facebook linkedin twitter

Computerware Blog

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Computerware can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at (703) 821-8200.

Reliable Communications Help Build Better Relation...
Tip of the Week: Follow These Steps Before You Upg...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, April 18, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Malware Saving Money Hosted Solutions IT Services Efficiency IT Support Google Small Business User Tips Computer Mobile Devices Smartphones Innovation Quick Tips Business Continuity Gadgets Network VoIP Disaster Recovery Microsoft Office Productivity Data Backup Social Media Android Communication Mobile Office Virtualization Collaboration Smartphone Server communications Data Recovery Mobile Device Management Miscellaneous Upgrade Cybersecurity IT Support Ransomware Tech Term Windows 10 Windows Phishing Unified Threat Management Passwords Facebook Holiday Operating System Vendor Management Remote Monitoring Apps Analytics Automation BYOD Remote Computing Managed IT services Mobile Computing BDR Users WiFi Mobile Device Data Management The Internet of Things Marketing Outsourced IT Internet of Things Apple Firewall History Artificial Intelligence Alert Managed IT Services Browser App Save Money Cloud Computing IT Consultant Encryption Big data Going Green Spam Windows 10 Office 365 Bring Your Own Device Maintenance Antivirus Printer Two-factor Authentication Gmail Bandwidth Office Health Content Filtering Best Practice Information Technology Lithium-ion Battery Cost Management Outlook Windows 8 Hiring/Firing Hard Drives Training Budget Help Desk Wireless Technology Saving Time Tech Support Search Virus Managed IT Cybercrime Business Technology Hacking IBM Money Document Management Computers Healthcare VPN Access Control Travel Education Recovery Employer-Employee Relationship Update It Management Phone System Blockchain Legal Save Time Networking Regulations Augmented Reality PowerPoint Proactive IT Information SaaS Running Cable Humor File Sharing Customer Service Administration Hard Drive Law Enforcement Intranet Twitter Government Compliance Mobility Website Data storage Applications iPhone Risk Management Managed Service Password Cortana Data Loss Business Growth Value Business Intelligence Scam Excel Digital Payment Router Downtime Telephony Hacker Machine Learning Data Breach Customer Relationship Management Paperless Office Fax Server Telephone Systems Comparison Tablet Company Culture Digital Sports Project Management Disaster User Websites Computing Computer Repair Management Hosted Solution End of Support Social Networking Vulnerabilities Social Robot Wireless Securty DDoS Google Maps Solid State Drive Social Engineering Avoiding Downtime Data Security Black Market Flexibility Cryptocurrency Word Retail Current Events Laptop Patch Management Private Cloud Experience Chrome User Error Download Conferencing Co-managed IT Cleaning Monitors Office Tips Voice over Internet Protocol Redundancy Processors Computer Accessories Microchip Taxes Monitoring Lifestyle Distributed Denial of Service USB Evernote YouTube Unified Communications Settings Trending Presentation Gaming Console Virtual Assistant Public Cloud Mouse Text Messaging Start Menu Tech Terms Virtual Desktop Webcam Specifications Safety Programming Identity Theft Mobile Technology Statistics Documents Cooperation Software as a Service IT service Network Congestion Entertainment Vendor Uninterrupted Power Supply Heating/Cooling Virtual Reality Politics Storage Vulnerability Automobile Inbound Marketing Emails Bitcoin Bluetooth Streaming Media Data Protection Chromebook Windows 7 Computing Infrastructure Hack Distribution How To eWaste Google Docs Net Neutrality Pain Points Cabling Corporate Profile Device Management Mobile Security Web Server Shortcut GDPR Time Management Freedom of Information IT consulting Telephone System Content Management Software License Trends Wi-Fi Administrator Entrepreneur Tech Assessment SharePoint Business Managemenet Multi-Factor Security Cost Webinar Books Workers Troubleshooting Integration Fraud Tactics Environment Fileless Malware Google Calendar CIO Devices Supercomputer HIPAA Upselling Tip of the week Advertising Flash Worker Electronic Payment Proxy Server Video Surveillance VoIP Staffing Google Wallet online Currency UTM Content Competition Modem Touchscreen News Windows XP Knowledge Society IT Plan Enterprise Resource Planning Term Saving ZTime Consultation Displays Legislation Error Reading Samsung Business Owner Electronic Medical Records email scam Addiction G Suite Directions Technology Tips Micrsooft LinkedIn Accountants A.I. Employer Employee Relationship IP Address Recording Licensing Human Resources Dark Web Debate Audit Drones Multi-factor Authentication Best Practives Hacks Physical Security Application SSID Harddrive Fake News Health IT GPS Archive Migration Connected Devices Banking Botnet Processing Data Warehousing Skype Wireless Headphones Telephone Relocation Tablets Permissions Language Network Management Microserver Sync Managed IT Service External Harddrive Access Equifax Fleet Tracking Logistics Emergency Hard Drive Disposal Bookmark Computer Care Device security MSP Notifications CCTV Digital Signature Microsoft Excel Point of Contact 3D Ebay Music Desktop Finance Get More Done Business Metrics Computer Malfunction Teamwork Google Play Thin CLient Google Drive Windows Server 2008 switches Writing Nanotechnology Social Network Reliable Computing Business Cards Service Level Agreement Turn Key In Internet of Things Processor Smart Phones Spyware Mobile Payment Upgrades Startup Asset Tracking Printer Server Microsoft 365 Unified Threat Management Backup and Disaster Recovery PDF Browsers Electricity Printing Recycling Username Trojan Medical IT LiFi Analytic User Tip Adminstration Pirating Information Gamification Motion Sickness Best Available Keyboard Security Cameras Leadership Product Reviews Screen Reader Customer Resource management Organize Scalability Work/Life Balance Read Piracy Upload Navigation cache Television Deep Learning Smart Tech Messenger Tracking Domains Solutions Fiber-Optic Database Data Analysis WannaCry Downloads HTML Rental Service Meetings Public Speaking Professional Services Visible Light Communication Memory Printers Managing Stress 3D Printing CrashOverride Regulation Capital Productuvuty