These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 17 January 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Privacy Best Practices Cloud Hackers Productivity Business Computing business Malware Microsoft Internet IT Services Backup Managed Service Provider IT Support Hosted Solutions Email Network Mobile Devices Workplace Tips Communication Hardware Computer Smartphones Microsoft Office Disaster Recovery Mobile Device Management Holiday Windows Miscellaneous Windows 10 network security Efficiency Data Business Continuity Small Business Server Smartphone Alert User Tips Virtualization Software Google Upgrade Saving Money Business Management Social Media WiFi Ransomware BYOD Passwords VoIP Remote Computing Operating System Internet of Things Big Data Android Gmail Cybersecurity Apple Vendor Management Spam Remote Monitoring Mobile Computing The Internet of Things App Office Innovation Browser Analytics Phishing Facebook Artificial Intelligence Collaboration Wireless Technology Budget Apps Business Growth Risk Management Office Tips Data Management Retail Best Practice IT Solutions Information Technology Tech Support Bring Your Own Device Office 365 Managed IT Services Save Money Going Green Hacker Customer Service Automation Robot Outsourced IT Money Gadgets Hacking Content Filtering End of Support Firewall Computers Proactive IT Current Events Lithium-ion Battery Running Cable Avoiding Downtime Customer Relationship Management virus Managed IT Mobile Device Hosted Solution IT Consultant Bitcoin IT service Saving Time Recovery Data storage Hard Drives Health Cortana Outlook Employer-Employee Relationship Cost Management Document Management Application Presentation Twitter iPhone Mouse Downtime Encryption IT Support intranet Business Owner Competition Website Wireless Net Neutrality eWaste Settings Bandwidth Search Humor Virtual Desktop Trending Maintenance Administration Education Network Congestion Cryptocurrency Analyitcs Social Engineering Programming Marketing Specifications User Disaster Google Docs communications Two-factor Authentication Hacks Cybercrime Work/Life Balance Laptop Windows 8 Phone System Chrome Update USB VPN Social Law Enforcement PowerPoint LiFi Samsung Statistics Save Time Password project management Quick Tips Excel Hiring/Firing Tablet Safety Antivirus Fiber-Optic Downloads Printer Server Undo Training Comparison Modern technology Solid State Drive Users Fake News Fraud Processors data breaches Backups Display Word Mobility File Sharing Television Debate YouTube business owners Managed IT Services Alt Codes Skype Consumers Microsoft Excel email scam Notifications risk Legal Monitors Memory Domains Files Cyber-attacks Flexibility Computer Repair Typing LinkedIn Wi-Fi Blockchain Environment Vulnerabilities Telephone Systems cyberattack Writing bdr Public Speaking Websites SharePoint Router Tip of the week Help Desk Best Available 5G Business Intelligence Productivity Heating/Cooling Troubleshooting Computing Infrastructure Crowdsourcing History cyberattacks Google Drive People Halloween IBM Botnet Distributed Denial of Service today ’s world Digital Touchscreen Data loss Video Surveillance Vulnerability Government businesses Scary Stories Evernote experience downtime Licensing Virtual Assistant IT Management Augmented Reality Networking Software as a Service Compliance Managed Service Providers Sports Unified Communications Data Warehousing Piracy Hard Drive Google Calendar Printing Fun Travel Business Cards Technology Tips Storage Regulations Private Cloud Windows Server 2008 Paperless Office Documents Data Security Access Control Computing Entrepreneur Refrigeration Gadget Digital Signature Mobile Technology Online Currency Dark Data Buisness Deep Learning IP Address Windows 7 PDF Hard Drive Disposal Google Wallet Crowdfunding Knowledge Politics Mobile Payment CIO Mobile Office Public Cloud Freedom of Information Company Culture Co-managed IT Unified Threat Management Black Market Data Breach Windows 8.1 Update Drones Printer Experience Telephony Patch Management User Error Identities News security breach Staffing Unsupported Software test post Administrator Taxes Mobile Data Sync Web Server Supercomputer Corporate Profile Mobile Device Managment Cameras IT Budget WannaCry CCTV Digital Payment Virtual Reality G Suite Point of Sale Data Backup Google Maps Machine Learning SaaS Unified Threat Management Meetings Cloud Computing Software Tips Relocation Physical Security Webcam Cabling Chromebook Motion Sickness GPS How To Infrastructure Error Personal Information Emoji Cleaning Tracking Upgrades Uninterrupted Power Supply Electronic Medical Records Computer Care Identity Theft 3D Printing Hard Disk Drive Automobile