may have to request that management or IT personnel perform updates for you.
Whatever the case, always be on the lookout for updates and other changes you may need to make to keep your systems secure and organization data safe.
Have you performed a Risk Assessment in the past year? Do you have updated HIPAA Policies and Procedures in place? Our HIPAA Prime™ program does all this and more! We create customized compliance documents and provide your staff with easy online training, ensuring compliance for your organization.
Want to know more about our online HIPAA training or our customized compliance solution, HIPAA Prime? Email us at info@totalhipaa.com to learn more about how we can help your organization become (and stay!) compliant. Or, get started here.