Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Prosper Solutions can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at (617) 369-9977.

Reliable Communications Help Build Better Relation...
Tip of the Week: Follow These Steps Before You Upg...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, April 23, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Firewall Customer Resource management Telephone Multi-factor Authentication Blockchain Administration Social Media Email Software Apps Nanotechnology Bandwidth Emails Productuvuty Corporate Profile Compliance Cooperation User Error Office Tips Artificial Intelligence Windows Server 2008 Computing Managed IT User Tip outsource cloud computing Connected Devices Distributed Denial of Service Automobile VoIP Skype Saving Money Microchip Flash Language Wireless Technology Documents Vulnerabilities Proxy Server Data Loss Network Management Virtualization Mobile Computing GDPR Social Engineering Microsoft 365 Windows 10 Mobile Security Money Computer Care Office 365 Tip of the week Downloads UTM Save Money BDR Evernote PDF Going Green PowerPoint Printing Fraud Piracy Business Intelligence Cybercrime Licensing IT service Business Passwords Voice over Internet Protocol Content Tech Support Excel outsource cloud storage Patch Management Relocation Retail Vendor Mangement Ransomware Telephone Systems cloud storage Google Calendar Customer Relationship Management Wireless Headphones Mouse MSP Cost Quick Tips Start Menu Phishing Update Meetings uptime Employer-Employee Relationship SSID Alert Users Business Mangement Professional Services HIPAA Technology Teamwork Hard Drives Reading Cost Management Content Filtering Business Technology Database Drones Upgrades Hosted Solutions Cache App Politics Tech Disaster Recovery Entertainment Data Management Budget Maintenance email scam Asset Tracking Microsoft Office Flexibility Laptop cyber security Fake News Travel Trends Microsoft Excel Medical IT Business Growth Paperless Office Presentation BYOD Employer Employee Relationship Google Docs Windows XP Search Software License VoIP Unified Communications Information Technology USB Trending IT Plan User Tips Social Network eWaste Remote Computing IT Services Data Recovery Productivity Windows Bookmark Citrix Xenapp Hacking Augmented Reality Computers Telephone System Intranet Digital Payment Wireless Keyboard Holiday Gamification Analytics Backup and Disaster Recovery Desktop Displays Health IT Electronic Payment Assessment Managed Service Provider Digital End of Support Statistics Document Management Small Business G Suite Public Speaking Tactics Notifications Windows10 IT Support Deep Learning Healthcare WiFi Managed IT Services Memory Tracking Proactive IT Gmail LiFi Virtual Assistant Congratulations switches Word Server Staffing Fleet Tracking Mobility Upgrade Chamber Black Market Electricity Directions Android Telephony Windows 10 Touchscreen Bring Your Own Device Internet Legislation Chrome Access Marketing Virtual Desktop Data Backup Government CIO Physical Security Save Time WannaCry Best Available Processing Competition Innovation Management Fiber-Optic Best Practice Browsers Mobile Device Google Play Social Networking DDoS HTML Monitoring Banking Tablet Tech Term IT Consultant Computer Malfunction Error Startup Streaming Media Society Device security IT Management iPhone Wi-Fi Malware Hacker Hackers the Internet of Things CCTV History Data Analysis Bata Backup Applications Application Mobile Devices Entrepreneur Hacks Net Neutrality Microsoft Accountants Processors Cortana Television Time Management Business Management clout services Vulnerability Administrator Monitors Printers Health In Internet of Things Hack Software as a Service Managed IT Service User Cleaning Safety Multi-Factor Security Twitter Sync Hard Drive Disposal Username Storage Computer Repair Security Machine Learning Vendor Management Help Desk Browser Comparison cloud computing Screen Reader Network Remote Monitoring Troubleshooting Fileless Malware Identity Theft Rapid City Managed IT services Rental Service Work/Life Balance Outlook Modem Pain Points Scam Regulation Experience Hiring/Firing Security Cameras Patching Reliable Computing cloud Unified Threat Management Permissions Information Knowledge Dark Web Analytic Shortcut Solid State Drive Tech Terms Spam Business Continuity Router Encryption Business Cards Hosted Solution Website Regulations Supercomputer Messenger Bitcoin hardware Visible Light Communication Business Metrics Term Running Cable Business Owner Audit Smart Tech VPN Heating/Cooling Botnet Mobile Technology Legal Law Enforcement Data Security Data Apple Chromebook Thank You Mobile Device Management Project Management Gadgets Distribution Logistics Private Cloud Electronic Medical Records Capital SharePoint Freedom of Information IT consulting Windows 7 Miscellaneous Backup IT Support SaaS Bluetooth Managing Stress News Google Drive IBM Cryptocurrency Printer Data storage Tablets Music Specifications Managed Service Outsourced IT Network Security Addiction Transportation Training Enterprise Resource Planning YouTube Google Maps Big data Taxes Gaming Console Computer Accessories Text Messaging Vendor Technology Tips Consultation Hard Drive Value Sports Web Server Unified Threat Management Domains Digital Signature Communication Product Reviews Data Warehousing Upload Inbound Marketing Service Level Agreement Advertising Education Data Breach Risk Management Workplace Tips communications Business Computing Robot Networking Human Resources Recovery Smartphones Redundancy Collaboration Social A.I. Best Practices 3D Printing Spyware Environment File Sharing Antivirus Uninterrupted Power Supply Samsung Downtime Cabling Password IT Customer Service Network Congestion Navigation Motion Sickness Facebook Current Events Automation Data Protection Office Programming Operating System Smartphone Webcam Migration Equifax Solutions Virus Cybersecurity Writing Computing Infrastructure Worker Finance Two-factor Authentication Integration Conferencing Processor How To Public Cloud Co-Managed IT Websites IP Address Download Settings Efficiency Avoiding Downtime Google Wallet Productivity CrashOverride Read Books Virtual Reality Workers Google Saving Time Securty Company Culture Micrsooft Windows 8 Computer Access Control Internet of Things Disaster Lithium-ion battery Devices Tip of the Week Phone System Scalability Mobile Payment Emergency Privacy

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150