Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

How to Prevent a Virtual Assistant from Compromising Your Security

How to Prevent a Virtual Assistant from Compromising Your Security

Virtual assistants have a lot of promise as a productivity tool, so it only makes sense that they would begin to appear in the workplace. Unfortunately, these devices have also gained a reputation as a security risk. Whether or not you’ve considered bringing virtual assistants into your business, you need to prepare for their presence there.

From Apple’s Siri, to the Google Assistant, to Microsoft’s Cortana, to Amazon’s Alexa, these voice-activated solutions have appeared in our computers, our mobile devices, and in stand-alone devices.

As they have become more commonplace, they have grown in capabilities. Many of these capabilities are admittedly well-suited for the workplace - but the always-on microphones that these devices rely on to function make many pauses. After all, there’s the potential for sensitive data to be sent along to a third party if it is merely spoken aloud in this device’s presence.

This has created a quandary for those wishing to leverage these devices - do the benefits outweigh the potential risks of such an implementation?

Here, we’ve assembled a few considerations that should help make these risks less of a factor.

Just Another Internet of Things Device

The risks inherent in Internet of Things devices have been clearly documented. One notable example was the Mirai botnet, which enslaved IoT devices to power its attacks. Furthermore, it seems to be easy to forget that these virtual assistants are simply another Internet-connected device.

However, if you keep that in mind, you may find it much simpler to outline policies for these devices that can help to reduce your potential security risk. For instance, if there is a location in your office where sensitive information is spoken aloud, a virtual assistant shouldn’t be placed there. Furthermore, you don’t want to put your business’ network at risk, so it would make more sense to establish a secondary wireless network for these devices to use. That way, even if these devices are infiltrated, the rest of your network isn’t made vulnerable as a result.

Whose Devices are They?

Data privacy and ownership is a big deal in business, which could potentially complicate our issue further. Let’s say an employee were to bring in their own virtual assistant. While this may reduce the business’ capital investment into the use of a virtual assistant, there are a lot of concerns regarding security and privacy. How can you enforce data privacy if the data is being accessed by a device that you can’t control?

Policies Are Your Greatest Asset

In order to keep your business safe, while still embracing the benefits that virtual assistants can bring to the workplace, you need to set firm controls on how they can be used. There should be the assumption that one of these devices can always be listening, leading to a policy of keeping these assistants out of areas where sensitive information is regularly discussed.

This awareness should also spread over to your other devices. There are already plenty of microphones and potential vulnerabilities in the office. Phones can have their firmware hacked, and laptops can have monitoring software installed without your knowledge.

FRS Pros can help you be sure that your business remains secure against a variety of threats while still enjoying the use of different technologies. Call us at 561-795-2000 to learn more.

How to Build a Better Backup Strategy for Your Bus...
Tip of the Week: A Few Tips That Will Help You Boo...
 

Comments 5

Jaycie man on Saturday, 04 May 2019 10:50

I beloved up to you’ll obtain performed proper here. The comic strip is attractive, your authored subject matter stylish. however, you command get bought an edginess over that you want be turning in the following. in poor health certainly come more beforehand once more since precisely the similar just about very continuously inside case you protect this hike. NYC carpet cleaning

I beloved up to you’ll obtain performed proper here. The comic strip is attractive, your authored subject matter stylish. however, you command get bought an edginess over that you want be turning in the following. in poor health certainly come more beforehand once more since precisely the similar just about very continuously inside case you protect this hike. [url=https://www.greenchoicecarpet.com/new-york-city/organic-carpet-cleaning/organic-rug-cleaning-nyc/]NYC carpet cleaning[/url]
Jaycie man on Wednesday, 08 May 2019 08:20

you can always say that Kanye West is a good singer but he will never be as good as michael jackson; The Florence Residences

you can always say that Kanye West is a good singer but he will never be as good as michael jackson; [url=https://www.florenceresidencecondo.com/]The Florence Residences[/url]
Jaycie man on Wednesday, 12 June 2019 10:28

Admiring the time and effort you put into your website and in depth information you present. It’s good to come across a blog every once in a while that isn’t the same old rehashed information. Wonderful read! I’ve bookmarked your site and I’m adding your RSS feeds to my Google account. 검증사이트

Admiring the time and effort you put into your website and in depth information you present. It’s good to come across a blog every once in a while that isn’t the same old rehashed information. Wonderful read! I’ve bookmarked your site and I’m adding your RSS feeds to my Google account. [url=https://rush-79.com/]검증사이트[/url]
Jaycie man on Monday, 17 June 2019 20:51

Excellent! I appreciate your input to this matter. It has been insightful. my blog: half marathon training schedule 먹튀 검증

Excellent! I appreciate your input to this matter. It has been insightful. my blog: half marathon training schedule [url=https://www.mtcheat.com/]먹튀 검증[/url]
Jaycie man on Wednesday, 19 June 2019 13:32

