Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 15 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Passwords Windows 10 Social Media Virtualization Saving Money Holiday Gadgets Tech Term Chrome Automation Managed IT Services Managed Service Microsoft Office Computers Cybercrime Operating System Artificial Intelligence Facebook Health BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Information Technology Remote Spam Covid-19 Information Office 365 Alert Managed Service Provider Telephone Systems Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility Encryption Mobile Computing Applications Data Breach Human Resources Application Law Enforcement Remote Monitoring Big Data App Password History Money Data Storage Patch Management VPN Remote Computing Government Blockchain Paperless Office Mobile Office Private Cloud How To Managed IT Office Tips Apps Training Gmail Vulnerability Flexibility Marketing Windows 7 Word Settings WiFi Google Drive IT solutions Entertainment Website Servers Two-factor Authentication Budget Avoiding Downtime Mouse HaaS Data Security Infrastructure Bring Your Own Device Voice over Internet Protocol Data Management Work/Life Balance Wireless Lithium-ion battery Conferencing End of Support Data Protection Physical Security Scam Education Safety Firewall HIPAA Sports Redundancy Keyboard Virtual Reality Vendor Management Apple USB Vendor Social Managed Services Telephone System Staff Software as a Service Display User Error Machine Learning Meetings Remote Work Connectivity Save Time Employee/Employer Relationship RMM Risk Management Hacker Cleaning The Internet of Things SharePoint Remote Worker Digital Signage Unified Threat Management Battery Cryptocurrency Shadow IT Computer Accessories Legal Business Intelligence Customer Service Audit Environment Procurement Internet Exlporer Worker Comparison Net Neutrality Workplace Strategy IT Management Fax Server Botnet PDF CES Help Desk Printer IT Plan Printing Bluetooth SaaS Business Technology Content Management Proactive IT Unsupported Software Access Control Managed Services Provider Best Practice Network Congestion Virtual Assistant YouTube Charger Database eWaste Authentication IT Consultant Black Market Compliance OneNote Remote Workers Computer Care Humor Current Events Processor Document Management Telephony Solid State Drive Wireless Technology Samsung Update Wearable Technology How to Downtime Hard Drives Hard Drive Retail Instant Messaging Value Google Docs Identity Theft Robot Data storage Excel Spam Blocking Electronic Medical Records Automobile Biometrics Computing Virtual Desktop Computing Infrastructure Hiring/Firing Augmented Reality Going Green Fraud DDoS Virus Windows Media Player Dark mode Techology Smart Tech Trend Micro User Laptop Assessment Trending PowerPoint Customers Amazon Default App Distributed Denial of Service Windows Server 2008 Customer Relationship Management Addiction SMS Audiobook Tools Procedure Analyitcs Recycling Saving Time Wiring dark theme Programming Practices Shopping Managing Stress Touchpad Television Google Search Cache AI Amazon Web Services IT Infrastructure Politics Safe Mode FinTech Advertising Criminal Bing Cameras Antivirus GDPR Hosted Computing Social Network Public Computer Wireless Internet Windows 8 Online Shopping Investment Notifications Transportation Regulations IT service File Sharing Employees Computer Fan Employee/Employer Relationships Rootkit Specifications ISP Camera Windows 365 Inventory Wire Video Conferencing Relocation Workers Tablet Evernote ROI Benefits Domains Sales FENG Bitcoin Travel Shortcuts Printer Server Millennials Cryptomining Printers Point of Sale Video Games Personal IBM Smart Office Supply Chain Management Wireless Charging Smart Technology IaaS Worker Commute Flash Maintenance Experience Monitoring Bloatware Batteries Workforce Virtual Private Network Windows 8.1 Scalability Software Tips Digitize Supercomputer Emails Tablets Cables Windows Server 2008 R2 Business Owner Sync Customer relationships Entrepreneur NarrowBand Telecommuting Manufacturing Project Management Email Best Practices Search Nanotechnology IT Assessment iPhone Netflix Cortana Two Factor Authentication Shortcut Computer Tips Root Cause Analysis Cost Management Digital Signature Managed IT Service Security Cameras Biometric Security Music Warranty Virtual CIO HBO Social Networking OneDrive Knowledge HVAC Peripheral Files Google Apps Consultant Skype Digital Security Cameras Data loss Analysis Using Data Chromecast Analytics 5G Troubleshooting Running Cable Administrator Outlook Devices Copiers Leadership Enterprise Content Management Quick Tip Colocation Memory Best Available Uninterrupted Power Supply Start Menu MSP Ergonomics Screen Mirroring Accountants WIndows 7 Loyalty Smartwatch Credit Cards OLED Books Microchip Frequently Asked Questions Thought Leadership Development Monitor Password Management PCI DSS Windows 10s Password Manager Virtual Machine Mobile 2FA Cast Fiber Optics Multi-Factor Security Employee Science Cabling Streaming Media Emergency Search Engine Tip of the week Twitter Messaging Reputation webinar Content Professional Services NIST Policy Public Cloud Business Mangement Hypervisor Tech Support Employer Employee Relationship

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code