LiveChat Live Help
Contact us today!
(248) 218-5018
facebooktwittergooglelinkedinyoutubeExpetec Technology Services RSS Feed

Expetec Technology Services Blog

Expetec Technology Services has been serving the Troy area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Sign Up for Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Tip of the Week Privacy Technology Best Practices Cloud Internet hackers Business Computing Productivity Business malware Backup IT Support Microsoft Email Software Data Network Security IT Services Managed Service Provider Hardware Efficiency Hosted Solutions User Tips Mobile devices Computer Disaster Recovery Mobile Device Management Google Business Management Microsoft Office Workplace Tips Android Smartphone Ransomware Holiday Remote Monitoring Miscellaneous Windows Business Continuity The Internet of Things Network Smartphones analytics Virtualization Server Social Media Operating System Small Business BYOD Remote Computing Collaboration Passwords Phishing Alert IT Support Managed IT Services VoIP Cybersecurity Mobile Computing Unified Threat Management WiFi Windows 10 BDR Save Money Big Data Outsourced IT Upgrade Vendor Management apple Gmail communications Innovation Saving Money Data Management Office Managed IT Firewall Employer-Employee Relationship Browser Productivity Quick Tips Internet of Things Managed IT services Facebook History Budget Communication Artificial Intelligence Outlook Search Lithium-ion battery Automation Running Cable Proactive IT Money Wireless Technology Update Document Management Help Desk Customer Service IT Management Hacking Save Time App Bandwidth Information Technology Hard Drives Encryption Recovery Windows 10 Cost Management Hiring/Firing Content Filtering Saving Time Best Practice Marketing Apps Two-factor Authentication Data Backup Word Gadgets Law Enforcement Data Recovery tablet IT Consultant Data storage Antivirus Spam SaaS Health Office 365 Project Management Bring Your Own Device Hosted Solution Tech Support Robot Networking Disaster Cybercrime Mobility Intranet User IBM Hard Drive Education Presentation Flexibility Cryptocurrency Computing Infrastructure Access Control Risk Management Social Website End of Support Telephone Systems Network Congestion Data Security Business Intelligence Programming Patch Management Virus Wireless Comparison Password Bitcoin Google Docs Excel iphone Computers Compliance Retail Telephony Experience VPN Digital Government Going Green Safety Training PowerPoint Virtual Desktop Documents Unified Threat Management Maintenance DDoS Social Networking Start Menu IT service Downtime Heating/Cooling Travel Current Events YouTube Uninterrupted Power Supply avoiding downtime Company Culture Net Neutrality Phone System Monitors Cortana Scam Administration Unified Communications Business Growth eWaste Software as a Service Google Maps Specifications Chrome Laptop Cloud Computing Solid State Drive Legal Mobile Device Bata Backup News Drones How To CIO Vulnerabilities Cabling Computer Repair Content Management Human Resources Capital Mobile Technology Vendor Mangement Fake News Gaming Console User Error Competition Business Cards Worker IT consulting Best Available Cleaning Entrepreneur Productuvuty Mobile Payment Business Mangement Microsoft Excel Sync Sports Application Domains Licensing Windows XP Writing Value Society Archive Router Data Loss Electricity Television Computer Accessories Hack Read Redundancy Storage Risk Mangaement Windows 8 Social Engineering Data Breach Electronic Payment WannaCry Mouse Google Drive Blockchain Office Tips Distributed Denial of Service Regulations SharePoint Printer Time Management Tip of the week Micrsooft Emails Emergency LinkedIn Troubleshooting Audit LiFi Computing Evernote Staffing Skype Access Virtual Assistant Computer Care Vulnerability Business Owner Printing Visible Light Communication Data Warehousing Music File Sharing PDF Spyware Touchscreen Hard Drive Disposal Deep Learning Public Speaking Business Technology Inbound Marketing Downloads USB Advertising Bluetooth Windows Server 2008 Co-Managed IT Black Market Politics Securty Keyboard Product Reviews Cache Websites Fiber-Optic Streaming Media Hacker Data Protection Google Calendar Settings Assessment Windows 7 Public Cloud Shortcut Fraud Customer Relationship Management Pain Points Displays IP Address Permissions Knowledge Corporate Profile Technology Tips Consultation Freedom of Information Digital Signature Google Wallet Statistics Environment Augmented Reality Trending email scam HIPAA switches Upgrades Processors Tech Terms Entertainment VoIP Online Currency Teamwork

      Top Blog

      Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...