Home

About Us

IT Services

Cybersecurity

News & Events

Blog

Support

Contact Us

Blog
  • Register

CoreTech Blog

How to Prevent a Virtual Assistant from Compromising Your Security

How to Prevent a Virtual Assistant from Compromising Your Security

Virtual assistants have a lot of promise as a productivity tool, so it only makes sense that they would begin to appear in the workplace. Unfortunately, these devices have also gained a reputation as a security risk. Whether or not you’ve considered bringing virtual assistants into your business, you need to prepare for their presence there.

From Apple’s Siri, to the Google Assistant, to Microsoft’s Cortana, to Amazon’s Alexa, these voice-activated solutions have appeared in our computers, our mobile devices, and in stand-alone devices.

As they have become more commonplace, they have grown in capabilities. Many of these capabilities are admittedly well-suited for the workplace - but the always-on microphones that these devices rely on to function make many pauses. After all, there’s the potential for sensitive data to be sent along to a third party if it is merely spoken aloud in this device’s presence.

This has created a quandary for those wishing to leverage these devices - do the benefits outweigh the potential risks of such an implementation?

Here, we’ve assembled a few considerations that should help make these risks less of a factor.

Just Another Internet of Things Device

The risks inherent in Internet of Things devices have been clearly documented. One notable example was the Mirai botnet, which enslaved IoT devices to power its attacks. Furthermore, it seems to be easy to forget that these virtual assistants are simply another Internet-connected device.

However, if you keep that in mind, you may find it much simpler to outline policies for these devices that can help to reduce your potential security risk. For instance, if there is a location in your office where sensitive information is spoken aloud, a virtual assistant shouldn’t be placed there. Furthermore, you don’t want to put your business’ network at risk, so it would make more sense to establish a secondary wireless network for these devices to use. That way, even if these devices are infiltrated, the rest of your network isn’t made vulnerable as a result.

Whose Devices are They?

Data privacy and ownership is a big deal in business, which could potentially complicate our issue further. Let’s say an employee were to bring in their own virtual assistant. While this may reduce the business’ capital investment into the use of a virtual assistant, there are a lot of concerns regarding security and privacy. How can you enforce data privacy if the data is being accessed by a device that you can’t control?

Policies Are Your Greatest Asset

In order to keep your business safe, while still embracing the benefits that virtual assistants can bring to the workplace, you need to set firm controls on how they can be used. There should be the assumption that one of these devices can always be listening, leading to a policy of keeping these assistants out of areas where sensitive information is regularly discussed.

This awareness should also spread over to your other devices. There are already plenty of microphones and potential vulnerabilities in the office. Phones can have their firmware hacked, and laptops can have monitoring software installed without your knowledge.

CoreTech can help you be sure that your business remains secure against a variety of threats while still enjoying the use of different technologies. Call us at (270) 282-4926 to learn more.

