Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

Which is More Secure, Your Mobile Network or Wi-Fi...
Investing in Innovative Network Security a Must


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Hackers Software Managed Service Provider Workplace Tips Business Computing Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Network Security User Tips Business Continuity Mobile Devices Disaster Recovery Computer Mobile Office Network Virtualization Microsoft Office Server VoIP Social Media Mobile Device Management Miscellaneous Windows 10 Upgrade Android Unified Threat Management Windows Ransomware Smartphone Innovation Passwords Holiday Operating System Remote Computing WiFi Remote Monitoring Vendor Management BYOD Mobile Computing Communication The Internet of Things Marketing Collaboration Apps Facebook Users Firewall Analytics Managed IT services History Alert Data Management IT Support Apple Outsourced IT Phishing Cybersecurity IT Consultant Managed IT Services Save Money Health Content Filtering Bring Your Own Device Office Automation App Gmail Big data Productivity Tech Support Budget Artificial Intelligence Best Practice Spam Going Green BDR Outlook Managed IT Wireless Technology Search Hiring/Firing Virus Lithium-ion Battery Browser Hard Drives Windows 8 communications Encryption Printer Information Technology IBM Mobile Device Data Backup Money Office 365 Maintenance Update Phone System Recovery Employer-Employee Relationship Internet of Things Bandwidth Cost Management Help Desk Antivirus Networking Customer Service Travel Education Document Management Law Enforcement Save Time Data storage Saving Time Administration Running Cable Legal It Management Hard Drive Government SaaS Risk Management Proactive IT Computers Humor Twitter Tablet Data Recovery Business Growth Avoiding Downtime Two-factor Authentication Wireless iPhone Telephone Systems Business Intelligence Website Training Current Events Disaster Excel End of Support Securty Project Management Computer Repair Hacking Solid State Drive Flexibility Intranet User DDoS Mobility Digital Payment Word Hosted Solution Comparison Robot Windows 10 Cortana Password Fax Server PowerPoint Social Networking Hacker VPN Black Market Uninterrupted Power Supply Presentation Access Control Company Culture Virtual Desktop Monitors Telephony Data Security Programming Documents Heating/Cooling Patch Management Google Maps Net Neutrality YouTube Pain Points Settings Unified Communications User Error Cloud Computing Hack Retail eWaste Experience Trending Gaming Console Politics Statistics Webcam Distributed Denial of Service Cryptocurrency Laptop Public Cloud Google Docs Streaming Media Safety Specifications Social Inbound Marketing Office Tips Network Congestion Paperless Office Chrome Sports Automobile Scam Computing Router Cybercrime Co-managed IT Computer Accessories How To Customer Relationship Management IT service Digital Augmented Reality Mouse Bitcoin Lifestyle Start Menu Compliance Social Engineering Downtime Taxes Processors Text Messaging USB Computing Infrastructure Software as a Service Deep Learning G Suite IP Address Rental Service SharePoint 3D Memory Spyware Visible Light Communication Physical Security Human Resources Ebay Recycling Smart Phones Tip of the week Get More Done Wi-Fi Tablets Data Protection Sync Printer Server Skype Evernote Adminstration Flash cache Advertising CCTV Pirating Information Virtual Assistant Teamwork Google Wallet Displays Corporate Profile In Internet of Things Storage Data Loss Data Warehousing Assessment Emails Content Management PDF Scalability Keyboard Hard Drive Disposal Best Available Banking Redundancy Drones VoIP Upselling Domains Webinar File Sharing Data Breach Product Reviews Windows Server 2008 Read Language Consultation Permissions Meetings Video Surveillance Private Cloud Shortcut Unified Threat Management Saving ZTime Value Business Metrics Cabling LinkedIn Writing switches Administrator Troubleshooting Audit Environment Windows 7 Supercomputer Archive Staffing Debate Machine Learning Competition Fiber-Optic Best Practives Chromebook Emergency Worker Point of Contact Business Owner Messenger Computer Care Microserver Freedom of Information Work/Life Balance Google Drive Employer Employee Relationship Application Fraud Thin CLient Download Vulnerability Licensing Electricity IT consulting Botnet Books Printing Turn Key News Cleaning CIO email scam Leadership Trojan Digital Signature Microchip Business Technology Regulations WannaCry Windows XP Computer Malfunction Organize Entertainment Reading Downloads Device Management Fake News Time Management Society Vulnerabilities Hacks Micrsooft Mobile Technology Analytic Motion Sickness Relocation Google Calendar Microsoft Excel Identity Theft Touchscreen Tracking online Currency Public Speaking Business Cards Notifications Knowledge Reliable Computing Technology Tips Mobile Payment Web Server Entrepreneur Virtual Reality Websites Music Workers Upgrades Harddrive HIPAA Tech Terms Business Managemenet Television GPS Bluetooth Access LiFi Electronic Payment External Harddrive Blockchain Samsung Software License Capital Productuvuty 3D Printing CrashOverride Piracy

hp supplies medallionLarge2017