Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Prosper Solutions can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at (617) 369-9977.

Reliable Communications Help Build Better Relation...
Tip of the Week: Follow These Steps Before You Upg...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, April 23, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

SSID Printer Microchip Username Identity Theft Digital Signature Tip of the week Customer Relationship Management Data Analysis HIPAA Cortana Wi-Fi Solid State Drive Browsers Documents Mobile Computing Business Intelligence Money Security Cameras 3D Printing Vulnerabilities Update Screen Reader Work/Life Balance Administration News Vendor Mangement Windows Server 2008 Printers G Suite Value Blockchain Access Text Messaging Remote Computing Information Technology Avoiding Downtime Thank You Advertising Downloads Fleet Tracking Router Digital Keyboard Chromebook Rental Service Robot Download Mobile Security Safety Emergency Uninterrupted Power Supply Notifications Excel Visible Light Communication Tablets Settings Knowledge Saving Money Alert Network Congestion WannaCry Data storage VoIP Bata Backup Business Continuity Pain Points Data Warehousing VPN Google Play Help Desk Paperless Office Vendor Management Assessment Laptop Reliable Computing Data Recovery Operating System Data Loss IT service Business Cards Language Physical Security Legal Data Breach Telephone Systems Internet of Things Company Culture Encryption Analytic Spyware Modem BDR Unified Communications Data Telephony Efficiency Electronic Payment Networking Virus Backup Healthcare Augmented Reality Devices Trends Touchscreen Passwords Business Owner Saving Time Password Smart Tech DDoS Gaming Console Firewall Smartphone Skype Electricity cloud Startup Processing Scalability Project Management Automobile Read Customer Resource management Fraud Consultation Artificial Intelligence Cost Management YouTube Tactics Google Wallet Computer Accessories Phishing Taxes Data Protection Multi-Factor Security Best Practices Social Networking Writing Computer Repair Health IT Business Computing Ransomware End of Support Tech Support Office Net Neutrality IP Address Microsoft 365 Samsung Productivity Software License LiFi IT Cryptocurrency Trending Reading Gmail Google Calendar Google Drive Web Server Backup and Disaster Recovery Best Available Heating/Cooling Television Security A.I. Worker Start Menu Citrix Xenapp Cleaning Messenger Piracy Tech Website Windows 10 WiFi Rapid City Error Fake News Corporate Profile Managed Service Technology Virtual Assistant Upgrades Word Customer Service Evernote Smartphones Retail Monitoring Save Time Processor Memory Content Filtering hardware Innovation Health Proxy Server User Error Twitter Environment Access Control Integration Managing Stress cyber security Employer Employee Relationship Lithium-ion battery Cybercrime Office 365 Holiday Computer Care How To Wireless Headphones In Internet of Things Network Security Hacker Managed Service Provider Cabling Term Professional Services Best Practice Automation Emails Outsourced IT Addiction IT Support Multi-factor Authentication User Tips Distributed Denial of Service Network SharePoint Entrepreneur Fiber-Optic Chrome Redundancy File Sharing Logistics Bitcoin Microsoft Hack Management Gadgets Managed IT Services Politics Managed IT services Spam Google Maps Licensing Google Office Tips Workplace Tips Finance Business Apps Chamber Data Management Data Backup IT Management Enterprise Resource Planning Telephone Solutions Law Enforcement Employer-Employee Relationship Computer Malfunction Gamification Society VoIP Private Cloud MSP Deep Learning Flash Business Metrics Distribution Hacks Browser Google Docs Upgrade Teamwork Nanotechnology Users Hard Drives Computing Infrastructure Specifications Hard Drive Disposal Vulnerability Mobile Technology UTM Information Tracking Small Business Bookmark Storage Apple Bandwidth Connected Devices eWaste Medical IT Windows10 Comparison Application Disaster Recovery SaaS Machine Learning BYOD Microsoft Office Marketing Communication Hackers Capital Managed IT Service Product Reviews Conferencing IT Services Scam Bring Your Own Device Business Mangement Asset Tracking Email GDPR Tablet Malware IT consulting switches Privacy clout services CIO Disaster Domains Desktop IBM Public Cloud Device security CCTV Fileless Malware Productuvuty Cache Budget Document Management communications Workers Staffing Bluetooth iPhone Internet Permissions Cost Software as a Service Social Media Vendor Going Green Streaming Media Drones Education Directions email scam Entertainment Mobile Device Public Speaking Shortcut Running Cable Motion Sickness Server Wireless Voice over Internet Protocol Search Mobility Software Telephone System Risk Management Inbound Marketing Statistics Maintenance Sports Intranet Meetings Social Network Electronic Medical Records Competition Travel App Managed IT Banking Securty Webcam outsource cloud computing uptime Transportation Supercomputer Co-Managed IT Productivity Windows Business Management Miscellaneous Content Microsoft Excel Training Current Events USB Upload Computers Quick Tips Audit Presentation CrashOverride HTML Processors IT Support Virtualization Government IT Plan Technology Tips Mobile Payment Time Management Windows 8 Outlook Recovery Save Money Relocation Troubleshooting Social Engineering Applications Human Resources PDF Unified Threat Management Windows 7 Proactive IT Websites Freedom of Information Programming Analytics Unified Threat Management Monitors Displays Windows 10 Navigation Regulations Patch Management IT Consultant Database Business Technology Botnet Windows XP Printing Music Collaboration Service Level Agreement Tech Term User Cooperation Digital Payment Hard Drive Experience Virtual Desktop Compliance Android cloud computing Virtual Reality Hosted Solutions Hacking Social PowerPoint Books Migration Cybersecurity Micrsooft Sync Hiring/Firing Computing Mobile Device Management Equifax Data Security Patching Regulation History the Internet of Things Mobile Devices Hosted Solution outsource cloud storage Remote Monitoring Tip of the Week Black Market Computer Administrator Wireless Technology Mouse Facebook Network Management Downtime Business Growth Phone System User Tip Legislation Antivirus Big data cloud storage Congratulations Flexibility Accountants Dark Web Two-factor Authentication Tech Terms

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150