window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
A Virtual Private Network Builds Organizational Fl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 13 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Managed IT Services Privacy Business Computing Hackers Data Backup Email Malware VoIP Hosted Solutions Data Data Recovery Outsourced IT Mobile Devices Google Tech Term Innovation Hardware Internet Microsoft Backup Saving Money Business Continuity Software Internet of Things Cloud Computing BDR Ransomware Communications IT Services User Tips Business Smartphones Android IT Support Cybersecurity Communication Small Business Efficiency Applications Cybercrime Productivity Workplace Tips Network Managed IT Services Disaster Recovery Artificial Intelligence Browser Chrome How To Law Enforcement Managed IT Computer Router Business Management Windows 10 Gadgets Collaboration Business Intelligence Windows Virtualization Mobile Device Management Smartphone Data Security Server IT Support Two-factor Authentication Save Money Computers Money Data Protection BYOD Phishing Avoiding Downtime Information Blockchain Servers App Upgrade Remote Monitoring Social Media Facebook Analysis Spam Compliance Firewall Redundancy IT Management Proactive IT Passwords Bandwidth Alert Apps Connectivity Productivity Vulnerability Telephone Systems Social Engineering Identity Theft Mobility Office 365 Word Training Miscellaneous Document Management Paperless Office Mobile Device Credit Cards Access Control Update Work/Life Balance Data Breach Smart Tech Solid State Drive Flexibility Managed Service Spam Blocking Fraud Password Information Technology Automation Data loss Private Cloud Mobile Computing VPN Wi-Fi Infrastructure Value Operating System Virtual Assistant Scam IT Plan Voice over Internet Protocol Telephone System Unified Threat Management CES Sports Windows 7 Networking File Sharing Budget Comparison Microsoft Office Workers Unsupported Software Encryption Machine Learning Business Owner Settings Content Management Holiday Big Data Education Bring Your Own Device Data Storage OneNote Website Employer-Employee Relationship Keyboard Computer Care Knowledge Google Drive Recycling Cache Excel Millennials NIST Meetings Botnet Remote Worker Emails Physical Security Lifestyle Administrator Wireless Start Menu Wireless Charging Conferencing Google Apps Streaming Media Save Time Virtual Private Network Samsung Human Resources Students Risk Management Flash Business Technology Network Congestion Authentication Windows 10 Patch Management Data Warehousing Hard Drives WiFi eWaste Wireless Internet Tip of the week Workforce Downtime Insurance Cryptocurrency Travel Wiring Charger Microchip Computer Fan Mobile Computing Infrastructure Proactive Content Filter Project Management Staff Healthcare Amazon Electronic Medical Records IT Consultant Fiber-Optic Nanotechnology Virtual Reality Google Docs Criminal Wire Windows Server 2008 Telecommuting Practices Safe Mode Black Market Augmented Reality Content Filtering Screen Mirroring Public Cloud GDPR HBO Cortana FENG Accountants HVAC Wireless Technology Instant Messaging Professional Services Remote Monitoring and Maintenance Password Manager Storage Hacking Warranty Windows 10s Digital Signature Electronic Health Records HIPAA Sync Amazon Web Services Leadership Cables Worker Commute Netflix Marketing Legal Hacker Entertainment Remote Work Hosted Computing The Internet of Things Battery Cast Managed Service Provider Software as a Service E-Commerce Outlook Search Engine Enterprise Content Management USB Tools End of Support Line of Business Business Mangement Multi-Factor Security Printer SaaS Remote Computing Telephony Online Shopping Unified Communications Devices Cleaning Smart Office Regulations Health Office Tips Current Events Inventory Government PDF Camera Addiction Users Data Management Frequently Asked Questions Technology Tips Specifications Bing IoT Password Management Recovery Root Cause Analysis MSP Gmail Software Tips Trending Mouse Audit Strategy YouTube Skype Evernote HaaS webinar Theft Thought Leadership Printers Mobile Office Files Two Factor Authentication Emergency Office Help Desk CrashOverride Domains Shadow IT Hosted Solution Advertising Vendor Management Assessment Company Culture Experience Colocation Bluetooth History Webinar Content Relocation Public Speaking Search Television Managing Stress Presentation Music Lithium-ion battery Politics Techology IT solutions Audiobook Humor Utility Computing Public Computer 5G Wearable Technology Internet Exlporer Worker Tech Support Loyalty Video Games Safety User Error IBM Transportation Books Hybrid Cloud Automobile How to Rootkit Twitter Hiring/Firing Competition Regulation Employer Employee Relationship Customer Relationship Management Benefits Best Practice IP Address Quick Tips Troubleshooting Fun Internet exploMicrosoft Scalability Computer Accessories Customer Service Smart Technology

Mobile? Grab this Article!

QR-Code dieser Seite