How to Build a Better Backup Strategy for Your Bus...
Automating Network Monitoring for Best Results
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 26, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Network Security Cloud Business Computing Privacy Hackers Malware Internet Productivity Software Hosted Solutions Mobile Devices Microsoft Backup Data Backup Innovation Google communications User Tips Computer Disaster Recovery Email Data Recovery Business Business Continuity Outsourced IT Efficiency Hardware IT Services Business Management VoIP Cybersecurity Productivity Tech Term Data IT Support Smartphone Managed IT Services Communication Internet of Things Windows 10 Windows 10 Upgrade Office 365 Ransomware Smartphones Workplace Tips Apps Managed IT Services Windows Small Business Server Mobility Mobile Device Management Phishing Cybercrime Passwords Managed IT Browser Data Security Saving Money IT Support Cloud Computing Microsoft Office Network Operating System Android Law Enforcement Miscellaneous Holiday Gadgets Collaboration Spam Users Social Media BDR Wireless Telephone Systems Virtualization Save Money Money Employer-Employee Relationship Password Quick Tips BYOD Health Automation Risk Management Artificial Intelligence Applications Computers Hosted Solution Hacking Telephony Facebook Managed Service Provider Recovery Two-factor Authentication Router Work/Life Balance Cost Management SaaS Avoiding Downtime Update Vulnerability Best Practice Wi-Fi Alert Chrome Personal Information Government Antivirus Information Technology Gmail Budget Application Google Drive Information Data Breach Business Technology Social Encryption Travel Blockchain Politics Hacker Private Cloud Audit Proactive IT Cleaning Networking Marketing IT solutions Bandwidth Project Management Printing Current Events User Error OneNote The Internet of Things Bring Your Own Device Data Management Tech Support Mobile Computing Word App VPN Social Engineering Wireless Technology Shortcut Conferencing Remote Monitoring Flexibility Firewall Data Protection Search Unsupported Software Meetings Evernote Big Data Paperless Office WiFi DDoS Commerce Instant Messaging Redundancy Access Control Software as a Service Proactive Robot Solid State Drive Remote Computing WannaCry Touchscreen Virtual Private Network End of Support Streaming Media Disaster Mobile Device Cortana Managing Stress Compliance Mobile Security Office HaaS Sports Patch Management Value Devices Data Loss Managed Service Legal Content Filtering Downtime Phone System MSP Benefits iPhone Education Google Assistant Google Docs USB Save Time Hybrid Cloud Humor Going Green Internet Exlporer Excel Computer Care Fraud Employee-Employer Relationship Voice over Internet Protocol Office tips Identity Theft History IT service Wireless Charging Apple eWaste Data Storage Battery Scam File Sharing Augmented Reality Transportation IT Management Chromebook Video Games Branding Television Screen Mirroring Specifications Point of Sale Co-Managed Services PC Sync Payroll Ciminal PowerPoint Storage Camera 5G App store Emails WIndows Server 2008 Company Culture Device Security Reputation How To Running Cable File Storage Backup and Disaster Recovery Tablets Books Amazon Identities Administrator Financial Cast Sales Automobile Telephone Adobe Experience SMB Wireless Internet Relocation Distributed Denial of Service Projects YouTube Credit Cards Laptop Webinar Admin Break/Fix Websites Domains PDF Hyperlink Workers NFL Virtual Assistant IoT Access Advertising Retail Document Management iOS Licensing Unified Threat Management Remote Workers Gamification Business Intelligence Lifestyle Smart Technology Employees FAQ Identity Touchpad IT Technicians IT solutions Files Outlook Saving Time Utility Computing Spyware SharePoint Settings Keyboard Vendor Medical IT Data Theft Data storage Text Messaging Vendor Management Wasting Time Updates Lithium-ion battery Nanotechnology Electronic Medical Records Alexa for Business E-Commerce Language HBO Data Privacy Avoid Downtime Computer Fan Mobile Music Upgrades Security Cameras intranet Memory Managed IT Service Legislation Windows 7 OneDrive Charger Windows 10s Entertainment Keyboard Shortcuts Administration Teamwork Black Market Microsoft Excel Virtual Reality Computing Accessory Microsoft Word Bluetooth Wearable Technology Root Cause Analysis Windows Ink Safety Payment Cards Hard Drive Dark Web Professional Services Analytics Consultant Machine Learning IT budget Chromecast Uninterrupted Power Supply Comparison Display Sabotage Trending Hard Disk Drive Regulation HIPAA Human Resources Edge Computer Forensics Colocation Shadow IT Hiring/Firing Testing e-waste Gifts Analysis Network Congestion Worker Commute Peripheral Maintenance Management Fax Server Scalability Google Maps WPA3 Employee Virus Wasting Money Hard Drives Unified Communications Computer Accessories Financial Technology CrashOverride Smartwatch Smart Tech Worker Connectivity Monitors Printers Content Filter Twitter Cache Samsung Monitoring Students Training Emergency

Understanding IT

IT can be a complicated thing - trust us, we know. With so much terminology and moving parts to keep track of, there are a lot of concepts that can be tricky to grasp without a little guidance. We’re here to provide this guidance with a few brief guides to key IT topics. Check them out here.

Contact Us

Learn more about what CoreTech can do for your business.

Call Us Today
Call us today
(270) 282-4926

1711 Destiny Lane
Suite 116

Bowling Green, Kentucky 42103