facebook linkedin twitter

Computerware Blog

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Computerware can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at (703) 821-8200.

Reliable Communications Help Build Better Relation...
Tip of the Week: Follow These Steps Before You Upg...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 29, 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Microsoft Hardware Workplace Tips Network Security Backup Managed Service Provider Business Productivity Hosted Solutions Email Malware IT Services Saving Money Efficiency Productivity Computer Google User Tips IT Support Small Business Smartphones Innovation Mobile Devices Data Backup Quick Tips VoIP Network Gadgets IT Support Collaboration Business Continuity Microsoft Office communications Upgrade Data Recovery Android Social Media Server Disaster Recovery Mobile Office Cybersecurity Virtualization Communication Smartphone Mobile Device Management Miscellaneous Phishing Holiday Ransomware Passwords Operating System Tech Term Windows 10 Windows Apps Outsourced IT Facebook Unified Threat Management Managed IT Services Remote Monitoring Vendor Management Automation Internet of Things BDR Mobile Device Analytics BYOD Remote Computing Users Managed IT services Apple Mobile Computing WiFi Data Management History Marketing Artificial Intelligence Windows 10 The Internet of Things Firewall Browser Save Money Help Desk Alert App Big data Cloud Computing Training Two-factor Authentication Bandwidth Business Technology Encryption Spam IT Consultant Office 365 Hard Drives Bring Your Own Device Antivirus Gmail Managed IT Government Office Maintenance Cybercrime Printer Content Filtering Information Technology Going Green Health Information Budget Wireless Technology Computers Outlook Saving Time Windows 8 Access Control Search VPN Windows 7 Employer-Employee Relationship Virus Managed Service Tech Support Retail Best Practice Lithium-ion Battery Cost Management Hiring/Firing Healthcare Customer Service Travel Education Humor Recovery It Management Update Blockchain iPhone Data Loss Networking Hacking IBM Phone System Money Project Management Document Management PowerPoint Proactive IT SaaS Computing Running Cable Administration Law Enforcement Intranet Twitter Solid State Drive Compliance File Sharing Website Hard Drive Data storage Applications Avoiding Downtime Risk Management Mobility Patch Management Conferencing Password Value Legal Save Time Downtime Data Breach Hacker Customer Relationship Management Regulations Augmented Reality Current Events Management Company Culture Sports Telephony Websites Machine Learning Disaster User Computer Repair Hosted Solution Vulnerabilities Telephone Systems Virtual Desktop End of Support Social Networking Social Robot Cooperation Vendor Fax Server Wireless Securty DDoS Storage Data Security Black Market Flexibility Google Maps Cryptocurrency Word Laptop Social Engineering Cortana Scam Business Growth Business Intelligence Excel Digital Payment Voice over Internet Protocol Monitoring Router Private Cloud Paperless Office Digital Comparison Tablet Unified Communications Settings User Error Multi-factor Authentication Trending Co-managed IT Presentation Gaming Console Start Menu Tech Terms Mouse Microchip Taxes Telephone Specifications Safety Text Messaging Distributed Denial of Service Managed IT Service Mobile Technology Webcam Programming Statistics Software as a Service Network Congestion Public Cloud Licensing Lifestyle Documents Uninterrupted Power Supply IT service Entertainment Vulnerability Processor Teamwork Heating/Cooling Identity Theft Bitcoin Streaming Media Data Protection Inbound Marketing Bluetooth Distribution Virtual Reality Downloads Politics Professional Services Memory Automobile eWaste Google Docs Net Neutrality Emails Pain Points Experience Chrome Chromebook Redundancy Cleaning Computing Infrastructure Hack Monitors How To Office Tips Meetings Processors Computer Accessories Download Managed Services Provider Evernote Virtual Assistant Wi-Fi USB YouTube Dark Web Free Resource Audit Micrsooft LinkedIn Supercomputer SSID How To IP Address Fake News Worker Health IT Employee/Employer Relationship Human Resources Debate Drones Migration Connected Devices Webinar Processing Managed Services Application Data Warehousing Harddrive Wireless Headphones Logistics Virtual Machines Emergency Hard Drive Disposal GPS IT Assessment Network Management Archive Wasting Time Access Equifax Fleet Tracking Skype Reading Samsung Permissions Language G Suite Bookmark Computer Care External Harddrive Device security MSP Employer Employee Relationship Cyber security Microsoft Excel Social Network Employer/Employee Relationships Desktop Finance Hacks Physical Security Google Play Digital Signature Telephone Service Google Drive Windows Server 2008 Nanotechnology Point of Contact Microsoft 365 3D Ebay Music Business Cards Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Thin CLient switches Writing Startup Asset Tracking Relocation Tablets Memes Unified Threat Management Backup and Disaster Recovery Sync Best Practives Browsers Electricity Printing Smart Phones Upgrades Username Medical IT Trend Micro Screen Reader Customer Resource management Analytic User Tip Proactive Maintenance PDF Recycling Gamification Notifications CCTV Security Cameras Threats LiFi Microserver Solutions Adminstration Pirating Information Piracy Upload Business Metrics Computer Malfunction Navigation Best Available Virtual Machine Keyboard cache Television Leadership Smart Tech Product Reviews Reliable Computing IT Work/Life Balance Fiber-Optic Database Read In Internet of Things Data Analysis Employees WannaCry Deep Learning HTML eCommerce Domains Telephone System Get More Done SQL Server Corporate Profile Mobile Security GDPR Managing Risk Public Speaking Time Management Freedom of Information Visible Light Communication Turn Key Integration Software License Device Management Trends Motion Sickness Printer Server Tech Hypervisor Shortcut Assessment SharePoint IT consulting Multi-Factor Security Cost Scalability Tip of the week Smart Devices Fraud Tactics Content Management Trojan Fileless Malware Hybrid Cloud Entrepreneur Google Calendar Devices Business Managemenet Messenger Tracking Troubleshooting Holidays Advertising Flash Proxy Server Azure Environment VoIP CIO UTM Content Rental Service Organize Modem HIPAA Strategy Touchscreen News Upselling Cabling Electronic Medical Records Transportation Electronic Payment Knowledge Video Surveillance Staffing Google Wallet IT Plan Enterprise Resource Planning online Currency Web Server Term Competition Consultation Windows XP Legislation Error Optimization Communitications Society email scam Addiction Administrator Directions Display Technology Tips Saving ZTime Displays Accountants A.I. Books Workers Recording Business Owner Capital Personal Information Productuvuty Financial Printers Managing Stress 3D Printing CrashOverride Regulation