Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Windows Upgrade Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Windows 10 Passwords Chrome Virtualization Social Media Tech Term Saving Money Gadgets Holiday Microsoft Office Managed Service Automation Managed IT Services Operating System Facebook Computers Cybercrime Artificial Intelligence Hacking Internet of Things BYOD Health Mobile Device Management Networking Wi-Fi IT Support Office 365 Telephone Systems Covid-19 Information Information Technology Alert Remote Managed Service Provider Spam Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Big Data Encryption Applications App History Mobile Computing Law Enforcement Application Human Resources Password Data Breach Money Remote Monitoring Blockchain Paperless Office How To Office Tips Training Government VPN Private Cloud Data Storage Patch Management Managed IT Remote Computing Apps Mobile Office Data Security Google Drive Flexibility Wireless Marketing Avoiding Downtime WiFi Infrastructure Voice over Internet Protocol IT solutions Gmail Entertainment Website Budget Settings Vulnerability Two-factor Authentication Windows 7 Word Bring Your Own Device Data Management Work/Life Balance Mouse Servers HaaS End of Support Meetings Physical Security Vendor Education Managed Services Safety Staff Software as a Service Display Telephone System HIPAA Sports Risk Management Hacker Machine Learning Redundancy Keyboard Connectivity Remote Work Employee/Employer Relationship The Internet of Things Lithium-ion battery RMM USB Conferencing Firewall Save Time Scam Data Protection Virtual Reality Apple Cleaning Social Vendor Management User Error Access Control Shadow IT Charger Wearable Technology Legal Managed Services Provider Compliance Retail Hard Drives Virtual Assistant Instant Messaging Authentication Internet Exlporer OneNote Database Computer Care Current Events Robot Excel Telephony Remote Workers Virus Biometrics PDF Samsung Virtual Desktop Unified Threat Management Processor Update Computer Accessories Proactive IT Value DDoS Hard Drive Best Practice Spam Blocking Google Docs Electronic Medical Records YouTube Identity Theft SharePoint Black Market Computing Hiring/Firing Printer Bluetooth Customer Service Augmented Reality Document Management Environment Solid State Drive Wireless Technology Fraud Fax Server How to Downtime Remote Worker Digital Signage Business Intelligence IT Consultant SaaS Cryptocurrency Data storage Audit Worker Automobile Humor IT Management Procurement Workplace Strategy Computing Infrastructure Botnet Comparison Net Neutrality Network Congestion eWaste Going Green IT Plan CES Help Desk Printing Unsupported Software Content Management Battery Business Technology Audiobook Cost Management Printers Point of Sale Personal Millennials Cryptomining WIndows 7 Supercomputer Social Networking Smart Office Supply Chain Management Touchpad Software Tips Wireless Charging Sync Batteries Emails Monitoring Politics Virtual Private Network Windows 8.1 Advertising Digitize Workforce Running Cable Cables Windows Server 2008 R2 Notifications Netflix Two Factor Authentication Memory Customer relationships PowerPoint Project Management Email Best Practices Windows Media Player Nanotechnology IT Assessment Root Cause Analysis Telecommuting Manufacturing User Knowledge Music HBO Cortana Relocation Skype Digital Signature Managed IT Service Security Cameras Computer Tips Warranty Virtual CIO OneDrive Data loss Biometric Security Managing Stress Leadership Troubleshooting Video Games Science HVAC Peripheral Outlook Google Apps Start Menu Analysis Using Data Worker Commute Cameras Digital Security Cameras Experience Administrator Devices Copiers Screen Mirroring 5G Loyalty Distributed Denial of Service Books Customer Relationship Management Scalability Enterprise Content Management Quick Tip Frequently Asked Questions MSP Ergonomics Mobile Accountants Windows 10s Smartwatch Business Owner Analyitcs Programming Microchip Thought Leadership Development NarrowBand Cast Credit Cards OLED Password Manager Virtual Machine webinar Emergency Search Password Management PCI DSS Tip of the week 2FA iPhone Professional Services Fiber Optics Public Cloud Multi-Factor Security Employee Employer Employee Relationship Printer Server Search Engine Twitter Messaging Cabling Assessment Antivirus Business Mangement Hypervisor Windows 8 NIST Policy Windows Server 2008 Dark mode Files Tools Smart Tech Trend Micro Trending IT service Addiction SMS Chromecast Amazon Default App Television Recycling Saving Time Tablet Procedure Wiring dark theme Colocation Practices Shopping Uninterrupted Power Supply Google Search Domains Cache AI Amazon Web Services IT Infrastructure Public Computer Criminal IaaS Bing Transportation Maintenance Safe Mode FinTech Monitor Regulations Bloatware GDPR Hosted Computing Social Network Computer Fan Rootkit Wireless Internet Online Shopping Investment Employee/Employer Relationships Streaming Media Workers Benefits Consultant Tablets File Sharing Employees Reputation Analytics Entrepreneur Camera Windows 365 Inventory Tech Support FENG Specifications ISP Content IBM Techology Wire Video Conferencing Laptop Evernote ROI Flash Bitcoin Travel Shortcuts Smart Technology Best Available Shortcut Sales Customers

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code