Your blog never ceases to amaze me, it is very well written and organized.”~’;- cost of cutting down trees

Your blog never ceases to amaze me, it is very well written and organized.”~’;- [url=https://www.aaatreeserviceny.com/tree-removal-average-cost-estimate/]cost of cutting down trees[/url]
Already Registered? Login Here
Guest
Tuesday, June 25 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Privacy Business Computing Internet Productivity Google User Tips Hackers Cloud Business Management Microsoft Tech Term Innovation Software Efficiency Mobile Devices Hardware Data Backup Malware Computer Browser Hosted Solutions Windows 10 Data Recovery Smartphone Cybersecurity Data Smartphones Office 365 Email Internet of Things IT Services Android Windows Upgrade Apps IT Support Outsourced IT Backup Data Security Gadgets Communication Workplace Tips Small Business Cybercrime Phishing Operating System VoIP Communications Disaster Recovery Business Continuity Network Employer-Employee Relationship Server Business Money Alert Mobile Device Management Law Enforcement Vulnerability Ransomware Users Saving Money Virtualization Microsoft Office Applications Wireless Chrome Managed IT Services Artificial Intelligence Best Practice Managed IT Services Automation Information IT Support Passwords Cloud Computing Spam Miscellaneous Social Media Collaboration Router OneNote Health Google Drive Holiday Managed Service Provider Networking Telephone Systems Managed IT Tech Support Word Unsupported Software Managed Service App Information Technology Bring Your Own Device Windows 10 Save Money Blockchain Computers Two-factor Authentication Facebook Encryption Mobile Device Safety Budget Evernote Quick Tips Business Technology Wireless Technology Audit Hosted Solution User Error Data Management Data Protection Avoiding Downtime Mobility Meetings Search Risk Management Cortana Productivity Data Loss Sports IT Management Conferencing Cost Management Augmented Reality Wi-Fi BYOD WannaCry Patch Management Wireless Charging Government Access Control Telephony Commerce Google Docs Project Management Update Password Printing Shortcut Devices Politics Mobile Security Robot Data Breach BDR Proactive IT Google Assistant Hacking SaaS The Internet of Things Travel VPN iPhone Hybrid Cloud Gmail Excel Touchscreen Data Storage File Sharing Application WiFi Fraud Windows 10s HBO Sales Data Privacy Proactive Windows 7 Server Maintenance Recovery Tablets Remote Computing Maintenance Amazon Downtime Antivirus Disaster Computer Care Nanotechnology Sync Gamification Keyboard Shortcuts Screen Mirroring Storage Social Engineering FAQ Accessory Battery Unified Threat Management Edge Settings Software as a Service 5G Solid State Drive Retail Hard Drive Websites Display Hacker Investment Administrator NFL eWaste Virtual Assistant E-Commerce Laptop Identities Testing Emergency Sabotage Streaming Media Root Cause Analysis Transportation Memory Human Resources Lithium-ion battery Emails Cast Computer Fan Charger Private Cloud Computer Forensics Peripheral Point of Sale Upgrades Ciminal Bandwidth YouTube Hard Disk Drive Chromebook Data Theft Co-Managed Services ROI Access Device Security Alexa for Business Payment Cards Entertainment Legislation Touchpad Language Camera PC Chromecast Adobe Going Green Workers Social Financial Payroll Identity Theft Marketing Management Office Employees IT Solutions Gifts Computing Telephone Internet Exlporer Windows Ink Employee Comparison Humor Projects Paperless Office Licensing Updates Security Cameras Vendor Management Webinar Outlook PowerPoint Admin Scam Uninterrupted Power Supply Consultant Microsoft Excel IT budget Vendor OneDrive Credit Cards App store Personal Information Hyperlink Education Remote Monitoring Google Maps Spyware Break/Fix IT solutions Specifications Identity Virus Smartwatch Microsoft Word Machine Learning Samsung Reputation Wireless Internet Saving Time Employee-Employer Relationship Voice over Internet Protocol Files iOS WIndows Server 2008 History Value Wasting Time DDoS Apple Data storage Medical IT Legal Save Time Computer Accessories Text Messaging Twitter Smart Technology Flexibility Music Instant Messaging Office tips Thank You Advertising Scalability Analytics Keyboard Black Market Cleaning Automobile Congratulations Big Data HaaS Managing Stress Windows Server 2008 R2 Cache End of Support USB Worker Relocation Books Training Monitors How To Hiring/Firing Compliance Video Games Experience Printers Virtual Reality Television CrashOverride Work/Life Balance Current Events Electronic Medical Records Company Culture es Crowdsourcing Employer Employee Relationship PDF Mobile Computing Benefits Regulation Phone System