Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

How to Prevent a Virtual Assistant from Compromising Your Security

How to Prevent a Virtual Assistant from Compromising Your Security

Virtual assistants have a lot of promise as a productivity tool, so it only makes sense that they would begin to appear in the workplace. Unfortunately, these devices have also gained a reputation as a security risk. Whether or not you’ve considered bringing virtual assistants into your business, you need to prepare for their presence there.

From Apple’s Siri, to the Google Assistant, to Microsoft’s Cortana, to Amazon’s Alexa, these voice-activated solutions have appeared in our computers, our mobile devices, and in stand-alone devices.

As they have become more commonplace, they have grown in capabilities. Many of these capabilities are admittedly well-suited for the workplace - but the always-on microphones that these devices rely on to function make many pauses. After all, there’s the potential for sensitive data to be sent along to a third party if it is merely spoken aloud in this device’s presence.

This has created a quandary for those wishing to leverage these devices - do the benefits outweigh the potential risks of such an implementation?

Here, we’ve assembled a few considerations that should help make these risks less of a factor.

Just Another Internet of Things Device

The risks inherent in Internet of Things devices have been clearly documented. One notable example was the Mirai botnet, which enslaved IoT devices to power its attacks. Furthermore, it seems to be easy to forget that these virtual assistants are simply another Internet-connected device.

However, if you keep that in mind, you may find it much simpler to outline policies for these devices that can help to reduce your potential security risk. For instance, if there is a location in your office where sensitive information is spoken aloud, a virtual assistant shouldn’t be placed there. Furthermore, you don’t want to put your business’ network at risk, so it would make more sense to establish a secondary wireless network for these devices to use. That way, even if these devices are infiltrated, the rest of your network isn’t made vulnerable as a result.

Whose Devices are They?

Data privacy and ownership is a big deal in business, which could potentially complicate our issue further. Let’s say an employee were to bring in their own virtual assistant. While this may reduce the business’ capital investment into the use of a virtual assistant, there are a lot of concerns regarding security and privacy. How can you enforce data privacy if the data is being accessed by a device that you can’t control?

Policies Are Your Greatest Asset

In order to keep your business safe, while still embracing the benefits that virtual assistants can bring to the workplace, you need to set firm controls on how they can be used. There should be the assumption that one of these devices can always be listening, leading to a policy of keeping these assistants out of areas where sensitive information is regularly discussed.

This awareness should also spread over to your other devices. There are already plenty of microphones and potential vulnerabilities in the office. Phones can have their firmware hacked, and laptops can have monitoring software installed without your knowledge.

FRS Pros can help you be sure that your business remains secure against a variety of threats while still enjoying the use of different technologies. Call us at 561-795-2000 to learn more.

How to Build a Better Backup Strategy for Your Bus...
Tip of the Week: A Few Tips That Will Help You Boo...

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Productivity Privacy Business Computing Hackers Internet Microsoft User Tips Google Software Cloud Innovation Business Management Hardware Computer Email Data Tech Term Data Backup Cybersecurity Efficiency Windows 10 IT Services Communication Smartphones Hosted Solutions Mobile Devices Malware Data Recovery Office 365 Smartphone Upgrade IT Support Browser Outsourced IT Business Internet of Things Android Backup VoIP Gadgets Windows Data Security Apps Phishing Workplace Tips Communications Small Business Users Cybercrime Business Continuity Saving Money Managed IT Services Disaster Recovery Mobile Device Management Cloud Computing Facebook Network Information Operating System Ransomware Employer-Employee Relationship Vulnerability Managed Service OneNote Server Money Artificial Intelligence Alert Passwords Two-factor Authentication Automation Law Enforcement Social Media Spam Networking Health Applications Wireless Microsoft Office Collaboration Virtualization Chrome Holiday Managed IT Services Managed IT Best Practice Blockchain IT Support Miscellaneous Hacking Retail Windows 10 Gmail Save Money Router Quick Tips Computers Data Storage Word Google Drive Settings Access Control Patch Management Project Management Mobile Device Printing Bring Your Own Device Data Breach Telephone Systems Tech Support Managed Service Provider Information Technology BYOD Unsupported Software Augmented Reality Password Windows 7 App Paperless Office User Error Hard Drive Display History Application Proactive IT Bandwidth Cortana SaaS Encryption Payment Cards Data Loss Conferencing Touchscreen Safety Hosted Solution Budget Avoiding Downtime Mobility Search WiFi Wireless Charging Google Docs Wireless Technology Devices Risk Management Data Management Mobile Security Audit Vendor Data Protection Going Green Social Meetings Productivity Google Assistant Hybrid Cloud Government Wi-Fi Sports Update Travel Voice over Internet Protocol Excel Shortcut IT Management Telephony Robot File Sharing Cost Management Politics Fraud Commerce BDR WannaCry Business Technology The Internet of Things Evernote VPN iPhone Scams FAQ Webinar Virtual Assistant E-Commerce Reputation Edge Samsung Firewall Websites Consultant Memory Human Resources NFL eWaste Testing Data storage Computer Forensics Peripheral eCommerce YouTube Remote Computing Mobile Office Identities Legal Remote Monitoring Virtual Private Network Charger IT solutions DDoS Alexa for Business Smartwatch Ciminal Antivirus Files Chromebook Co-Managed Services Processor Data Theft Recovery Financial Payroll Hosted Desktop Device Security Disaster Camera Management Adobe Fiber Optics Workers Battery iOS WIndows Server 2008 Employees Development Legislation Language Laptop Remote Workers Instant Messaging Windows 10s Hacker HBO Employee Transportation Server Maintenance Telephone Benchmarks Gifts Computing Emergency Screen Mirroring Administrator Security Cameras Private Cloud Windows Ink Smart Devices Computer Care Nanotechnology Projects Streaming Media PowerPoint Admin Licensing Holidays Updates Point of Sale Lithium-ion battery OneDrive Micrsosoft Comparison Unified Threat Management Touchpad Outlook Managed IT Service Solid State Drive Break/Fix Investment Microsoft Excel IT budget Entertainment Hyperlink Myths Credit Cards App store Emails Cast Access Machine Learning Sabotage Google Maps Spyware Root Cause Analysis Identity Theft Identity Printers Upgrades Chromecast Wireless Internet Saving Time Copiers Microsoft Word Computer Fan Office Employee-Employer Relationship Business Intelligence Specifications Virus Wasting Time Humor Managed Services Provider Hard Disk Drive Medical IT ROI Value Threats Marketing Internet Exlporer Amazon Downtime PC Apple Vendor Management Data Privacy Sales Proactive Gamification Keyboard Shortcuts Personal Information Tablets Inventory Maintenance Scam Digital Signage Accessory Sync Facebook Privacy Education IT Solutions Uninterrupted Power Supply Software as a Service 5G Windows Server 2008 R2 Storage Social Engineering Virtual Reality Work/Life Balance PDF Current Events Electronic Medical Records Mobile Computing Communitications Training Crowdsourcing Monitors Employer Employee Relationship Benefits Phone System Text Messaging Save Time Television CrashOverride Company Culture Computer Accessories Smart Technology Flexibility Music Office tips Advertising Analytics Scalability Keyboard Thank You Compliance Black Market Cleaning Big Data HaaS Automobile End of Support es Managing Stress Congratulations Regulation Relocation USB Worker How To Books Twitter Hiring/Firing Video Games Experience Cache