shutterstock 4600 TEST SIZE V1 051716


 "IT Management that You can count on."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
Tip of the Week: Use Admin Accounts to Control You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Network Security Hackers Backup Hosted Solutions Malware Mobile Devices Google Data VoIP Microsoft Disaster Recovery Business roundup Business Continuity nonprofit Email bgc Software communications Managed IT Services Alert Outsourced IT Innovation Internet Smartphones Hardware IT Services User Tips Data Backup Tech Term Windows 10 Browser Managed IT Services Saving Money Ransomware Smartphone Computer Server Data Recovery Cloud Computing Cybercrime Efficiency Android Internet of Things Network Productivity BDR Computers IT Support Workplace Tips Small Business Business Management IT Support Communication Office Windows Passwords Miscellaneous Cybersecurity Artificial Intelligence Quick Tips Save Money Productivity Windows 10 Managed IT Telephone Systems BYOD Mobility Recovery Holiday Router Mobile Device Management Chrome Money Applications Social Engineering Automation Social Media Mobile Device Firewall Vulnerability Upgrade Law Enforcement Hacking Facebook Wi-Fi Work/Life Balance Gadgets Virtualization Office 365 Collaboration Phishing Health Two-factor Authentication Information Managed Service Provider Budget Flexibility Microsoft Office VPN Google Drive App Word Proactive IT How To Password Private Cloud Bandwidth Data Protection Compliance Bring Your Own Device Office Tips Avoiding Downtime Remote Monitoring Software as a Service Data Breach HaaS Redundancy Data Security Servers Identity Theft Connectivity Safety Business Intelligence Managed Service Apps Scam Settings Keyboard Information Technology Value Remote Computing Spam History Black Market Operating System Sports Voice over Internet Protocol Mobile Computing HIPAA Data storage Training Workers Save Time Machine Learning Risk Management Wireless Technology Comparison YouTube IT Plan Computer Care Update Patch Management CES Automobile OneNote Government Encryption PDF Samsung WiFi Solid State Drive Content Management USB Credit Cards Computing Infrastructure Charger Data Management Marketing Access Control Entertainment The Internet of Things Electronic Medical Records Battery Content Filtering Google Docs Blockchain Virtual Assistant Windows 7 Fraud Hacker Worker Business Owner Unsupported Software Employer-Employee Relationship Emergency Telephony Physical Security Data Storage Website Human Resources Telephone System Big Data Unified Threat Management Spam Blocking Document Management Infrastructure SaaS Paperless Office Hiring/Firing IT Management End of Support Cleaning Legal Criminal NIST Help Desk Instant Messaging Excel Remote Work User Error Smart Tech Printers Meetings Wireless Password Manager Downtime Employer Employee Relationship Hosted Computing webinar Remote Worker Users Going Green Start Menu Unified Communications Content Multi-Factor Security Two Factor Authentication Digital Signature Botnet Hosted Solution Online Shopping Reputation Advertising Cache Public Cloud Best Practice Data loss Hard Drives IBM Cryptocurrency Shortcuts Search Tip of the week Monitor Colocation Vendor Management Warranty Business Mangement Assessment HVAC Politics HBO Specifications Robot Computer Accessories Inventory Conferencing Wiring Virtual Reality Tools Theft Audiobook Trending IT Consultant Smartwatch Flash Evernote Customers Wireless Internet Screen Mirroring Relocation Supercomputer Safe Mode Social How to Windows Server 2008 Devices Printer Gmail Television Networking CrashOverride Microchip Outlook Millennials Files Bluetooth Netflix Worker Commute Video Games Data Warehousing Lifestyle Accountants Leadership MSP Sync Wireless Charging Cortana Wire Audit Cast Humor Transportation Current Events Vendor Troubleshooting Thought Leadership Mouse Recycling Public Computer Enterprise Content Management Search Engine Scalability Experience Chromecast Workforce Authentication Laptop Mobile Smart Office Computer Fan Apple File Sharing Education Fiber-Optic Google Apps Loyalty Benefits Knowledge Display Regulations Amazon Internet Exlporer Twitter Administrator eWaste Password Management Bing Frequently Asked Questions Telecommuting Rootkit Nanotechnology Camera Techology Touchpad Professional Services FENG NarrowBand Software Tips iPhone Practices Augmented Reality Skype Cables Smart Technology Staff Network Congestion Regulation Security Cameras Shadow IT Books Amazon Web Services Addiction Windows 10s Thank You GDPR Congratulations E-Commerce nonprofits