Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

Which is More Secure, Your Mobile Network or Wi-Fi...
Tip of the Week: Cortana Can Do Even More than You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Vulnerability Cache Laptops Management Cloud computing Staten Island Quick Tips Experience Cost Management Hackers Alert Disaster Recovery Users data recovery Staten Island Content Filtering Flash Productivity Tracking Evernote CrashOverride Android Access Control Text Messaging Safety News Public Cloud Data Backup Network Security Laptop Google Calendar Business Supercomputer Tech Terms Antivirus Disaster staten island managed services Telephone Systems Database VoIP Comparison Banking IT Consultant Tablet Employer Employee Relationship Addiction Business Technology Term Passwords PDF End of Support Training VPN Managed IT Services Advertising Staten Island IT consulting IT consulting Staten Island Mobility Project Management Productivity computer support firms Cybercrime Politics Social Network Budget Business Metrics Microchip Microsoft Chromebook Business Management Scalability Processors Tech Support Settings Innovation IT support firms Audit Administrator tech support Time Management 3D Printing Automobile Office Memory Botnet tech support Staten Isalnd Network Congestion Communication computer services Staten Island email scam Applications Office Tips Knowledge Business Continuity Mobile Security Hacker Government Business Growth Startup Money eWaste Managed Service computer repair Staten Island data loss Screen Reader Technology Retail Rental Service Error Augmented Reality Printing Taxes Windows 8 Vulnerabilities Computer Society Managing Stress Business Cards Specifications CCTV Spam Meetings Running Cable Facebook Education Customer Resource management Wireless Staten Island tech support Samsung Staten Island IT support Password Spyware Tech Cortana Hacking Touchscreen Virtualization IT consulting Staten island Gmail Google Maps Nanotechnology User Tip History Modem Displays Web Server CryptoLocker Ransomware Securty Data Management Remote Monitoring Sports Congratulations HTML Desktop Content Upload Computer Malfunction Computing Infrastructure tech support Staten Island Google Wallet Data Protection Managed IT Holiday Analytics WiFi Smartphones Download Best Practice Telephone System Directions Virtual Reality Apple Automation Distributed Denial of Service IT support NYC Webcam Identity Theft it support Unified Threat Management Navigation Website Hacks managed services Staten Island Miscellaneous Powerful Technology Solutions Google Drive Vendor communications Motion Sickness Trends Bitcoin datto Travel Bring Your Own Device Emergency Data Analysis Lenovo Data storage Paperless Office Machine Learning Fileless Malware Maintenance Software License Save Money IT consulting firms IBM Artificial Intelligence Gadgets Backup Mobile Device IT services NYC Phishing Bookmark Google Play Health Redundancy Tactics IT services Staten Island Microsoft Excel Regulation Cybersecurity Legal Saving Time Bluetooth computer repair Email Data Breach Office 365 Telephony Tech Term Software as a Service IT consulting NYC IT consulting firm Computer Care Physical Security User Tips Patch Management malware worms Security Cameras App Legislation Vendor Mangement Compliance Staffing Twitter Multi-Factor Security Managed IT Services ransomware attacks Hard Drive Access Hardware BDR Router IT Management Hosted Solutions Tip of the week Word Network Computing G Suite BYOD Smartphone IT Services computer support NYC Digital Collaboration Electronic Medical Records Small Business Help Desk Cryptocurrency Vendor Management Microsoft Office computer support Staten Island Tablets IT Support Social Backup and Disaster Recovery Unified Communications Hack Cleaning Update Server Wireless Technology Monitors Staten Island computer support Wireless Headphones Efficiency Network Management Firewall Blockchain Company Culture Browsers Notifications Streaming Media Information Windows 10 Upgrade Hard Drive Disposal Best Practices Healthcare Mobile Device Management Search Wi-Fi IT support New York City managed IT services NYC Business Mangement computer support SharePoint Solid State Drive Devices Data Remote Computing today ’s organizations managed services Equifax Unified Threat Management Software Browser YouTube IT support Computers end-user files Social Engineering Music Big Data IT services New York City Regulations Mobile Devices Scam Device security Processor Law Enforcement Deep Learning Telephone Piracy Google Hiring/Firing SaaS Mobile Technology Google Docs VoIP Virtual Desktop managed it services Work/Life Balance Bandwidth managed IT services staten island Language Conferencing Business Computing data recovery Flexibility Service Level Agreement Digital Payment Proactive IT Relocation IT support Staten Island Information Technology Recovery Workers DDoS Visible Light Communication Document Management Going Green Managed Service Provider Encryption Health IT LiFi Emails How To Networking Outsourced IT Entertainment Windows 10 Television computer services Accidental deletion Security Uninterrupted Power Supply Excel Thank You Drones Malware Private Cloud Gamification Hardware Solutions Monitoring Workplace Tips Employer-Employee Relationship malware Hard disk Documents Cloud Virus Multi-factor Authentication Saving Money IT consulting company Lithium-ion battery Accountants Workstations Outlook Websites Windows XP Social Media IT consulting Worker Data Security Writing Mouse Printers Corporate Profile Black Market Tip of the Week Administration Windows Downtime Hosted Solution Reliable Computing Privacy Internet of Things Domains Apps Fake News Freedom of Information Start Menu Proxy Server Robot IT support Staten Islans Cabling Customer Service Two-factor Authentication Virtual Assistant Username SSID In Internet of Things Printer The Internet of Things Downloads File Sharing Cloud Computing Operating System Internet

Newsletter Sign Up