Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

Which is More Secure, Your Mobile Network or Wi-Fi...
Tip of the Week: Cortana Can Do Even More than You...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Network Security Technology IT Support Business Computing Hackers Android Tech Term Cybersecurity Smartphone Business Management Malware User Tips Internet Google Email Small Business Managed IT Services Ransomware Software Backup Innovation Data Recovery Productivity Artificial Intelligence Windows 10 Data Cloud Cybercrime Data Backup Efficiency Business Technology Phishing Communications Cost Management IT Management Business IT Services Data Security Encryption Gadgets Blockchain Antivirus Mobile Device Management Collaboration Patch Management Network Hard Drive Computer Update Managed IT Services Saving Money App Outsourced IT Hardware Data Breach Office 365 Alert Automation Applications Windows Apps VPN Server Internet of Things Operating System Bitcoin Facebook Maintenance SaaS Remote Monitoring Social Engineering Money Search Microsoft Office Social Media Gmail Touchscreen Spam Save Money Vulnerabilities Word Document Management Digital Microsoft Start Menu Law Enforcement Passwords Bandwidth Browser Scam Holiday Websites Laptop Data Management Smartphones Data loss Tech Terms Hacking Business Continuity Disaster Recovery Project Management Access Control Mobile Device Data Protection BDR Backup and Disaster Recovery Going Green Managed Service Provider Big Data Cloud Computing Telephony Samsung Compliance Google Maps Hard Drive Disposal Downloads Piracy History Specifications Unified Threat Management YouTube Bluetooth Download Emergency Microsoft Excel VoIP Regulations email scam VoIp Software License IBM Television Settings Wireless Headphones Automobile Printer Mobile Security Upload Vulnerability Cryptocurrency Hosted Solutions Accountants Audit Mobile Devices Cleaning Mobility Mouse Best Practice Administration Paperless Office Two-factor Authentication Trends DDoS Employer-Employee Relationship eWaste Time Management Corporate Profile Training Computers Information Technology Managed IT Unsupported Software Password Database Multi-factor Authentication Gamification Computer Care Robot Equifax Nanotechnology Google Calendar Mobile Technology Tactics Device security Excel Unified Threat Management Startup Augmented Reality Outlook SharePoint Upgrades Vendor Mangement Addiction Website Content Disaster Tip of the week Computing Infrastructure Screen Reader Google Docs Virtual Reality Distributed Denial of Service Access Running Cable Business Mangement Machine Learning Unified Communications Networking Solid State Drive WiFi Legislation Communication Budget Company Culture Redundancy Freedom of Information Telephone Systems Spyware Cabling IT Support HTML Knowledge Cortana Printing Business Cards Software as a Service Wireless Tablet Virtualization Conferencing Identity Theft Network Management News Consultant Analytics Virtual Assistant Government Uninterrupted Power Supply How to Apple Chromebook Comparison Desktop Service Level Agreement Fake News Worker Google Drive Devices Legal Downtime Virus Emails Twitter Office Users CrashOverride Office Tips Managing Stress Multi-Factor Security Windows 10 BYOD Marketing

Latest Blog

IT support is one of the most important parts of any modern business simply because it’s just not feasible to run a business without any form of technology at its core. For example, most businesses rely on email and other forms of communication, whereas stores might require ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.