Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Accidentally Gifting a Security Breach?

Are You Accidentally Gifting a Security Breach?

The holidays are a time filled with good food, visits from dear friends and family, and exchanging gifts with those you care about. However, to keep the season bright and merry, you need to be a little cautious during your next gift exchange, as many gifts can present some unexpected risks to your recipient’s security. Be mindful if you see the following items on someone’s wish list.

Digital Assistants and Smart Home Hubs
These little devices have made a splash as a useful household appliance, answering a user’s questions and controlling their various media. However, these nifty gizmos are always listening--literally. These devices rely on microphones that automatically activate, meaning that they hear everything you have to say. Imagine what a cybercriminal could do with the information they extract from them.

What’s worse, many of these devices now also come equipped with cameras, allowing a cybercriminal to effectively invade your privacy from anywhere.

While it may be a neat idea to take control of one’s environment through technology, it provides cybercriminals with the opportunity to take advantage of these devices as they victimize you, along with your family or staff. These devices can be used to spy on you and collect enough information to piece together your daily routine--invaluable intel for the criminal class. It’s important to keep this in mind if you are purchasing these devices for young children. Although Google and Amazon want to be on top of their security, it’s important to consider the lack of security awareness kids might have.

Connected Toys
While many of these devices may seem like they appeal to an older demographic, there are plenty of toys and games for children that are getting smarter. This also increases their creepiness factor, as hackers could use some toys--such as a Toymail Talkie--to communicate directly with children. Other connected playthings could provide hackers with details about a child’s life that are far too intimate. Edwin the Duck, a connected bath toy, could be used to extrapolate how often a child is bathed and when they are put to bed.

Smart Appliances
Of course, adults can have toys of their own in the form of appliances, and they are more and more frequently being built with smart capabilities included. We’re talking about wearables like fitness trackers and Internet of Things devices. Basically anything that connects to the Internet that isn’t a traditional computer or laptop would fall into this category. What isn’t always included is any sufficient security to keep these appliances from being made a part of a botnet. Furthermore, like digital assistants, these devices can easily collect data based on the activity around them.

DNA Testing Kits
This one may come as a surprise to many, but those kits that you send away with a vial of your spit may be the next major cause of privacy issues. After all, the product itself requires the most unique piece of personally identifiable information you have: your DNA. This specific data can quickly become valuable, especially for research purposes.

The agreements that you have to sign in order to use these services often have terms that grant the company permission to do as they will with your genetic data--which includes sharing a digitized version of this data with those who are willing to pay. While the Genetic Information Nondiscrimination Act of 2008 forbids the use of genetic data as a justification for discrimination-or firing someone because they have a predisposition to a condition-this kind of discrimination would be awfully hard to prove.

While the holidays should be a time of happiness, few things can put a damper on that happiness quicker than a security breach of your data. Mozilla has helpfully created a list of potentially risky products for consumers to reference as they do their holiday shopping.

So, what do you think? Is getting a good deal on an item for someone special worth risking a data breach? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet IT Support Efficiency Malware Privacy Email Google Phishing Workplace Tips Computer Collaboration IT Services Users Mobile Device Hosted Solutions Ransomware Quick Tips Small Business Cybersecurity Workplace Strategy Microsoft Communication Data Backup Smartphone Passwords Saving Money Business Management VoIP Smartphones Android Mobile Devices communications Backup Upgrade Data Recovery Managed Service Managed IT Services Browser Microsoft Office Disaster Recovery Social Media Windows Tech Term Network Internet of Things Remote Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Server Managed Service Provider Miscellaneous Current Events Gadgets Remote Work Productivity Outsourced IT Information Holiday AI Encryption Spam Employee/Employer Relationship Windows 10 Compliance Data Management Business Continuity Government Training Office Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Two-factor Authentication Mobile Office Data Security Apps Managed Services Mobile Device Management Voice over Internet Protocol Chrome Gmail Networking Budget Apple App Employer-Employee Relationship Vendor Avoiding Downtime Tip of the week Marketing Conferencing Office 365 How To BDR WiFi BYOD Applications Computing Access Control Hacker Information Technology Website Retail Analytics Office Tips Augmented Reality Healthcare Managed IT Services Storage Password Bring Your Own Device Big Data HIPAA Router Virtual Private Network Operating System Computers Health Risk Management Help Desk 2FA Document Management Excel IT Support Telephone Remote Workers Scam Firewall Data loss Cooperation Free Resource The Internet of Things Project Management Windows 7 Patch Management Save Money Social Remote Monitoring End of Support Microsoft 365 Vulnerability Vendor Management Solutions Going Green Display Printer Customer Service Cybercrime Paperless Office Infrastructure Windows 11 Monitoring Data Storage Supply Chain Machine Learning Video Conferencing Virtual Desktop Saving Time LiFi Managed Services Provider Data storage Virtual Machines Professional Services Managed IT Service Word Maintenance Outlook Downloads Antivirus Money Humor Licensing iPhone Entertainment Safety Vulnerabilities Sports Data Privacy Mouse Robot Telephone System Images 101 Administration Cost Management Mobility Multi-Factor Authentication IT Management Meetings VPN Physical Security Customer Relationship Management Settings Employees Wireless Modem Integration Printing User Tip Processor Content Filtering Computer Repair Mobile Security Hacking Presentation YouTube Holidays Cryptocurrency Smart Technology Wireless Technology Unified Communications SharePoint Experience Addiction Electronic Medical Records Language Hypervisor Displays IP Address Google Docs Optimization PowerPoint Bitcoin Running Cable Management Shopping Chatbots Screen Reader Writing Distributed Denial of Service Employer/Employee Relationships Outsourcing Google Wallet Lenovo Navigation Recovery Service Level Agreement PCI DSS Virtual Reality Computing Infrastructure Workplace Hard Drives Windows 8 Laptop Server Management Gig Economy Private Cloud Identity Superfish Bookmark Identity Theft Smart Tech Internet Service Provider Teamwork Hiring/Firing Domains Drones Evernote Paperless Download Regulations Compliance Twitter Alerts Error Memes Co-managed IT Refrigeration Halloween Browsers Connectivity Net Neutrality Social Engineering Break Fix SQL Server Technology Care Public Speaking Lithium-ion battery Business Communications Upload Financial Data Remote Computing History IT Multi-Factor Security Scams Hacks Entrepreneur Scary Stories Social Network Smartwatch Fun Tablet IoT Procurement Dark Web Azure Hybrid Work Tech Human Resources Deep Learning Trends Telework Alert Cyber security File Sharing Regulations Communitications Dark Data Google Calendar Cables Undo Managed IT Customer Resource management CES Education Data Analysis Star Wars Supply Chain Management How To Microsoft Excel Term Google Apps Gamification FinTech Notifications Staff Travel Social Networking IT Assessment Legislation IT Maintenance Mobile Computing Techology Fileless Malware Search Google Maps Flexibility Value Business Intelligence Shortcuts Application Best Practice Content Organization Wearable Technology Unified Threat Management Motherboard Smart Devices Comparison Ransmoware Buisness Health IT Digital Security Cameras IT solutions Unified Threat Management Directions Assessment Remote Working Permissions Memory Vendors IBM Legal Google Play Be Proactive Business Growth Data Breach Videos Electronic Health Records Network Congestion Specifications Workforce User Error Microchip Cortana Internet Exlporer Fraud Wasting Time Threats Trend Micro Security Cameras Workplace Strategies Alt Codes Username Point of Sale Software as a Service Black Friday Meta Competition Downtime Hosted Solution Database Managing Costs Amazon eCommerce SSID Typing Network Management Tech Support IT Technicians Cookies Surveillance Monitors Cyber Monday Virtual Assistant Outsource IT Proxy Server Media User Knowledge Tactics Hotspot Virtual Machine Environment Google Drive Medical IT Reviews Websites Mirgation 5G Nanotechnology Development Transportation Small Businesses

Blog Archive