Fuse Networks Blog

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Fuse Networks can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at 855-GET-FUSE (438-3873).

Reliable Communications Help Build Better Relation...
Tip of the Week: Follow These Steps Before You Upg...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Tip of the Week Security Technology Best Practices Tech Term Business Computing Network Security Hackers Privacy Innovation Productivity Data Backup User Tips Computer Data Android Cybersecurity Software Efficiency Collaboration IT Support Communication Data recovery Communications Email Google Hosted Solutions Smartphone Hardware Internet Small Business IT Services Business Management Malware Mobile Device VoIP Mobile Devices Phishing Artificial Intelligence Office 365 Automation Business Technology Information Social Media Business Smartphones Cloud Two-factor Authentication Blockchain Cybercrime Applications Microsoft Office Cost Management Facebook Browser Managed Service Cloud Computing Access Control Backup Data Security Saving Money Windows 10 Holiday Network Mobile Device Management Workplace Tips Passwords BDR Maintenance Apps Internet of Things Vulnerability Ransomware Scam Vulnerabilities Cooperation Upgrade Websites Printer Bitcoin Conferencing Tech Terms Document Management Analytics Mobility Vendor Bandwidth Data Breach Healthcare Microsoft Alert Virtual Assistant Augmented Reality Patch Management IT Management Google Maps Social Engineering Quick Tips Disaster Recovery Hacking Remote Monitoring Managed IT services App Update Data loss Gmail Users Apple Saving Time Outsourced IT Freedom of Information Nanotechnology Server Downloads Directions Hard Drive Disposal Health IT Security Cameras SharePoint Downtime Emails Law Enforcement Browsers Integration Social Network Specifications Compliance Spam Startup Going Green NCSAM iPhone Desktop Monitoring Evernote Networking Machine Learning Medical IT News Mobile Technology Operating System Travel Cortana Cost email scam HTML Windows 10 Social project management Piracy Bluetooth WiFi Digital Multi-factor Authentication Paperless Office Customer Resource management Television Business Cards Regulations Download Managed Service Provider Unified Communications IT Retail Management Business Continuity Google Docs Network Management Audit Proxy Server Data Management Fake News Virtual Reality Username Disaster Microchip eWaste VPN Mouse Sports Router Money Software License Wireless Headphones Content Entertainment Device security Database Telephone System Upload Printing Support Windows 7 Excel Antivirus Chromebook Computing Tech Accountants Encryption Help Desk PowerPoint Microsoft Excel Company Culture Fuse Networks Emergency Processor Robot Data Protection Modem Cleaning BYOD Data Analysis Productivity Tactics Electronic Medical Records Term Gadgets Budget Legislation Trends Government CIO Microsoft 365 Tip of the week Backup and Disaster Recovery Error Training Computer Care Vendor Management Professional Services Identity Theft Navigation User Tip SSID Distributed Denial of Service Information Technology Computers Virtualization Fileless Malware Hard Drive Big Data Addiction Google Play Gamification Legal Bookmark Solutions Managed IT Services Mobile Security Website Twitter Telephone Comparison Equifax Service Level Agreement Voice over Internet Protocol Cryptocurrency Laptop Miscellaneous Screen Reader Knowledge Google Calendar Computing Infrastructure Devices Printers Mobile Office Domains Wireless Managing Stress Transportation Public Speaking Presentation Wi-Fi Lithium-ion battery Multi-Factor Security Hiring/Firing Tech Support Wireless Technology 5G IBM Fun Safety Marketing Hacker Employer-Employee Relationship The Internet of Things Customer Relationship Management Competition IP Address Hard Drives Customer Service Search Regulation