Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Tekie Geek has been serving the Staten Island, Brooklyn, Queens, Bronx, New York City, Long Island and New Jersey area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 25 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

3D Printing Google Calendar Update Tech Terms Emergency Technology Maintenance Tracking Wireless Technology Hosted Solution Sports Mobile Technology Workplace Tips Office Efficiency Freedom of Information Network Security Applications Botnet Smartphones Cabling Managed IT Services Social Hardware App Text Messaging Google Maps IT support New York City Domains computer repair Staten Island Laptop Bitcoin Samsung Email Experience it support Distributed Denial of Service Managed IT Flash Uninterrupted Power Supply Data storage Hacking IT Services Smartphone Twitter Cloud computing Staten Island IT consulting firms datto IT services Staten Island Solid State Drive Staten Island tech support Redundancy Google Outlook Administrator Knowledge End of Support Unified Threat Management IT consulting Staten Island computer support NYC Operating System Money Staten Island IT support VoIP Collaboration Vendor Mangement Word Social Media Gadgets Spam Touchscreen YouTube Computer Malfunction Staten Island IT consulting managed services Staten Island Workstations Specifications Facebook Employer Employee Relationship Virus Productivity IT services New York City IT consulting Saving Money managed IT services NYC Business Management Work/Life Balance Cybersecurity Software License Computer tech support Staten Island Telephone Systems Microsoft managed IT services staten island Business Cards Supercomputer Spyware Firewall News Training Blockchain Employer-Employee Relationship Business Mangement Computing Infrastructure Worker Cleaning Microsoft Excel Printer DDoS Fake News Server CrashOverride Windows XP Internet of Things Alert Society In Internet of Things Paperless Office Piracy Webcam Content Filtering Desktop Drones SharePoint Monitors Vulnerabilities Audit Network Software Business Google Wallet PDF Best Practice Data Security Business Computing IT consulting company Scam Running Cable Travel computer support firms Unified Threat Management IT support Proactive IT Mobility managed it services Automation Help Desk IT support NYC Security end-user files Remote Computing Business Metrics today ’s organizations computer support Staten Island BYOD Web Server Access Control Microsoft Office Gmail Printing Budget Hardware Solutions Tip of the Week G Suite Project Management Telephony IT Consultant Apple data recovery Staten Island History Automobile Vulnerability IT Management LiFi Powerful Technology Solutions Cybercrime Antivirus managed services tech support Business Technology Government Tech Support Banking Company Culture Network Congestion Hiring/Firing Lithium-ion battery BDR Disaster Recovery malware worms Hacks Computer Care Unified Communications Downloads Tip of the week Productivity Time Management IBM malware Hard disk Memory Robot communications Ransomware File Sharing IT consulting NYC Google Docs Writing Physical Security staten island managed services Start Menu Software as a Service Internet Save Money Disaster computer repair Download Mobile Device Office 365 Cache Cloud Computing Staten Island computer support Downtime Digital Payment Cost Management Passwords Hard Drive Outsourced IT Hacker Hack VPN Mobile Device Management Taxes Deep Learning Communication IT consulting Staten island Managed Service Provider Augmented Reality Thank You Hosted Solutions Virtual Assistant Scalability Mobile Devices The Internet of Things ransomware attacks SaaS Chromebook Hackers Cryptocurrency Computing Artificial Intelligence User Tips Websites Relocation IT Support Recovery Reliable Computing Lenovo Meetings Bluetooth Laptops email scam Cortana Patch Management Miscellaneous Mobile Security Password Document Management IT support Staten Island Office Tips Data Breach WiFi Notifications Vendor Management Backup Wi-Fi computer services Staten Island Corporate Profile Streaming Media Big Data Data Backup Best Practices tech support Staten Isalnd Business Growth Data Protection Quick Tips Holiday Microchip Settings How To Cloud Windows 10 Public Cloud Virtualization Two-factor Authentication Tablets VoIP IT support Staten Islans Social Engineering Processors Black Market Malware Information Technology Education eWaste Innovation Politics Virtual Desktop Staffing Safety Browser Virtual Reality Securty Rental Service Mouse Encryption Comparison Accidental deletion Compliance Data Management Android Language Television Access Congratulations Administration Legal IT services NYC Visible Light Communication Search Upgrade Digital Bandwidth Business Continuity Excel Windows Identity Theft Small Business Apps computer support Workers IT consulting firm Health Motion Sickness Google Drive Privacy Windows 8 Networking Retail Windows 10 Displays Law Enforcement Wireless Music Machine Learning Customer Service Data CCTV Advertising computer services data recovery Managed IT Services Flexibility IT support firms Documents Website Private Cloud Hard Drive Disposal CryptoLocker Analytics Remote Monitoring Tablet Bring Your Own Device data loss Phishing

Newsletter Sign Up