253.777.0763    Get SUPPORT

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
Tip of the Week: Use Admin Accounts to Control You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Upgrade Software Technology Information Business Continuity Root Cause Analysis Business Intelligence Innovation Connectivity Mobile Devices Operating System Servers Smartphone Cloud Computing Public Cloud Workplace Tips Data Backup Budget IT Management Social Media NIST Emergency Office Hackers Internet of Things Cortana Entertainment Website File Sharing Wi-Fi Mobile Device Management Workers WiFi Computer Cybercrime Managed Service Provider CES Ransomware Cloud Smart Tech Network Health Cryptocurrency Automation Quick Tips FENG Network Security Browser Remote Monitoring Online Shopping Managed IT Services Redundancy Firewall Data Breach Collaboration Office 365 Warranty Hosted Solutions Data Management Identity Theft Windows 10 Chrome Miscellaneous Holiday Netflix Virtual Assistant VPN eWaste Networking Fraud Remote Work Voice over Internet Protocol Infrastructure Cybersecurity User Tips Keyboard Internet Telephony Data Storage Meetings Two-factor Authentication Telephone Systems Law Enforcement Business Management Remote Worker Hardware Cleaning Addiction Scam Botnet Big Data FCC Company Culture Update Comparison Paperless Office Government OneNote Frequently Asked Questions Trending Virtualization Managed IT Word Spam Avoiding Downtime Excel Search Engine Private Cloud Google Drive Microsoft Windows Artificial Intelligence Password Unsupported Software Windows 7 Net Neutrality VoIP Managed Service Save Money How To Phishing Legal Windows Server 2008 Bandwidth Employer-Employee Relationship Security Backup Practices Conferencing Malware Passwords Server Microchip Telephone System Communication Productivity Smart Office Charger Hosted Computing Recycling Computers Communications Managed IT Services IT Services Android BDR Bring Your Own Device Settings Encryption Saving Money USB Windows 10s Hiring/Firing Document Management Content Management Outsourced IT Email Alert Privacy Vulnerability Amazon Web Services Data Protection Windows 10 Sports Blockchain Internet Exlporer Smartphones Applications Digital Signature Tip of the Week Facebook Tech Term Google Business Computing Skype Money Apps Microsoft Office Nanotechnology webinar Business IT Plan Social Engineering Travel Gadgets Data Security Router Spam Blocking Cache BYOD Small Business Data Physical Security IT Support App Efficiency Best Practices Data Recovery Knowledge Managing Stress

Newsletter Sign Up