window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
A Virtual Private Network Builds Organizational Fl...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Network Security Best Practices Business Computing Data Backup Privacy Managed IT Services Hackers Hosted Solutions Malware Data Recovery Email Data Mobile Devices VoIP Outsourced IT Google Tech Term Innovation User Tips Microsoft Internet Internet of Things Business Continuity Cloud Computing Backup Hardware Software Communications IT Services BDR Saving Money Business Communication Ransomware Efficiency Cybersecurity Managed IT Services Android Smartphone IT Support Small Business Router Artificial Intelligence Smartphones Productivity Cybercrime Workplace Tips Network Windows 10 Chrome Browser Disaster Recovery Applications IT Support Law Enforcement Computer Managed IT Business Management Phishing Gadgets How To Virtualization Two-factor Authentication Information Data Security Save Money Server Computers Money Data Protection BYOD Office 365 Blockchain Holiday Word Access Control Mobility Business Intelligence Avoiding Downtime Mobile Device Collaboration Spam Windows Mobile Device Management Wi-Fi Proactive IT Bandwidth Firewall Redundancy Passwords IT Management Connectivity Managed Service Apps Productivity Vulnerability Voice over Internet Protocol Encryption Settings Machine Learning Alert Software as a Service Training Identity Theft Telephone Systems Social Engineering Miscellaneous Upgrade Document Management Servers Analysis Social Media Automation Remote Monitoring App Compliance Facebook Solid State Drive Data loss Flexibility Information Technology Password Mobile Computing Google Docs Private Cloud Unified Threat Management Networking Scam CES Workers Sports File Sharing Hacker IT Plan Microsoft Office Windows 7 Budget Comparison Content Management OneNote Big Data Telephony Virtual Assistant Unsupported Software Website Data Storage Business Owner Paperless Office Data Breach Education Bring Your Own Device Smart Tech Telephone System Credit Cards Spam Blocking Keyboard Update Human Resources Employer-Employee Relationship Botnet Google Drive Work/Life Balance Fraud Value VPN Operating System Infrastructure Tip of the week Workforce Staff Healthcare Bing Risk Management Travel Fiber-Optic Nanotechnology MSP Patch Management Criminal Hard Drives Wire Mouse Mobile Practices FENG Safe Mode Augmented Reality Amazon Accountants Windows 10s HVAC Display Password Manager Leadership Storage Wireless Technology Windows Server 2008 Telecommuting Digital Signature Netflix Electronic Health Records Help Desk Screen Mirroring Cables Computing Infrastructure Remote Worker Virtual Reality Administrator Professional Services Hosted Computing Black Market Content Filtering HBO Public Cloud Virtual Private Network Hacking The Internet of Things Sync Amazon Web Services SaaS Enterprise Content Management Business Technology Security Cameras Instant Messaging Marketing Business Mangement Remote Work Cleaning Cortana Shortcuts HIPAA Cast Unified Communications Current Events Devices Wiring Worker Commute Smart Office Microchip Legal Entertainment Tools Inventory Proactive Battery Outlook webinar Managed Service Provider Addiction Project Management Online Shopping IoT Audit Password Management USB Multi-Factor Security Gmail Regulations Computer Care Strategy YouTube eCommerce Remote Computing Users Government Theft Knowledge Thought Leadership End of Support GDPR Frequently Asked Questions Specifications Emails Root Cause Analysis Remote Monitoring and Maintenance Recycling Conferencing Cache PDF Warranty Data Management Skype Evernote Health NIST Office Tips Recovery Software Tips Trending Samsung Technology Tips Social Google Apps Network Congestion Streaming Media E-Commerce Excel Millennials Charger Students Search Engine Meetings Authentication Downtime HaaS Line of Business Wireless eWaste Wireless Internet Printer Windows 10 Start Menu Wireless Charging Insurance Computer Fan Cryptocurrency Physical Security Lifestyle Save Time Flash Vendor Data Warehousing WiFi Electronic Medical Records IT Consultant Content Filter Camera IT solutions Colocation Presentation Worker Content Public Computer History Lithium-ion battery Printers Loyalty Relocation Music Search 5G Politics Tech Support Rootkit Audiobook IBM Techology Safety Humor Wearable Technology Employer Employee Relationship Twitter Video Games Internet Exlporer Transportation Customer Relationship Management User Error Books Competition Hybrid Cloud Automobile Employee/Employer Relationship How to IP Address Computer Accessories Benefits Two Factor Authentication Vendor Management Hiring/Firing Utility Computing Best Practice Customer Service CrashOverride Bluetooth Assessment Smartwatch Troubleshooting Mobile Office Smart Technology Domains Company Culture Quick Tips Scalability Fun Internet exploMicrosoft Webinar Emergency Television Files Regulation Shadow IT Hosted Solution Public Speaking Office Managing Stress Experience Advertising

Mobile? Grab this Article!

QR-Code dieser Seite