Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

Which is More Secure, Your Mobile Network or Wi-Fi...
Tip of the Week: Cortana Can Do Even More than You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Smartphone Uninterrupted Power Supply CryptoLocker Business Computing Compliance IT support Staten Island Robot Printers BDR Data Protection Securty Devices Digital Payment History Disaster Banking Unified Communications User Tip Passwords Two-factor Authentication Data Backup Managed Service Provider Audit Operating System Vulnerabilities Business Mangement Administrator Productivity Lenovo Downtime Data storage Streaming Media DDoS The Internet of Things Mobile Security computer support NYC Taxes Phishing Mobile Technology Processors data recovery Staten Island Bring Your Own Device Gadgets IT support Staten Islans Motion Sickness computer repair Social IT services Staten Island Search Cost Management Excel Electronic Medical Records IT consulting Freedom of Information Equifax Entertainment Automobile IT consulting Staten Island Word Gmail Staten Island computer support 3D Printing Cybercrime Business Management Law Enforcement eWaste Efficiency Networking Staten Island tech support Managed IT Services Bookmark Small Business Computer Care computer repair Staten Island Maintenance Server Save Money Office Tips Tablets Staffing Computing Help Desk Hardware Solutions Information Telephone data loss Computer Tech Term User Tips today ’s organizations Legislation Cabling Cloud Computing Browsers Fake News Sports Facebook Music Google Maps IT support Travel Visible Light Communication Error Workers Addiction Business Growth Augmented Reality malware Hard disk IT consulting firms Unified Threat Management Writing Internet of Things Windows 10 PDF Backup Data Management Network Technology BYOD Disaster Recovery Network Management IT support firms Supercomputer Memory IT Management Firewall Vendor Management Data Analysis Downloads Office Microsoft Language Outsourced IT Privacy Software IT services New York City IT consulting firm data recovery Tip of the Week Legal Ransomware Cybersecurity Laptop Quick Tips computer support Staten Island Hacker Internet Managed IT Services Customer Resource management IT consulting company Solid State Drive Corporate Profile Saving Money Accountants Vulnerability Tablet Monitors Laptops Google communications Vendor Mangement Nanotechnology Wireless Technology Hosted Solutions Work/Life Balance Chromebook Computers Collaboration Knowledge Telephony managed services Staten Island Telephone Systems Bandwidth Windows XP Document Management Browser Virus Managed Service Identity Theft Project Management managed IT services NYC Touchscreen Going Green Access Control Google Docs Upload Hackers Business Metrics Google Wallet Hiring/Firing Bitcoin Patch Management computer support Google Calendar Device security Access Safety Rental Service IT Consultant Cortana Microsoft Office Websites Desktop Digital Hardware VoIP Physical Security IT Services Malware Society News Television Management IBM Apps Botnet Samsung IT Support IT consulting Staten island computer services Staten Island Administration Business Virtual Desktop Outlook IT services NYC Android SaaS Big Data Spyware CrashOverride Monitoring Wi-Fi Computing Infrastructure Business Continuity Communication Windows 8 Tech Support Deep Learning IT support New York City Flash Printing Thank You Scam Software as a Service Retail Smartphones datto Username Distributed Denial of Service malware worms Password Upgrade VPN Experience YouTube Documents email scam Best Practice App Webcam Virtual Assistant Network Security Politics Drones End of Support Business Cards Running Cable Proactive IT Hard Drive Flexibility Money WiFi Windows Applications Analytics Computer Malfunction Virtualization Mobile Device Education File Sharing Multi-factor Authentication Managed IT Download Spam Black Market Workplace Tips Recovery Meetings Virtual Reality Productivity Telephone System Twitter Scalability Google Drive SharePoint LiFi Vendor Proxy Server it support Worker Health Congratulations Service Level Agreement Encryption Mobile Devices Text Messaging Tip of the week Backup and Disaster Recovery Lithium-ion battery staten island managed services Automation Regulation Hard Drive Disposal Holiday Saving Time Advertising Wireless Headphones Miscellaneous Blockchain Mobile Device Management Emails end-user files Tech Terms Reliable Computing Security computer services Settings Cleaning Customer Service Conferencing managed it services Accidental deletion Hosted Solution Powerful Technology Solutions Government Hacks Database Time Management Microsoft Excel Workstations Domains Web Server Piracy Content Cryptocurrency Cloud Displays Regulations managed IT services staten island Remote Monitoring Microchip Business Technology Email Company Culture Software License Information Technology Social Media Paperless Office Notifications Multi-Factor Security IT consulting NYC IT support NYC Staten Island IT support Data Security Budget Training Public Cloud Update Apple Cache Tracking Content Filtering Hack Redundancy CCTV In Internet of Things Website Start Menu Private Cloud Mouse Hacking Windows 10 Best Practices Emergency VoIP computer support firms Specifications Data Breach Staten Island IT consulting Antivirus Screen Reader Employer Employee Relationship Trends Social Engineering Cloud computing Staten Island Printer HTML Relocation Tactics Bluetooth tech support Staten Island Unified Threat Management Health IT Comparison tech support Staten Isalnd Employer-Employee Relationship Machine Learning managed services Innovation Data Social Network ransomware attacks Alert Network Congestion Gamification Office 365 G Suite Mobility Startup Remote Computing How To tech support Managing Stress Artificial Intelligence Wireless

Newsletter Sign Up