Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

Which is More Secure, Your Mobile Network or Wi-Fi...
Tip of the Week: Cortana Can Do Even More than You...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

CryptoLocker Maintenance Software as a Service Desktop 3D Printing Apps IT Support Miscellaneous Mouse Data Breach Rental Service Office Tips The Internet of Things Managed Service Relocation malware worms computer repair Staten Island Browser Best Practices Virus Website Work/Life Balance Management computer repair Taxes Business Growth IT Management Productivity IT Consultant Money tech support Staten Isalnd Access Control Cloud Customer Resource management Email Big Data Mobile Device Word Information Technology Staten Island IT support Managed IT Conferencing Hardware Solutions Business Continuity Startup Computer Care Security Windows 10 Cybercrime Hard Drive Distributed Denial of Service Vulnerabilities Best Practice Wi-Fi Government Efficiency VoIP Robot Remote Computing Applications Emergency Operating System Software License Paperless Office Fake News Networking Cortana Bring Your Own Device Data storage Network malware Hard disk Scam Social Engineering Innovation Safety Society Microsoft Apple WiFi Piracy computer services Samsung Processors Encryption Collaboration IT consulting Staten island HTML Productivity Budget Managed Service Provider Websites Managed IT Services Monitors LiFi Google Docs Vendor Mangement Hack Staten Island tech support Upgrade Administration Wireless PDF IT consulting NYC Computer computer support Staten Island Computing Computer Malfunction Uninterrupted Power Supply Business Mangement Windows 8 Meetings Wireless Headphones Small Business email scam Social Media Network Security Augmented Reality Password Time Management Tech Support Machine Learning Flexibility Printer Smartphones Username Virtual Reality Virtualization Education Regulation Nanotechnology Accidental deletion Hiring/Firing Memory Bluetooth Antivirus Microchip Google Drive Tablet Legislation Running Cable Hacker data loss Chromebook Cybersecurity Downtime Emails staten island managed services Accountants Holiday Managing Stress Corporate Profile Workers IT support Staten Islans Downloads Save Money Worker DDoS Redundancy Motion Sickness Vendor Management Outsourced IT communications Disaster Recovery Tactics File Sharing IT support NYC Audit Reliable Computing Securty Blockchain Music Laptop Health Remote Monitoring App eWaste Content Filtering Content Sports Webcam Private Cloud Cloud Computing Gadgets Computing Infrastructure Data Settings Thank You Writing Compliance Recovery computer support NYC End of Support Office 365 IT support Staten Island Company Culture Trends computer support tech support Staten Island Help Desk Google Maps Search Hackers Tablets SaaS Device security Spyware G Suite Streaming Media Regulations Travel Backup and Disaster Recovery ransomware attacks CrashOverride Bandwidth Multi-Factor Security IT support New York City Internet Automation Identity Theft Tracking Phishing computer support firms BYOD IT support SharePoint Mobile Technology Microsoft Excel News Cryptocurrency IT services NYC Cache In Internet of Things VoIP Workplace Tips Android Google Wallet Firewall Social Retail Physical Security Telephone Systems IT services Staten Island managed IT services staten island datto Gmail Powerful Technology Solutions Tech Term Digital Payment Data Backup Business Management Business Technology Windows 10 Saving Money User Tips Language Addiction Business Computing Cleaning Hosted Solution Supercomputer Internet of Things Upload Congratulations Proactive IT managed services Cost Management Screen Reader Update How To Lenovo Access Service Level Agreement Virtual Assistant Devices Web Server Software Analytics Knowledge Excel Wireless Technology Computers Facebook History Printing IT consulting Staten Island Database Legal Politics Microsoft Office Automobile Staten Island IT consulting IT consulting firm CCTV Solid State Drive Mobile Devices Technology Data Protection Download Unified Threat Management Ransomware IT support firms Administrator Drones Mobile Security Flash Text Messaging Employer-Employee Relationship Documents Smartphone Freedom of Information Error Domains Managed IT Services Business Vulnerability Spam Hard Drive Disposal YouTube Unified Communications it support IT services New York City Project Management BDR Start Menu Banking Staffing Digital IBM Tip of the week Comparison Experience Monitoring Virtual Desktop Disaster Scalability Multi-factor Authentication IT Services Law Enforcement Quick Tips IT consulting firms Twitter Social Network Data Management Windows XP Customer Service Google Telephony Television Lithium-ion battery managed IT services NYC Office Employer Employee Relationship Botnet today ’s organizations Malware Training Google Calendar Specifications Cabling IT consulting company Staten Island computer support Data Security Bitcoin Tip of the Week IT consulting end-user files Going Green Network Management data recovery Staten Island Mobile Device Management Cloud computing Staten Island Unified Threat Management Document Management Outlook Business Metrics Workstations Privacy Public Cloud Alert Backup Touchscreen Displays Mobility Communication Patch Management Server Artificial Intelligence Tech Terms managed it services Equifax Telephone Windows Hardware Deep Learning Two-factor Authentication Hacking managed services Staten Island Visible Light Communication computer services Staten Island data recovery Gamification Information Black Market Network Congestion tech support Hosted Solutions VPN Hacks Notifications Business Cards Passwords Laptops Advertising

Newsletter Sign Up