Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Accidentally Gifting a Security Breach?

Are You Accidentally Gifting a Security Breach?

The holidays are a time filled with good food, visits from dear friends and family, and exchanging gifts with those you care about. However, to keep the season bright and merry, you need to be a little cautious during your next gift exchange, as many gifts can present some unexpected risks to your recipient’s security. Be mindful if you see the following items on someone’s wish list.

Digital Assistants and Smart Home Hubs
These little devices have made a splash as a useful household appliance, answering a user’s questions and controlling their various media. However, these nifty gizmos are always listening--literally. These devices rely on microphones that automatically activate, meaning that they hear everything you have to say. Imagine what a cybercriminal could do with the information they extract from them.

What’s worse, many of these devices now also come equipped with cameras, allowing a cybercriminal to effectively invade your privacy from anywhere.

While it may be a neat idea to take control of one’s environment through technology, it provides cybercriminals with the opportunity to take advantage of these devices as they victimize you, along with your family or staff. These devices can be used to spy on you and collect enough information to piece together your daily routine--invaluable intel for the criminal class. It’s important to keep this in mind if you are purchasing these devices for young children. Although Google and Amazon want to be on top of their security, it’s important to consider the lack of security awareness kids might have.

Connected Toys
While many of these devices may seem like they appeal to an older demographic, there are plenty of toys and games for children that are getting smarter. This also increases their creepiness factor, as hackers could use some toys--such as a Toymail Talkie--to communicate directly with children. Other connected playthings could provide hackers with details about a child’s life that are far too intimate. Edwin the Duck, a connected bath toy, could be used to extrapolate how often a child is bathed and when they are put to bed.

Smart Appliances
Of course, adults can have toys of their own in the form of appliances, and they are more and more frequently being built with smart capabilities included. We’re talking about wearables like fitness trackers and Internet of Things devices. Basically anything that connects to the Internet that isn’t a traditional computer or laptop would fall into this category. What isn’t always included is any sufficient security to keep these appliances from being made a part of a botnet. Furthermore, like digital assistants, these devices can easily collect data based on the activity around them.

DNA Testing Kits
This one may come as a surprise to many, but those kits that you send away with a vial of your spit may be the next major cause of privacy issues. After all, the product itself requires the most unique piece of personally identifiable information you have: your DNA. This specific data can quickly become valuable, especially for research purposes.

The agreements that you have to sign in order to use these services often have terms that grant the company permission to do as they will with your genetic data--which includes sharing a digitized version of this data with those who are willing to pay. While the Genetic Information Nondiscrimination Act of 2008 forbids the use of genetic data as a justification for discrimination-or firing someone because they have a predisposition to a condition-this kind of discrimination would be awfully hard to prove.

While the holidays should be a time of happiness, few things can put a damper on that happiness quicker than a security breach of your data. Mozilla has helpfully created a list of potentially risky products for consumers to reference as they do their holiday shopping.

So, what do you think? Is getting a good deal on an item for someone special worth risking a data breach? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 January 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security Internet Hardware User Tips Efficiency IT Support Malware Privacy Email Phishing Google Workplace Tips Computer Collaboration IT Services Users Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Small Business Workplace Strategy Microsoft Data Backup Communication Smartphone Passwords Saving Money VoIP Business Management Smartphones Android Mobile Devices communications Backup Data Recovery Managed Service Upgrade Managed IT Services Microsoft Office Disaster Recovery Browser Social Media Tech Term Network Remote Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Remote Work Windows Server Managed Service Provider Current Events Miscellaneous Gadgets Holiday Outsourced IT Information Productivity Employee/Employer Relationship Encryption Spam Windows 10 AI Office Training Business Continuity Data Management Compliance Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Chrome Mobile Device Management Budget Gmail Managed Services Voice over Internet Protocol Apple App Networking Employer-Employee Relationship Hacker Applications Avoiding Downtime Office 365 Marketing Access Control Tip of the week Conferencing WiFi How To BDR Computing Information Technology BYOD Router Computers Virtual Private Network Analytics Website Office Tips Health Augmented Reality Help Desk Storage Password Retail Bring Your Own Device Healthcare Managed IT Services Big Data Operating System Risk Management HIPAA Display Printer Windows 11 Paperless Office Infrastructure IT Support Monitoring 2FA Excel Firewall Document Management Remote Workers Telephone Scam The Internet of Things Data loss Going Green Cooperation Free Resource Social Project Management Windows 7 Patch Management Cybercrime Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Customer Service VPN Employees Presentation Meetings Physical Security Integration Virtual Desktop Data storage User Tip LiFi Wireless Technology Modem Computer Repair Mobile Security Processor Outlook Holidays Money Data Storage Smart Technology Supply Chain Humor Word Video Conferencing Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Sports Mouse Managed IT Service Safety Maintenance Antivirus Administration Downloads iPhone Licensing Vulnerabilities Entertainment Data Privacy Settings Images 101 Printing Wireless Robot Mobility Telephone System Multi-Factor Authentication Content Filtering Cost Management Customer Relationship Management YouTube Cryptocurrency IT Management Hacking Network Congestion Specifications Security Cameras Workplace Strategies Google Docs Unified Communications Trend Micro Experience Internet Exlporer Software as a Service Running Cable User Fraud Meta User Error Microchip Bitcoin Google Wallet Username Managing Costs Amazon Black Friday SSID Point of Sale eCommerce Database Surveillance Laptop Virtual Assistant Outsource IT Windows 8 IP Address Drones Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Tactics Development Halloween Recovery Hotspot Transportation Small Businesses Hard Drives Websites Mirgation Hypervisor Displays PowerPoint Shopping Domains Nanotechnology Optimization Addiction Scary Stories Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Hacks Management PCI DSS Refrigeration Chatbots Fun Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Deep Learning Public Speaking Screen Reader Lithium-ion battery Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Server Management Regulations Compliance Education Private Cloud Identity Entrepreneur Evernote Paperless Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Mobile Computing Financial Data Undo Error History Search Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Best Practice Connectivity IT Upload Procurement Buisness Remote Computing Azure Hybrid Work Legal Social Network Telework IT solutions Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Business Growth Tablet IoT Communitications Trends Supply Chain Management Application Alert Managed IT Customer Resource management FinTech File Sharing Regulations Cortana Dark Data Google Calendar Term Google Apps Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Alt Codes IBM Gamification Flexibility Downtime Notifications Staff Value Business Intelligence Legislation Shortcuts Organization Hosted Solution Travel Social Networking Google Maps Smart Devices Ransmoware Techology Fileless Malware Digital Security Cameras Typing Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Google Drive Health IT Competition Unified Threat Management Motherboard Data Breach Knowledge Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Wasting Time Threats 5G

Blog Archive