Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Decatur Computers Inc. can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at 217-475-0226.

Reliable Communications Help Build Better Relation...
Tip of the Week: Follow These Steps Before You Upg...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Network Security Tech Term Hackers Productivity User Tips Efficiency Innovation Data Software IT Support Data Backup Google Android Cybersecurity Data Recovery Email Computer Business Management Malware Internet Collaboration Small Business Communications Smartphone Windows 10 IT Services Communication Hardware Cloud Phishing Hosted Solutions Backup Ransomware Mobile Device Artificial Intelligence Managed IT Services Business Microsoft Office BDR Outsourced IT Automation VoIp Cloud Computing Browser Facebook IT Management Social Media Business Technology Mobile Devices App Mobile Device Management Two-factor Authentication Managed Service Cybercrime Cost Management Smartphones Blockchain Applications Network Information Access Control Office 365 Antivirus Update Internet of Things Holiday Microsoft Patch Management Data Security Passwords Scam Apps Vulnerabilities Websites Gadgets Encryption Maintenance Server Workplace Tips Data Management Managed IT Services Analytics Saving Money Disaster Recovery Hard Drive Managed Service Provider Save Money Document Management Money Quick Tips Google Maps Upgrade Cooperation Search Spam Alert Conferencing Word Virtual Assistant Data loss Big Data Saving Time Touchscreen Digital Hacking Apple Data Protection Law Enforcement VPN Vulnerability Windows Healthcare Bitcoin Start Menu Operating System Mobility Data Breach Laptop Social Engineering Augmented Reality Remote Monitoring Vendor Tech Terms Bandwidth Users SaaS Gmail Project Management Printer Business Continuity Management Google Play Specifications HTML Service Level Agreement Vendor Management Tip of the week Cleaning Outlook Paperless Office Business Cards Microsoft Excel Virtualization Uninterrupted Power Supply Google Drive Username Navigation Virus Telephone System Disaster eWaste Distributed Denial of Service Training Data Analysis Downloads Identity Theft Unified Threat Management Computing Security Cameras Samsung Emergency Television Worker Going Green Upgrades Information Technology Computers Google Docs Multi-factor Authentication Database User Tip Unified Threat Management Cryptocurrency Telephony Windows 7 Evernote YouTube Electronic Medical Records Medical IT Robot Freedom of Information Equifax Vendor Mangement Content Fileless Malware Desktop Chromebook Error Social Mouse Devices Download Bookmark Unified Communications Mobile Technology Cortana Nanotechnology Redundancy Budget Device security Tactics Access Addiction Audit Downtime Emails History VoIP Microsoft 365 Miscellaneous Backup and Disaster Recovery Settings Health IT PowerPoint WiFi Knowledge News Startup Business Mangement Voice over Internet Protocol BYOD Directions Automobile Telephone Router DDoS Hard Drive Disposal Compliance Upload Browsers Telephone Systems Printing Solutions Tech IT Support Website Running Cable Spyware Machine Learning Proxy Server Best Practice Piracy Bluetooth IBM Managed IT Twitter Administration Professional Services Wireless Computing Infrastructure Fake News Solid State Drive iPhone Microchip Tablet Software as a Service Social Network Modem email scam Regulations Trends Consultant Government Virtual Reality Screen Reader Integration Monitoring Term Comparison Cabling Network Management Help Desk Unsupported Software Computer Care Software License Excel Wireless Headphones Corporate Profile Time Management Google Calendar Mobile Security Employer-Employee Relationship Sports Networking Legislation Retail Travel Processor How to Customer Resource management SSID SharePoint Accountants Password Gamification Entertainment Legal Company Culture Transportation Managing Stress Windows 10 Printers Marketing Multi-Factor Security Regulation Office Office Tips CrashOverride

Latest Blog

The capabilities of business technology are truly incredible, and they’re only becoming more impressive. This means that the solutions you have in place now will certainly need to be upgraded to other options at some point.

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.