k_Street Consulting, LLC Blog

The New Version of Chrome has Interesting Changes

The New Version of Chrome has Interesting Changes

Chrome 70 has proven to be quite a divisive browser. While a lot of users are excited for the new changes to security, some are also worried about whether Chrome can maintain this security and its user-friendly interface. Here are some of the changes being made to Chrome 70 so you can choose whether this browser update is for you.

Extension Restrictions
One of Chrome’s largest advantages over its competition has to be its library of add-on extensions. Unfortunately, any kind of functionality with these additional “programs” can lead to security concerns. Google has had to slow down the production of extensions to create new requirements for developers to adhere to. One example is how cryptocurrency continues to be a major talking point, prompting extensions to include cryptocurrency mining and cryptojacking in their features. Google is shutting down these supplemental programs, as well as generally holding developers to higher standards than they previously were. It now demands that developer accounts be protected by two-factor authentication, as well as paying closer attention to apps that require lots of permissions or host their code remotely.

Security Measures
Chrome 70 is also packing in all kinds of new security features to keep phishing attacks away from end users. In particular, Chrome is trying to push education of its native password management tools, as well as warn users when the links they are about to access aren’t secure. In essence, this simply states that websites need to be secured if they want visitors, reinforcing the fact that websites need to prioritize security these days.

Login Concerns
While some changes have been accepted with open arms, others… not so much. While Chrome has allowed users to use the browser without logging into the browser, some have noticed that Chrome appears to log a user in, even if they are only using one service out of the many provided. This is primarily an issue because Google could potentially share the user’s data (think browsing history), which is not something that users traditionally take lightly. In the time since then, Google has announced that Chrome isn’t necessarily logging users into Chrome--it’s more of an in-between measure to show a user which of their accounts is currently logged in.

As with any new solution, there will be roadblocks and concerns that users might be faced with during the experimentation phase. What kind of experiences have you had with Chrome 70 so far? Let us know in the comments.

