shutterstock 6840 TEST SIZE V1 051116


 "Experienced Analysts are ready to help you."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
Tip of the Week: Use Admin Accounts to Control You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Business Computing Network Security Backup Malware Hosted Solutions Mobile Devices Data Google VoIP Business Microsoft Software Email bgc roundup Disaster Recovery nonprofit Managed IT Services Business Continuity Alert Innovation Internet Hardware Outsourced IT communications Smartphones IT Services Data Backup Tech Term User Tips Managed IT Services Windows 10 Browser Computer Ransomware Server Saving Money Cybercrime Android Data Recovery Efficiency Cloud Computing Network Internet of Things IT Support BDR Computers Workplace Tips Business Management Small Business Smartphone Windows Passwords Productivity Office IT Support Communication Miscellaneous Save Money Productivity Quick Tips BYOD Social Engineering Recovery Cybersecurity Applications Mobile Device Management Chrome Artificial Intelligence Managed IT Money Telephone Systems Firewall Mobility Vulnerability Work/Life Balance Social Media Virtualization Gadgets Collaboration Upgrade Law Enforcement Hacking Facebook Phishing Windows 10 Two-factor Authentication App VPN Health Wi-Fi Data Protection Proactive IT Password Microsoft Office Holiday Private Cloud How To Office 365 Bring Your Own Device Bandwidth Remote Monitoring Compliance Information Automation Router Budget Office Tips Flexibility Avoiding Downtime Managed Service Provider Apps Safety Word Mobile Device Keyboard Redundancy Spam Scam Remote Computing Value Google Drive Sports Information Technology Data Security Servers HaaS Identity Theft Connectivity History Mobile Computing Black Market Data Breach Business Intelligence Operating System Computer Care USB Data Management Patch Management End of Support Windows 7 Fraud OneNote Data storage Blockchain Virtual Assistant Battery Content Filtering Samsung Entertainment Charger Settings Unsupported Software Telephone System Business Owner The Internet of Things Data Storage Website Emergency Electronic Medical Records Big Data Government Infrastructure Paperless Office PDF Worker Solid State Drive Document Management Computing Infrastructure IT Management Voice over Internet Protocol Marketing Software as a Service Employer-Employee Relationship Comparison Unified Threat Management Spam Blocking Legal Save Time IT Plan HIPAA SaaS Update Risk Management CES Hiring/Firing Cleaning Physical Security Encryption Managed Service Training Workers Automobile Wireless Technology Credit Cards YouTube WiFi Content Management Outlook Millennials Access Control Public Cloud iPhone Audiobook Gmail Networking Two Factor Authentication How to Accountants MSP Vendor Management Sync Wireless Charging Cortana Wire IBM Data Warehousing Lifestyle Search Engine Computer Accessories Conferencing Worker Commute Thought Leadership Mouse Assessment User Error Cast Google Docs Wireless Workforce Authentication Downtime Mobile Video Games Recycling Enterprise Content Management IT Consultant Troubleshooting File Sharing Telephony Fiber-Optic Google Apps Smart Office Supercomputer Reputation Advertising Bing Bluetooth Netflix Hard Drives Regulations Amazon Twitter Administrator Television CrashOverride Monitor Colocation Scalability Experience Human Resources Frequently Asked Questions Telecommuting Education Nanotechnology Camera Audit Robot Professional Services eWaste Password Management Leadership Practices Laptop Augmented Reality Skype Cables Chromecast Transportation Current Events Customers Software Tips Staff Regulation Help Desk Relocation Amazon Web Services Techology Addiction Public Computer Excel Remote Work Smart Tech Printers Loyalty Computer Fan Files Meetings Criminal NIST Shadow IT Books Hosted Computing Touchpad Remote Worker Start Menu Unified Communications Password Manager Machine Learning Benefits Knowledge Digital Signature Rootkit Humor Online Shopping NarrowBand Cache Hacker Multi-Factor Security Instant Messaging Tip of the week Users Warranty FENG Data loss Cryptocurrency HBO Specifications Hosted Solution Inventory Wiring Windows 10s Apple Tools Theft Best Practice Content Business Mangement HVAC Smart Technology Network Congestion Going Green Flash Evernote Wireless Internet Internet Exlporer Trending Search webinar Windows Server 2008 Virtual Reality Devices Printer Screen Mirroring Politics Safe Mode Microchip Employer Employee Relationship GDPR Thank You E-Commerce Congratulations nonprofits