Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

Which is More Secure, Your Mobile Network or Wi-Fi...
Tip of the Week: Cortana Can Do Even More than You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 28 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Disaster Congratulations Mobile Device Vulnerabilities Identity Theft Data Protection Bring Your Own Device Comparison Flexibility Tracking Database Samsung IT Consultant Gmail Artificial Intelligence Unified Threat Management Tip of the week Motion Sickness Accountants ransomware attacks Hardware Solutions Safety 3D Printing Business Cards Vendor Mangement Administrator Workplace Tips Innovation Employer-Employee Relationship Virtual Assistant Administration IT consulting Staten Island Fake News Staten Island IT support Service Level Agreement Computing Google Drive tech support Facebook Hacking DDoS Ransomware Nanotechnology Mobile Security Work/Life Balance Phishing Remote Computing Tech Support Unified Communications Supercomputer Mobile Technology Web Server Hosted Solution YouTube Networking Conferencing Thank You Scam Mouse Company Culture BYOD Language Time Management Hosted Solutions Productivity communications computer repair Training Hard Drive Disposal IT support New York City Wi-Fi end-user files Help Desk Displays Information Technology Streaming Media Monitors Windows 8 Physical Security Windows 10 Data Security IT support NYC Processors Best Practices Small Business malware worms Quick Tips Computing Infrastructure Data Outlook Upgrade User Tips IT consulting company Recovery Equifax Settings Chromebook today ’s organizations IT services New York City Uninterrupted Power Supply Office Backup and Disaster Recovery Botnet Technology Documents it support Update Business Computing Applications Spyware Cryptocurrency Television Experience Windows 10 Wireless Headphones data recovery Staten Island Twitter Paperless Office Android Cache Screen Reader Mobile Device Management Wireless Data storage Retail staten island managed services Government Cortana Unified Threat Management Lithium-ion battery Rental Service File Sharing Project Management email scam Multi-Factor Security Office Tips Managed IT Corporate Profile Remote Monitoring Website Text Messaging Social Computer Excel Microsoft Notifications Business Metrics Deep Learning Piracy managed IT services NYC Document Management Software as a Service Relocation tech support Staten Isalnd Virtualization Hackers computer support computer support Staten Island Telephone Systems App Hiring/Firing Software License Distributed Denial of Service Writing VoIP Wireless Technology Managed IT Services Email computer services Advertising Printing malware Hard disk Business Technology Staten Island computer support Managed IT Services Server Devices Telephony Touchscreen Bitcoin data recovery News Staffing Two-factor Authentication tech support Staten Island Passwords IT consulting Staten island Cleaning Proactive IT Business Management Social Engineering Microsoft Office Scalability Apps Analytics Websites Computer Care Network Management Digital Internet of Things Productivity Computer Malfunction Patch Management Google Maps VPN Firewall Device security Hacks IT support firms Backup computer services Staten Island WiFi Music IT consulting firms Staten Island IT consulting Collaboration Domains SharePoint Legislation Efficiency Worker Emails Bluetooth Redundancy Black Market BDR Network Security CrashOverride Employer Employee Relationship Running Cable SaaS Cloud Computing Meetings G Suite IT Management managed services Cybersecurity Best Practice Solid State Drive IT consulting firm Digital Payment Windows XP Windows Google Wallet Antivirus Cost Management Saving Money Knowledge Travel Tip of the Week The Internet of Things Microsoft Excel Content Filtering Holiday Virus Communication Visible Light Communication data loss Smartphones Encryption Hardware Multi-factor Authentication Maintenance Public Cloud IT services NYC Emergency Health Browser Network Security Robot Network Congestion Education Lenovo Automobile Access Control Tech Term Disaster Recovery Word Cybercrime Password Privacy Apple Startup Augmented Reality Automation Workstations Business Continuity Laptop managed services Staten Island managed it services Virtual Reality Cabling Managed Service Provider Laptops IT consulting NYC Download Malware Reliable Computing Staten Island tech support Freedom of Information Law Enforcement eWaste Mobility LiFi Powerful Technology Solutions Smartphone History Blockchain Gadgets Google Calendar Alert Operating System Banking Vendor Management Private Cloud Microchip IT support Staten Island IT Services Business Mangement Money Start Menu Hack computer support firms Society Budget In Internet of Things Miscellaneous Legal Audit Memory datto Tactics Tablet Compliance CCTV Search How To Cloud computing Staten Island IT support Data Management Google Virtual Desktop Drones Webcam Specifications IBM Hard Drive VoIP Machine Learning IT support Staten Islans Business Sports Tech Terms Hacker Data Breach computer support NYC Office 365 Flash Computers Big Data Downloads IT services Staten Island Accidental deletion managed IT services staten island Social Media Securty Save Money End of Support Taxes PDF Access Data Backup IT consulting Software Politics Desktop Downtime Vulnerability Regulations Google Docs HTML computer repair Staten Island Customer Service Printer Spam Addiction Outsourced IT Bandwidth Cloud Internet Workers IT Support CryptoLocker Tablets Mobile Devices Business Growth

Newsletter Sign Up