Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Cloud Computing Server Save Money Passwords Windows 10 Saving Money Holiday Social Media Tech Term Chrome Virtualization Gadgets Managed Service Automation Microsoft Office Managed IT Services Artificial Intelligence Facebook Operating System Cybercrime Computers BYOD Wi-Fi Mobile Device Management Networking IT Support Hacking Health Internet of Things Office 365 Covid-19 Telephone Systems Information Information Technology Managed Service Provider Remote Spam Alert Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Application Password Money App History Encryption Applications Big Data Human Resources Law Enforcement Data Breach Mobile Computing Remote Monitoring Managed IT Blockchain Paperless Office How To Apps Office Tips Training VPN Data Storage Patch Management Government Remote Computing Private Cloud Mobile Office Website Budget Bring Your Own Device Data Security Data Management Work/Life Balance Wireless Infrastructure Voice over Internet Protocol Gmail Google Drive Settings Vulnerability Windows 7 Word Two-factor Authentication Avoiding Downtime Flexibility Marketing Servers Mouse WiFi HaaS IT solutions Entertainment Meetings Vendor USB Managed Services Cleaning Software as a Service Display Telephone System Staff Risk Management Machine Learning Hacker Connectivity Remote Work End of Support Employee/Employer Relationship The Internet of Things Education Physical Security Lithium-ion battery RMM Safety Sports HIPAA Redundancy Conferencing Firewall Keyboard Scam Data Protection Virtual Reality Apple Vendor Management Social User Error Save Time Access Control Compliance Data storage OneNote Wearable Technology Automobile Computer Care Managed Services Provider Hard Drives Virtual Assistant Current Events Retail Authentication Database Instant Messaging Telephony Samsung Robot Computing Infrastructure Excel Going Green IT Consultant Remote Workers Biometrics Value Processor Virtual Desktop Update Humor Spam Blocking Battery Electronic Medical Records DDoS Hard Drive Shadow IT Legal Google Docs SharePoint Hiring/Firing Identity Theft Internet Exlporer Computing Customer Service PDF Environment Augmented Reality Fraud Proactive IT Business Intelligence Fax Server Digital Signage Remote Worker Audit Virus Worker Best Practice YouTube IT Management Cryptocurrency SaaS Unified Threat Management Black Market Computer Accessories Botnet IT Plan Procurement Network Congestion Comparison Net Neutrality Workplace Strategy eWaste Document Management Wireless Technology Unsupported Software CES Solid State Drive Help Desk Printing How to Downtime Printer Charger Bluetooth Business Technology Content Management Emails Personal Millennials Cryptomining Cost Management Sync Printers Point of Sale Smart Office Supply Chain Management Printer Server Wireless Charging Social Networking Colocation Uninterrupted Power Supply Monitoring Batteries Netflix Digitize Two Factor Authentication Workforce Monitor Virtual Private Network Windows 8.1 Root Cause Analysis Running Cable Cables Windows Server 2008 R2 Music Memory HBO Customer relationships Knowledge Nanotechnology IT Assessment Telecommuting Manufacturing Reputation Streaming Media Skype Project Management Email Best Practices Data loss Content Cortana Tech Support Troubleshooting Security Cameras Laptop Outlook Computer Tips Leadership Digital Signature Managed IT Service Techology OneDrive Biometric Security Customers Start Menu Warranty Virtual CIO Screen Mirroring HVAC Peripheral Audiobook Loyalty Google Apps Science Books Touchpad Frequently Asked Questions Digital Security Cameras Analysis Using Data Windows 10s Devices Copiers 5G Mobile Administrator Consultant Cast Enterprise Content Management Quick Tip Distributed Denial of Service Analytics Politics Customer Relationship Management Advertising Emergency Smartwatch Analyitcs Tip of the week MSP Ergonomics webinar Accountants Best Available Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Programming Notifications Professional Services Microchip WIndows 7 Password Management PCI DSS Assessment Password Manager Virtual Machine Multi-Factor Security Employee Windows Server 2008 2FA Fiber Optics Twitter Messaging Antivirus Cabling Relocation Tools Search Engine Windows 8 NIST Policy Television Business Mangement Hypervisor IT service Video Games Trending Dark mode Smart Tech Trend Micro Addiction SMS Worker Commute Amazon Default App Tablet User Procedure PowerPoint Experience Public Computer Recycling Saving Time Windows Media Player Domains Scalability Transportation Google Search Regulations Wiring dark theme Practices Shopping Computer Fan Cache AI Business Owner Rootkit Amazon Web Services IT Infrastructure NarrowBand Managing Stress Safe Mode FinTech IaaS Criminal Maintenance Bing Search Benefits Bloatware GDPR Workers Hosted Computing Social Network FENG Wireless Internet Cameras Online Shopping Investment iPhone Tablets File Sharing Employees IBM Employee/Employer Relationships Inventory Smart Technology Specifications ISP Entrepreneur Flash Camera Windows 365 Wire Video Conferencing Evernote ROI Files Travel Shortcuts Chromecast Software Tips Sales Supercomputer Bitcoin Shortcut

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code