When and How to Stop Google Chrome From Running in the Background

By default, when you close Google Chrome, the browser window closes, but the application itself continues to run in the background. There are a few reasons for this.

First and foremost, this makes it faster to open a new browser window. Since Chrome is already running in the background, there is less that has to take place behind the scenes before your new browser window appears.  This makes the browser feel quick, even on slower machines.

Running in the background also allows any Chrome extensions you might have installed to continue to operate. These are applications that run within Chrome and either enhance the browser’s existing features, or add new ones. Extensions range from those that change Chrome’s background colors to those that add support for third party applications.

This behavior, however, might not always be desirable.

If you are running an older or less powerful computer, you might find that forcing Google Chrome to stop running in the background could noticeably improve the overall performance of your computer.

Similarly, if you are using a laptop, having Google Chrome running in the background could negatively impact your battery life.  By forcing Chrome to close completely, you might find you can stretch your battery life just a little further.

If you fall into one of these two categories, or would simply prefer to avoid having Chrome run in the background, you can follow the instructions below to disable this behavior.

In Google Chrome:

1. Select “Settings” in the Chrome Menu

2. Click on “Advanced” at the bottom of the settings page that appears.

3. Under the “System” heading, find the box next to “Continue running background apps when Google Chrome is closed.”

By default, the toggle button next to that text will be set to the right with a blue background.  To prevent Chrome from running in the background, simply click the button so that the toggle is to the left, with a gray background (see screenshot above).

If, in the future, you decide you would like to allow Chrome to run in the background once again, simply repeat the steps above and move the toggle back to the right.

It is time to consider upgrading from Windows 7

There are plenty of reasons to upgrade from Windows 7 before it reaches its end of life date on January 14, 2020.  Chief among them, Microsoft has indicated that, on this date, they will stop releasing security updates for Windows 7.  This will have major implications for anyone still running Windows 7, as it will leave them exposed to any known vulnerability indefinitely.

The nature of these vulnerabilities are such that they can have a cascading effect if exploited.  For instance, a recently identified vulnerability, designated ‘CVE-2019-0708,’ makes it possible for a malicious party to execute code remotely via Remote Desktop Services. This particular security flaw exists pre-authentication, meaning that it could easily spread from system to system in a similar fashion to how WannaCry malware spread in 2017.

Microsoft has indicated an attacker could “install programs; view, change or delete data; or create new accounts with full user rights.”

Fortunately, Microsoft has released a series of fixes for this particular vulnerability.  Starting January 14th, however, there is no guarantee that this will be the case and, except for in the most extreme circumstances, Windows 7 security holes will not be patched by Microsoft.

It is worth noting that Windows 10 is unaffected by this recent vulnerability, making this an excellent example of how upgrading to Microsoft’s latest operating system is the best way to ensure that your computer systems remain secure.

In short, by continuing to run Windows 7 past its end of life date, you could be undermining your entire security investment by effectively leaving the door to your network wide open.

Don’t wait until the last minute.  Talk to an IT expert about upgrading to Windows 10 today.  Give us a call at 978.562.6077 and selection Option 2.  We would be more than happy to help you get the process started.

Ray Baldez and Tony Fierimonte Complete Cisco SMB Select Partner Certification

Bryley is pleased to announce that Tony Fierimonte and Ray Baldez have completed the training and testing to become certified Cisco Small and Midsize Business (SMB) Account Representatives. These certifications augment Bryley’s expertise as a Cisco SMB Select Partner.

About this achievement, Ray Baldez said, “it proves Bryley’s knowledge of the features and specifications of Cisco’s products, and competence in delivering the highest quality, most cost-effective solutions for any business environment.” Tony Fierimonte added, “the Cisco course helped give a thorough understanding of Cisco’s capabilities through its connectivity products, rich history, and strategic outlook. This will help me serve my customers with solutions that are on-point.”

Cisco SMB Certification is an example of a tool Bryley has at hand to approach your organization’s requirements specifically — combining for you the ideal mix of brand-name equipment, like Cisco’s, software with flexible service options, and tailor-fit contracts.

The Snoopiness of Things

The 2015 Arkansas murder case that depended on smart-home devices, made the news again as the judge in the civil case upheld his ruling that James Bates is financially liable for the death of Victor Collins. The case against the accused was built on, among other forensics, records from Amazon whose Echo device was installed by the scene of Collins’ death, as well as evidence from a so-called smart meter. The smart meter reported inordinate usage of water around the time of death, which led the police to argue that a bloody patio was hosed down.

GDPR and You

Surprised that in the last month, between two small marketing list brokers, more than a billion personal records were found to have been leaked on the internet?1

That data then gets leaked and sold to potentially hold users’ computers or reputation for ransom. Or as in a 2018 hack, of DNA tester, MyHeritage, there is the ability to sell the data to the insurance and mortgage industries, revealing DNA disease susceptibilities, thereby making the user ineligible for coverage or a loan.2

GDPR to the Rescue!

Best Practices for Using Social Media

A sense of belonging, a sense of community and for businesspeople, a touchpoint for customer service and the ability to market to specific demographics are among social media’s benefits. And like every technology, social media – by which I mean websites that offer sharing tools that allow people to interact (e.g. Instagram, Twitter, SnapChat, Facebook, YouTube) – have their drawbacks.

The Importance of Server Maintenance

Let’s face it, servers, like any piece of hardware, will eventually need to be replaced, but in the meantime, keep it running until it’s time to replace it. Developing a checklist of the tasks that need to be done regularly can go a long way in ensuring your servers consistently perform at their best. Because servers take care of all your data, it is important to watch and properly care for them. Such maintenance involves constant monitoring and continuously analyzing how the server is functioning. Preemptive maintenance not only reduces server issues, but also may increase the longevity of your server.

When To Replace a Server

Every IT professional would agree that servers are the lifeblood of your organization. No matter what daily task you perform, whether it is responding to email, preparing for a presentation, or completing other workday tasks, it’s important to have a server in your office that runs smoothly. No organization, no matter what the size, wants to face the IT issues associated with a slow or non-responsive server. While there is no way to accurately predict when a server will need to be replaced, there are some general guidelines you should observe to ensure that this critical piece of equipment is running properly.

Holiday Shopping Online. It’s Convenient, but Buyer Beware…

With black Friday just around the corner, many of us are starting to think about holiday shopping. We all love the convenience of being able to be at home in front of a computer vs the hassle of crowded malls and searching for parking spots. You can click here and there and order whatever product you desire and have it delivered to your front door. You can compare pricing, look for deals, compare products, and it all can be done quickly and in the convenience of your own home, any time, night or day. The downfall? Wherever there is money and users to be found, there are malicious hackers roaming around.

October is National Cybersecurity Awareness Month

Connected devices are essential to our professional and personal lives, and criminals have gravitated to these platforms as well. Many common crimes—like theft, fraud, harassment, and abuse—are now carried out online, using new technologies and tactics. Others, like cyber intrusions and attacks on critical infrastructure, have emerged as our dependence on connected systems revealed new vulnerabilities.