Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 27 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Communication Business Continuity IT Support Smartphones Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Upgrade Phishing Windows Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Cloud Computing Data Recovery Passwords Windows 10 Saving Money Holiday Social Media Tech Term Gadgets Chrome Virtualization Automation Managed Service Managed IT Services Microsoft Office Facebook Cybercrime Operating System Artificial Intelligence Computers BYOD Mobile Device Management Networking IT Support Health Internet of Things Hacking Wi-Fi Telephone Systems Covid-19 Information Information Technology Managed Service Provider Remote Alert Spam Office 365 Bandwidth Router Employer-Employee Relationship Recovery BDR Social Engineering Mobility App History Encryption Application Applications Human Resources Law Enforcement Big Data Remote Monitoring Password Data Breach Mobile Computing Money Paperless Office Office Tips Training VPN How To Government Remote Computing Private Cloud Data Storage Mobile Office Patch Management Managed IT Apps Blockchain Servers IT solutions Entertainment Website Budget Wireless Google Drive Gmail Data Security Infrastructure Voice over Internet Protocol Settings Avoiding Downtime Two-factor Authentication Mouse HaaS Vulnerability Windows 7 Flexibility Bring Your Own Device Data Management Word Marketing Work/Life Balance WiFi Managed Services Risk Management Software as a Service Display Hacker Telephone System Vendor Management Staff End of Support Machine Learning USB Education Physical Security Connectivity Remote Work The Internet of Things Lithium-ion battery Safety Employee/Employer Relationship HIPAA Sports RMM Redundancy Keyboard Firewall Virtual Reality Apple Data Protection Social Save Time Conferencing User Error Meetings Scam Cleaning Vendor Printer Biometrics Bluetooth Battery Remote Workers Virtual Desktop Shadow IT Unsupported Software Legal Processor Update DDoS Charger Internet Exlporer SharePoint Compliance Hard Drive Google Docs IT Consultant OneNote Computer Care Current Events PDF Identity Theft Telephony Customer Service Humor Samsung Computing Proactive IT Environment Fax Server Best Practice Augmented Reality Value Fraud YouTube Spam Blocking Electronic Medical Records Black Market Digital Signage Remote Worker SaaS Cryptocurrency Hiring/Firing Document Management Solid State Drive Network Congestion Wireless Technology How to eWaste Procurement Downtime Comparison Net Neutrality Workplace Strategy Virus Help Desk CES Data storage Printing Unified Threat Management Business Intelligence Automobile Computer Accessories Audit Business Technology Wearable Technology Worker Content Management Access Control Computing Infrastructure Retail Hard Drives IT Management Managed Services Provider Going Green Instant Messaging Excel Botnet Virtual Assistant Robot Authentication Database IT Plan Workers Techology Benefits Cables Windows Server 2008 R2 Laptop FENG Customer relationships Customers IBM Nanotechnology IT Assessment Telecommuting Manufacturing Project Management Email Best Practices Audiobook Flash Printer Server Smart Technology Cortana Touchpad Security Cameras Science Computer Tips Digital Signature Managed IT Service Supercomputer OneDrive Advertising Biometric Security Software Tips Warranty Virtual CIO Politics Sync Emails HVAC Peripheral Google Apps Customer Relationship Management Notifications Digital Security Cameras Distributed Denial of Service Analysis Using Data Devices Copiers 5G Analyitcs Administrator Netflix Enterprise Content Management Quick Tip Two Factor Authentication Programming Relocation Smartwatch Root Cause Analysis MSP Ergonomics Accountants Knowledge Thought Leadership Development Music Credit Cards OLED HBO Microchip Skype Password Management PCI DSS Video Games Antivirus Password Manager Virtual Machine Multi-Factor Security Employee Windows 8 Data loss 2FA Worker Commute Fiber Optics Search Engine Consultant Experience Leadership Twitter Messaging IT service Troubleshooting Cabling Outlook Start Menu NIST Policy Analytics Scalability Business Mangement Hypervisor Smart Tech Trend Micro Trending Tablet Screen Mirroring Dark mode Business Owner Loyalty Best Available Addiction SMS Domains Books Amazon Default App NarrowBand Frequently Asked Questions Mobile WIndows 7 Windows 10s Procedure Search Recycling Saving Time Practices Shopping iPhone Maintenance Google Search Cast Wiring dark theme IaaS Tip of the week webinar Cache AI Emergency Amazon Web Services IT Infrastructure Bloatware Bing Professional Services Public Cloud Safe Mode FinTech Employer Employee Relationship Criminal Assessment Hosted Computing Social Network Files Tablets GDPR Windows Server 2008 Wireless Internet Online Shopping Investment Chromecast Entrepreneur Tools User File Sharing Employees PowerPoint Employee/Employer Relationships Windows Media Player Television Inventory Colocation Shortcut Specifications ISP Uninterrupted Power Supply Camera Windows 365 Wire Video Conferencing Evernote ROI Cost Management Travel Shortcuts Managing Stress Sales Bitcoin Monitor Social Networking Public Computer Personal Millennials Cryptomining Printers Point of Sale Regulations Smart Office Supply Chain Management Cameras Transportation Wireless Charging Streaming Media Computer Fan Monitoring Running Cable Rootkit Batteries Reputation Digitize Workforce Tech Support Memory Virtual Private Network Windows 8.1 Content

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code