Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Tekie Geek can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at (347) 830-7322.

Reliable Communications Help Build Better Relation...
Tip of the Week: Follow These Steps Before You Upg...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, April 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

tech support Staten Island Data storage Tech Cloud computing Staten Island Data Protection Google Calendar Productivity Passwords Printing Server Antivirus Patch Management Cleaning Settings Hosted Solution today ’s organizations Facebook Google Wallet data recovery Staten Island Specifications Computing Going Green Web Server IT Services Notifications Scalability Mouse File Sharing Money Apple Applications IT support Staten Island Freedom of Information Managed IT Services Hackers Powerful Technology Solutions Disaster Recovery The Internet of Things Best Practices Hard Drive Displays Hacker BDR Vulnerabilities Software as a Service Black Market Thank You Medical IT Screen Reader ransomware attacks Document Management Update Workplace Tips Bluetooth Business Mangement computer services Staten Island Virtual Reality Users Society Fileless Malware Virtual Desktop Saving Money Tablets eWaste Unified Threat Management Managed Service Provider Private Cloud Username Printers Privacy IT services Staten Island Reliable Computing Training Memory Retail IT support malware worms IT services New York City Hardware Solutions Startup Access Control Spyware Cabling PDF Google Play Managed IT Project Management Browsers Voice over Internet Protocol Managing Stress IT consulting company Proxy Server Equifax computer repair Staten Island Hacking Sports data loss Office Saving Time Public Cloud News Company Culture Knowledge Information Health IT tech support Social Network App Digital IT support firms Language Upload Internet of Things Unified Communications BYOD Alert Service Level Agreement Router IT support NYC Two-factor Authentication IT support New York City Websites Physical Security Tip of the Week Business Computing Disaster Office Tips Multi-Factor Security Tactics IT Consultant Phishing Bandwidth Digital Payment Comparison Business Metrics CCTV Computing Infrastructure IT Support Windows Remote Computing Mobility Tech Support Windows 7 Password computer repair Mobile Device Management Multi-factor Authentication Mobile Device Database Relocation Twitter Taxes IT support Staten Islans Text Messaging Advertising Internet CrashOverride Webcam Download VoIP Miscellaneous LiFi Drones Small Business Documents Automation User Tips Laptop data recovery Legislation Worker YouTube Outsourced IT Productivity Legal Visible Light Communication Laptops Hard Drive Disposal SSID Scam Downtime managed IT services NYC Transportation Writing Virus Word Mobile Devices Network Congestion Corporate Profile Data Analysis Cybercrime Security Ransomware Desktop Gmail Recovery Botnet iPhone Analytics Cache Android Bookmark Administration Cryptocurrency Vendor CryptoLocker In Internet of Things managed services Robot Big Data Budget Content Gamification Telephony Upgrade Fake News Politics Firewall Hosted Solutions Proactive IT email scam Spam Compliance WiFi User Tip Lenovo Employer Employee Relationship Vulnerability Integration Network Security Staten Island IT support Computer Care malware Hard disk VPN Uninterrupted Power Supply Google Maps Administrator Innovation Business Email managed IT services staten island Networking Accidental deletion Telephone System Regulation Managed IT Services SaaS How To Nanotechnology Gadgets computer support Communication Website Supercomputer Microchip Healthcare VoIP Entertainment Business Cards Malware Cooperation IT services NYC Running Cable Google Backup Content Filtering Augmented Reality Flash Best Practice Automobile Work/Life Balance Education Smartphone Audit Help Desk Travel Downloads Bitcoin Virtual Assistant Cost Management Start Menu Browser Congratulations Backup and Disaster Recovery Security Cameras Excel Vendor Management Google Docs Microsoft 365 Data Emergency Meetings Securty Machine Learning Staten Island computer support End of Support Virtualization Time Management Microsoft Unified Threat Management Computer Monitoring Software Office 365 Search Business Management Business Continuity Business Growth Staffing Management Data Management Computer Malfunction Government Mobile Technology Network Management computer support firms computer support NYC Customer Service Tech Terms Save Money Conferencing Error Accountants Mobile Security Maintenance IBM Microsoft Office Electronic Medical Records Streaming Media Tech Term PowerPoint Workstations Banking Business Technology Tracking Staten Island IT consulting Identity Theft Wireless Headphones Wireless Technology Cybersecurity it support Motion Sickness Processors 3D Printing Managed Service Data Security Network Touchscreen Device security Software License Term IT consulting Staten island Solid State Drive IT consulting Staten Island tech support Staten Isalnd Evernote Customer Resource management IT consulting Outlook datto Distributed Denial of Service Samsung Computers Television Apps Access Redundancy Regulations SharePoint Data Backup Navigation Social Engineering computer services Tablet Employer-Employee Relationship HTML managed it services Microsoft Excel Experience IT consulting firms Hack Social Media Artificial Intelligence Domains Google Drive Technology Bring Your Own Device Information Technology Encryption Windows XP Hacks Chromebook Staten Island tech support Workers Law Enforcement Quick Tips Windows 10 Efficiency DDoS IT consulting NYC Addiction Vendor Mangement Processor Trends managed services Staten Island Paperless Office Collaboration Lithium-ion battery Piracy Holiday Monitors Wi-Fi Hardware Cloud Professional Services Windows 10 Remote Monitoring History Cortana Hiring/Firing Deep Learning Cloud Computing end-user files computer support Staten Island Solutions Health Emails IT Management Social staten island managed services Telephone Devices IT consulting firm Music Rental Service Flexibility Telephone Systems Operating System communications Wireless Smartphones Tip of the week Safety Directions Blockchain Data Breach Modem G Suite Printer Windows 8

Newsletter Sign Up