Contact us today!
217-428-6449

Network Solutions Unlimited Blog

How to Prevent a Virtual Assistant from Compromising Your Security

How to Prevent a Virtual Assistant from Compromising Your Security

Virtual assistants have a lot of promise as a productivity tool, so it only makes sense that they would begin to appear in the workplace. Unfortunately, these devices have also gained a reputation as a security risk. Whether or not you’ve considered bringing virtual assistants into your business, you need to prepare for their presence there.

From Apple’s Siri, to the Google Assistant, to Microsoft’s Cortana, to Amazon’s Alexa, these voice-activated solutions have appeared in our computers, our mobile devices, and in stand-alone devices.

As they have become more commonplace, they have grown in capabilities. Many of these capabilities are admittedly well-suited for the workplace - but the always-on microphones that these devices rely on to function make many pauses. After all, there’s the potential for sensitive data to be sent along to a third party if it is merely spoken aloud in this device’s presence.

This has created a quandary for those wishing to leverage these devices - do the benefits outweigh the potential risks of such an implementation?

Here, we’ve assembled a few considerations that should help make these risks less of a factor.

Just Another Internet of Things Device

The risks inherent in Internet of Things devices have been clearly documented. One notable example was the Mirai botnet, which enslaved IoT devices to power its attacks. Furthermore, it seems to be easy to forget that these virtual assistants are simply another Internet-connected device.

However, if you keep that in mind, you may find it much simpler to outline policies for these devices that can help to reduce your potential security risk. For instance, if there is a location in your office where sensitive information is spoken aloud, a virtual assistant shouldn’t be placed there. Furthermore, you don’t want to put your business’ network at risk, so it would make more sense to establish a secondary wireless network for these devices to use. That way, even if these devices are infiltrated, the rest of your network isn’t made vulnerable as a result.

Whose Devices are They?

Data privacy and ownership is a big deal in business, which could potentially complicate our issue further. Let’s say an employee were to bring in their own virtual assistant. While this may reduce the business’ capital investment into the use of a virtual assistant, there are a lot of concerns regarding security and privacy. How can you enforce data privacy if the data is being accessed by a device that you can’t control?

Policies Are Your Greatest Asset

In order to keep your business safe, while still embracing the benefits that virtual assistants can bring to the workplace, you need to set firm controls on how they can be used. There should be the assumption that one of these devices can always be listening, leading to a policy of keeping these assistants out of areas where sensitive information is regularly discussed.

This awareness should also spread over to your other devices. There are already plenty of microphones and potential vulnerabilities in the office. Phones can have their firmware hacked, and laptops can have monitoring software installed without your knowledge.

Network Solutions Unlimited can help you be sure that your business remains secure against a variety of threats while still enjoying the use of different technologies. Call us at 217-428-6449 to learn more.

How to Build a Better Backup Strategy for Your Bus...
Tip of the Week: A Few Tips That Will Help You Boo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, April 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Content Relocation Commerce Automobile Networking Proactive Hybrid Cloud Application Storage Gadgets Wireless Technology Wireless Charging Technology Virtual Assistant Dark Web USB Efficiency Saving Money Best Practice Public Computer Workers Sports Hardware Windows 10s Managed IT Service e-waste Transportation Data Protection Firewall Cybercrime IoT Training PowerPoint IT Support Quick Tips Users Remote Monitoring Hiring/Firing Chromebook PDF Business Technology App Hyperlink Value Computers Payroll Government Twitter Sync Augmented Reality Internet of Things Consultant Business Computing Business Intelligence Ransomware Payment Cards Computing Managing Stress Assessment Telephone Systems Collaboration Management Unsupported Software Bring Your Own Device Managed Service Provider Virtual Private Network Virtual Reality Security Conferencing How to Microsoft Office Humor Root Cause Analysis YouTube Spam Blocking Internet exploMicrosoft Co-Managed Services App store Device Security The Internet of Things Phone System Nanotechnology Updates Employer-Employee Relationship Applications File Storage Managed IT Services Students Outsourced IT Data Recovery Disaster Recovery Hacking Audiobook SaaS Virtualization Display Mobility Computing Infrastructure User Tips Malware eWaste BDR End of Support Gifts Wasting Money Fraud Maintenance Risk Management Worker Commute Thank You Content Filtering Private Cloud Remote Computing Tablets Audit Save Time Information Technology WannaCry Chrome Webinar Password Office Vulnerability Productivity Document Management Hard Drive HBO Worker Unified Communications Network Security WiFi Google Drive Smartphones Data Breach Windows 7 Education Bandwidth Money Email Cloud Computing Project Management Screen Mirroring IT budget Television Cortana Managed Service Vendor Management Experience Microsoft Word hacker Video Games Health Camera Techology Remote Workers Downtime Employee-Employer Relationship Testing Best Practices Two Factor Authentication Retail Bluetooth Keyboard Shortcuts Patch Management History Financial Technology Accessory Monitors Computer Care Memory Smartphone Troubleshooting Electronic Medical Records Hosted Solutions Mobile Device Management Alert Wireless Internet Lifestyle Hackers Blockchain Operating System Data Office Tips Printers iPhone Computer Fan Social Media Alexa for Business Redundancy Apps Utility Computing Avoiding Downtime Settings Company Culture Big Data Wireless Office 365 Shadow IT Black Market Streaming Media HaaS Privacy Comparison Cybersecurity Antivirus Cost Management Solid State Drive Monitoring Cast Ciminal Cache Language Legal Personal Information Reputation Upgrades SMB Network Small Business Content Filter Employees Data Storage Going Green Tech Term Data Privacy Devices Samsung Wasting Time Facebook Business Projects Backup and Disaster Recovery Connectivity Shortcut Emergency Passwords Software as a Service Mobile IT solutions FAQ Chromecast WIndows Server 2008 OneNote Paperless Office Innovation Cleaning Automation Travel Business Management Printing Charger Search Law Enforcement Virus File Sharing Professional Services Mobile Security Hosted Solution Telephony Medical IT Adobe Google Docs Analytics Productivity Sales Wi-Fi Mobile Device Identity Theft Congratulations Meetings Break/Fix Employer Employee Relationship Touchpad Robot Touchscreen Spyware Regulation Identities User Error Advertising Outlook Edge Machine Learning Admin Scalability Benefits Books Computer Administration Holiday Social Engineering Artificial Intelligence Instant Messaging Proactive IT Politics VPN Save Money Emails Router Mobile Devices Data Security Rootkit Android Laptop Communication Physical Security Workplace Tips Miscellaneous Licensing Excel Security Cameras Flexibility Business Owner Budget IT Services How To Data storage Telephone Windows Google Assistant VoIP Word HIPAA Business Continuity intranet Computer Forensics Specifications Update Software Apple Evernote Amazon Colocation Two-factor Authentication Data Theft Browser Internet Exlporer Voice over Internet Protocol Keyboard Saving Time Hard Drives Peripheral WPA3 Recovery Managed IT Internet Compliance Microsoft IT Service Google Maps Public Cloud Identity Cloud Employee Tech Support Entertainment Information Computer Accessories CrashOverride iOS Battery Encryption Server Windows 10 IT Management Communications Access Control Legislation Managed IT Services Files 5G Tip of the Week Data Backup Monitor Google Human Resources Gmail Backup Spam Credit Cards Data Loss Upgrade Marketing Scam Unified Threat Management Windows Ink Loyalty Smart Tech Websites Analysis Work/Life Balance Smart Technology IT Solutions Financial Data Management Gamification IT Support Safety BYOD Windows 10 Vendor Customer Microsoft Excel NFL MSP E-Commerce Phishing Hard Disk Drive