Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Today’s cars, trucks, and sport utility vehicles are packed with features, many of which heavily lean on technology in order to operate. While these new vehicles and all their new capabilities are certainly appealing to today’s consumer, it needs to be said that one key aspect of technology has not been improved as these vehicles have been innovated upon.

That one key aspect? Security.

All Car Brands Were Found to Be Awful at Preserving Privacy and Security

Mozilla recently researched 25 car brands, all of which ranked terribly for privacy. Let’s summarize Mozilla’s findings briefly… and we apologize if this makes you reconsider your latest car purchase.

First Off, Mozilla Found that None of the Brands Met Their Minimum Security Standards

During their research, Mozilla found that—despite many brands publishing numerous privacy policies—none of them met the minimum standards that Mozilla expects, or at least, Mozilla couldn’t confirm that they did.

For instance, these cars contain a lot of personal information. Despite this, Mozilla was unable to confirm that this data was encrypted in any of the brands’ vehicles. Exacerbating this issue, most of the companies ignored their requests for more information outright, and those that did respond didn’t really answer their questions.

All of Them Collect Too Much Data, Most of Them Distributing It

Of the 25 brands that Mozilla examined, all of them collected more data than they needed in order to operate the vehicle’s features. That’s 100%, for those keeping track, that gathered personal information that wasn’t needed… and when you consider how many opportunities a modern car presents to collect data, there’s a lot of data that you might unwittingly be giving them. The fact that modern cars connect to a mobile device and can collect data from the services installed on it significantly increases the data that cars have access to, and that’s just the start.

Adding to the situation, most of the car companies—84%—also share the data they collect, with 76% selling it when they can. A little more than half (56%) will share this data with government officials by request—not court order, mind you, but just a request.

Drivers are Given Almost No Control Over Their Data

It’s important that consumers are given the ability to demand their data to be deleted. Unfortunately, 92% of the car companies that Mozilla examined wouldn’t allow drivers to do so… the only exceptions both being owned by a single company and only available in Europe, meaning that the General Data Protection Regulation applies, and they have to abide by deletion requests as a result. 

In Short, This Might Make You Want to Buy Used Until Car Companies Are Made to Do Better

Fortunately, when it comes to your business, you don’t have to compromise your security for added features and benefits. Not only can we help you get the most out of your technology, we can ensure that it is done with the security standards you need to remain safe.

Give us a call at 800.618.9844 to get started, or to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 January 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security Internet Hardware User Tips Efficiency IT Support Malware Privacy Email Phishing Google Workplace Tips Computer Collaboration IT Services Users Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Small Business Microsoft Workplace Strategy Data Backup Communication Smartphone Android Passwords Saving Money Business Management VoIP Smartphones communications Mobile Devices Backup Data Recovery Upgrade Managed Service Managed IT Services Microsoft Office Browser Disaster Recovery Social Media Tech Term Network Remote Internet of Things Automation Artificial Intelligence Facebook Covid-19 Cloud Computing Server Managed Service Provider Windows Remote Work Miscellaneous Current Events Gadgets Holiday Information Outsourced IT Productivity Employee/Employer Relationship Encryption Spam AI Windows 10 Office Training Data Management Business Continuity Compliance Government Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Chrome Gmail Budget Apple Networking Managed Services Voice over Internet Protocol App Employer-Employee Relationship Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Applications Tip of the week WiFi Conferencing How To BDR BYOD Computers Virtual Private Network Risk Management Website HIPAA Health Router Analytics Office Tips Augmented Reality Retail Storage Help Desk Password Bring Your Own Device Big Data Managed IT Services Healthcare Operating System Windows 7 Microsoft 365 Display Printer Paperless Office Solutions Infrastructure IT Support Firewall Document Management Windows 11 2FA Monitoring The Internet of Things Scam Excel Data loss Social Remote Workers Telephone Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Customer Service Cooperation Free Resource Vendor Management Cybercrime Project Management Presentation VPN YouTube Meetings Images 101 Physical Security Mobility Telephone System Cryptocurrency Multi-Factor Authentication Wireless Technology Cost Management Computer Repair Virtual Desktop Data storage LiFi Employees Word Integration Outlook Machine Learning User Tip Modem Processor Money Mobile Security Humor Holidays Safety Data Storage Maintenance Sports Smart Technology Supply Chain Antivirus Mouse Video Conferencing Managed Services Provider Virtual Machines Professional Services Saving Time Administration Managed IT Service Downloads iPhone Robot Customer Relationship Management Licensing Settings Printing Vulnerabilities Wireless Entertainment Data Privacy Content Filtering Hacking IT Management Star Wars IT Assessment Microsoft Excel IT Maintenance Network Congestion Data Analysis Google Drive User Error Gamification Flexibility User Staff Value Business Intelligence Knowledge Legislation Shortcuts Organization Social Networking Smart Devices Point of Sale Ransmoware 5G Fileless Malware Digital Security Cameras IP Address Google Docs Content Remote Working Unified Communications Wearable Technology Memory Vendors Experience Running Cable Tech Support Comparison Google Play Be Proactive Health IT Bitcoin Network Management Motherboard Data Breach Google Wallet Assessment Electronic Health Records Permissions Workforce Monitors Directions Videos Recovery Wasting Time Threats Laptop Websites Specifications Security Cameras Workplace Strategies Hard Drives Windows 8 Trend Micro Domains Drones Internet Exlporer Software as a Service Fraud Meta Microchip SharePoint Username Managing Costs Amazon Electronic Medical Records Halloween Black Friday SSID Refrigeration eCommerce Public Speaking Lenovo Database Surveillance Virtual Assistant Outsource IT Writing Lithium-ion battery IT Technicians Virtual Machine Environment Virtual Reality Media Cookies Entrepreneur Scary Stories Private Cloud Cyber Monday Medical IT Proxy Server Reviews Hacks Server Management Superfish Tactics Development Identity Theft Hotspot Transportation Small Businesses Fun Deep Learning Mirgation Hypervisor Displays Twitter Nanotechnology Optimization Error PowerPoint Shopping Undo Addiction Education Language Employer/Employee Relationships Outsourcing Social Engineering Navigation Management PCI DSS Chatbots Remote Computing Screen Reader Distributed Denial of Service Workplace Gig Economy Mobile Computing Service Level Agreement Internet Service Provider Tablet Computing Infrastructure Teamwork Hiring/Firing Search Evernote Paperless Regulations Compliance Application Best Practice Identity Alert Smart Tech Memes Buisness File Sharing Co-managed IT Dark Data Bookmark Managed IT IBM Legal Download Net Neutrality IT solutions Alerts SQL Server Technology Care How To Business Communications Financial Data Business Growth History Notifications Connectivity IT Travel Break Fix Scams Browsers Smartwatch Techology Upload Procurement Google Maps Azure Hybrid Work Cortana Multi-Factor Security Tech Human Resources Social Network Telework Alt Codes Cyber security IoT Communitications Downtime Unified Threat Management Dark Web Cables CES Competition Unified Threat Management Trends Supply Chain Management Hosted Solution Google Calendar Term Google Apps Customer Resource management FinTech Typing Regulations

Blog Archive