Why Your Business Needs to Define Its Ethical Code
A Virtual Private Network Builds Organizational Fl...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, July 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Proactive Maintenance Business Intelligence Hosted Solution Content Management Windows 10 Distribution Running Cable Distributed Denial of Service eWaste Hard Drive Project Management Passwords Archive Managed Service Provider Spam Blocking Paperless Office Cameras Vendor Management Experience Telephony Vulnerability Unified Threat Management IT Plan Cryptocurrency Wiring Mobile Office Efficiency IT Support Internet Exlporer Outsourced IT LinkedIn Congratulations Password Manager Reputation Administration Gmail Health Law Enforcement Botnet Saving Money Wire Human Resources Biometric Security Thought Leadership Benefits Google Search Facebook Spam Remote Worker Flexibility Bandwidth Robot Backup Leadership Employer-Employee Relationship Work/Life Balance IT Services Battery Machine Learning Customer Relationship Management Windows Media Player Electronic Medical Records Cache Content Filter Notifications Telecommuting Password Management Employee/Employer Relationship Charger GDPR DDoS App Apple Books Data Protection Maintenance Keyboard Going Green Business Mangement Smartphone Compliance Two-factor Authentication Augmented Reality Inventory Applications Uninterrupted Power Supply Access Control Virtual Reality Managed Service Word Application Logistics Server CrashOverride Data Customers IT Management Professional Services Frequently Asked Questions Remote Monitoring and Maintenance Search Engine Automation Hosted Solutions WIndows 7 Staff Television Saving Time Privacy Millennials Black Market Fraud avoiding downtime Camera Digital Signature Outlook webinar Worker Commute Router Best Practice Network Security Worker Recovery Investment Storage Enterprise Content Management Operating Systems Safe Mode User Tips Meetings Managed IT Hacking Remote Work Public Cloud Budget Public Computer Wi-Fi Customer Service BDR The Internet of Things Regulation Tablets Shadow IT Security Practices People Shortcuts Chrome Hosted Computing Smart Office How To Loyalty Money Twitter Unsupported Software Restore Data Hackers Online Shopping Printer FENG Retail Disaster Recovery Nanotechnology Intranet Advertising IT Infrastructure Data Backup Fiber-Optic Content Filtering Business Owner Productivity Safety Administrator Gadgets HIPAA Antivirus Windows Server 2008 Artificial Intelligence OLED Wearable Technology User Error Windows 7 Trending Phone System Bluetooth Google Apps Holiday Virtual Private Network Windows Server 2008 R2 Bring Your Own Device Virtual Assistant Automobile Windows Video Games Users Servers Humor Save Money Data Management Ransomware Employee USB Troubleshooting Smartwatch Touchscreen Processor Utility Computing Skype communications User Fax Server Voice over Internet Protocol Google Drive Comparison Remote Computing Social Networking VPN Employer Employee Relationship Blockchain Tip of the week Recycling Risk Management Mobile Device Management PDF Techology Scalability Tech Support Managed Services Provider Two Factor Authentication Warranty Excel Cloud Computing Cables Tools How to Current Events Touchpad Telephone Systems Infrastructure Entrepreneur Hybrid Cloud Addiction Productivity Net Neutrality Miscellaneous Upgrade Data loss Patch Management Apps Digital Payment Cabling Password Office Laptop Netflix Google Docs Connectivity Knowledge Amazon Web Services Default App Collaboration Computer Repair Start Menu Data Storage Rootkit Communication Data storage Data Security Innovation Education Instant Messaging Gaming Console ISP Business Technology Mouse Workplace Tips Credit Cards Managed IT Services malware Programming Android Telephone System Regulations Manufacturing Music Domains Settings Operating System Thank You Evernote travel Computer Criminal Business Internet Software as a Service Digital Signage Downtime Virtualization VoIP Social Media IoT IT solutions Analyitcs Chromecast Workers Data Breach Screen Mirroring Tip of the Week Physical Security Windows 8 Network Congestion Transportation Small Business Mobility Biometrics Smartphones Read Science Environment IBM Private Cloud Smart Technology WiFi Display Entertainment Multiple Versions Microsoft Windows 10 Colocation Data Warehousing Office 365 PowerPoint Cybercrime SharePoint Cost Management Computing Infrastructure HaaS Unified Communications Smart Tech Cast Accountants Search Hardware Solid State Drive Managing Stress Scam Printers Memory Hring/Firing IT Support Sync Wireless Charging Printer Server IT Consultant Shortcut Quick Tips Marketing Streaming Media Line of Business Alert Cryptomining Value Firewall Internet of Things Bing Wireless Hacker Phishing iphone Document Management Best Practices File Versioning IT Solutions Analytic Big data YouTube Networking Healthcare SaaS NarrowBand NIST Politics Government Hard Drives Conferencing Supercomputer Save Time Computer Care Point of Sale Legal Audiobook Wireless Technology Encryption Lifestyle Mobile Device Virtual Desktop Emergency Authentication Backup and Disaster Recovery Remote Maintenance Proactive Google Amazon Monitor Students Information CES Relocation Computer Accessories Wireless Internet Devices Company Culture Root Cause Analysis Pain Points Help Desk Information Technology Social Engineering Multi-Factor Security Managed IT Services Identity Theft Webinar Analysis Microchip MSP OneNote Microsoft Office IaaS HBO Training Consultant Business Management Computers Business Continuity Software Tips Samsung eCommerce Specifications Virus Files Network Social Vendor Cloud Internet exploMicrosoft Computer Fan HVAC Emails Proactive IT IT service Bloatware Sports Windows 10s End of Support File Sharing Tablet Database 5G Browser Mobile Computing Website Content E-Commerce ROI Remote Monitoring Theft Hiring/Firing Insurance Office Tips Mobile Devices Mobile Electronic Health Records Cybersecurity History Product Reviews Best Available Cortana Software Cleaning Update Online Currency Assessment BYOD Audit Statistics Flash analytics Lithium-ion battery Tech Term Business Computing Data Recovery Workforce Technology Redundancy Email Security Cameras Strategy

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *