Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Today’s cars, trucks, and sport utility vehicles are packed with features, many of which heavily lean on technology in order to operate. While these new vehicles and all their new capabilities are certainly appealing to today’s consumer, it needs to be said that one key aspect of technology has not been improved as these vehicles have been innovated upon.

That one key aspect? Security.

All Car Brands Were Found to Be Awful at Preserving Privacy and Security

Mozilla recently researched 25 car brands, all of which ranked terribly for privacy. Let’s summarize Mozilla’s findings briefly… and we apologize if this makes you reconsider your latest car purchase.

First Off, Mozilla Found that None of the Brands Met Their Minimum Security Standards

During their research, Mozilla found that—despite many brands publishing numerous privacy policies—none of them met the minimum standards that Mozilla expects, or at least, Mozilla couldn’t confirm that they did.

For instance, these cars contain a lot of personal information. Despite this, Mozilla was unable to confirm that this data was encrypted in any of the brands’ vehicles. Exacerbating this issue, most of the companies ignored their requests for more information outright, and those that did respond didn’t really answer their questions.

All of Them Collect Too Much Data, Most of Them Distributing It

Of the 25 brands that Mozilla examined, all of them collected more data than they needed in order to operate the vehicle’s features. That’s 100%, for those keeping track, that gathered personal information that wasn’t needed… and when you consider how many opportunities a modern car presents to collect data, there’s a lot of data that you might unwittingly be giving them. The fact that modern cars connect to a mobile device and can collect data from the services installed on it significantly increases the data that cars have access to, and that’s just the start.

Adding to the situation, most of the car companies—84%—also share the data they collect, with 76% selling it when they can. A little more than half (56%) will share this data with government officials by request—not court order, mind you, but just a request.

Drivers are Given Almost No Control Over Their Data

It’s important that consumers are given the ability to demand their data to be deleted. Unfortunately, 92% of the car companies that Mozilla examined wouldn’t allow drivers to do so… the only exceptions both being owned by a single company and only available in Europe, meaning that the General Data Protection Regulation applies, and they have to abide by deletion requests as a result. 

In Short, This Might Make You Want to Buy Used Until Car Companies Are Made to Do Better

Fortunately, when it comes to your business, you don’t have to compromise your security for added features and benefits. Not only can we help you get the most out of your technology, we can ensure that it is done with the security standards you need to remain safe.

Give us a call at 800.618.9844 to get started, or to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Phishing Email Workplace Tips Computer Google IT Services Users Collaboration Hosted Solutions Quick Tips Ransomware Mobile Device Cybersecurity Small Business Microsoft Data Backup Workplace Strategy Communication Business Management Smartphones Android Saving Money Smartphone VoIP Mobile Devices communications Backup Data Recovery Managed Service Passwords Managed IT Services Social Media Microsoft Office Upgrade Browser Disaster Recovery Network Tech Term Internet of Things Automation Artificial Intelligence Facebook Remote Cloud Computing Covid-19 Miscellaneous Gadgets Windows Server Managed Service Provider Remote Work Outsourced IT Information Employee/Employer Relationship Encryption Spam Productivity Current Events Holiday Windows 10 Government Office Business Continuity Data Management Virtualization Wi-Fi Training Compliance Business Technology Blockchain AI Windows 10 Data Security Apps Two-factor Authentication Mobile Office Bandwidth App Employer-Employee Relationship Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail Vendor Apple Networking BDR BYOD Computing Conferencing Information Technology Hacker Access Control Avoiding Downtime Office 365 Tip of the week Applications How To WiFi Big Data Help Desk Operating System Virtual Private Network Risk Management Computers Healthcare Health Office Tips Analytics Website Marketing Augmented Reality Retail Storage Password HIPAA Bring Your Own Device Router Managed IT Services Going Green Patch Management Windows 11 Social Save Money 2FA Remote Monitoring Monitoring Vulnerability End of Support Vendor Management Cybercrime Excel Customer Service Remote Workers Display Printer Telephone Paperless Office Infrastructure Cooperation Free Resource IT Support Project Management Document Management Windows 7 Microsoft 365 Firewall Scam Solutions Data loss The Internet of Things Processor Mobile Security Holidays Robot Settings Data Storage Printing Wireless Smart Technology Supply Chain Video Conferencing Content Filtering Customer Relationship Management Managed Services Provider IT Management VPN Saving Time YouTube Meetings Virtual Machines Professional Services Cryptocurrency Hacking Managed IT Service Computer Repair Presentation Downloads Virtual Desktop iPhone Licensing Data storage LiFi Wireless Technology Entertainment Vulnerabilities Data Privacy Outlook Machine Learning Money Images 101 Word Humor Telephone System Multi-Factor Authentication Mobility Cost Management Maintenance Antivirus Sports Mouse Employees Safety Administration Integration User Tip Modem Legal IT solutions Database Surveillance How To Virtual Assistant Outsource IT Notifications IT Technicians Virtual Machine Environment Media Business Growth Proxy Server Reviews Travel Cookies Application Cyber Monday Medical IT Techology Google Maps Tactics Development Cortana Hotspot Transportation Small Businesses IBM Mirgation Hypervisor Displays Alt Codes Shopping Downtime Unified Threat Management Nanotechnology Optimization PowerPoint Unified Threat Management Hosted Solution Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Typing Management PCI DSS Gig Economy Screen Reader Network Congestion Distributed Denial of Service Workplace Google Drive User Error Service Level Agreement Internet Service Provider Competition Knowledge Physical Security Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Identity Evernote Paperless Bookmark Point of Sale Smart Tech Memes 5G Co-managed IT Experience Alerts SQL Server Technology Care Google Docs Unified Communications Download Net Neutrality Bitcoin Network Management Financial Data Running Cable Tech Support History User Business Communications Google Wallet Browsers Smartwatch Connectivity IT Monitors Break Fix Scams Azure Hybrid Work Upload Procurement Windows 8 Social Network Telework IP Address Laptop Websites Cyber security Multi-Factor Security Tech Human Resources Drones CES IoT Communitications Dark Web Cables Electronic Medical Records SharePoint Trends Supply Chain Management Customer Resource management FinTech Halloween Regulations Recovery Google Calendar Term Google Apps Lenovo Data Analysis Star Wars IT Assessment Hard Drives Writing Microsoft Excel IT Maintenance Virtual Reality Staff Value Business Intelligence Gamification Flexibility Domains Hacks Server Management Organization Scary Stories Private Cloud Social Networking Legislation Shortcuts Superfish Fileless Malware Digital Security Cameras Identity Theft Smart Devices Refrigeration Fun Ransmoware Twitter Wearable Technology Memory Vendors Deep Learning Content Remote Working Public Speaking Health IT Lithium-ion battery Error Motherboard Data Breach Comparison Google Play Be Proactive Directions Videos Education Assessment Electronic Health Records Social Engineering Permissions Workforce Entrepreneur Remote Computing Wasting Time Threats Mobile Computing Trend Micro Specifications Security Cameras Workplace Strategies Microchip Tablet Internet Exlporer Software as a Service Undo Search Fraud Meta Alert Managing Costs Amazon Best Practice Username Managed IT Buisness File Sharing eCommerce Dark Data Black Friday SSID

Blog Archive