Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Voyage Technology can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 08 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI Business Management Data Recovery VoIP Smartphones Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Tech Term Network Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Holiday Training Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing WiFi How To BDR Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk 2FA Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Remote Monitoring End of Support Microsoft 365 Vulnerability Customer Service Vendor Management Cybercrime Solutions Physical Security Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel Remote Workers Telephone The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Multi-Factor Authentication Mobility Settings Wireless Printing Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Employees Cryptocurrency Wireless Technology User Tip Modem Integration Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Holidays Word Smart Technology Data Storage Outlook Machine Learning Supply Chain Money Saving Time Video Conferencing Managed Services Provider Humor Virtual Machines Professional Services Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse Licensing iPhone Entertainment Administration Vulnerabilities Data Privacy Images 101 Robot Telephone System Customer Relationship Management Cost Management Organization Shortcuts Alt Codes Content Wearable Technology Downtime Unified Threat Management Motherboard Digital Security Cameras Comparison Smart Devices Ransmoware Competition Health IT Memory Vendors Unified Threat Management Directions Hosted Solution Assessment Permissions Remote Working Data Breach Google Play Be Proactive Typing Videos Network Congestion Specifications Electronic Health Records Workforce Wasting Time Threats Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud Trend Micro Security Cameras Workplace Strategies Username Point of Sale 5G Black Friday Software as a Service Meta Managing Costs Amazon IP Address Google Docs Unified Communications Database Experience Running Cable Tech Support IT Technicians eCommerce SSID Bitcoin Network Management Virtual Assistant Outsource IT Google Wallet Proxy Server Cookies Monitors Cyber Monday Surveillance Virtual Machine Environment Media Recovery Tactics Hotspot Laptop Websites Mirgation Reviews Medical IT Hard Drives Windows 8 Transportation Small Businesses Domains Drones Nanotechnology Development Hypervisor Displays SharePoint Addiction Electronic Medical Records Language Halloween Chatbots Shopping Optimization PowerPoint Refrigeration Management Employer/Employee Relationships Outsourcing Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service PCI DSS Lithium-ion battery Navigation Service Level Agreement Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Gig Economy Workplace Hacks Server Management Teamwork Hiring/Firing Superfish Bookmark Identity Theft Smart Tech Fun Internet Service Provider Regulations Compliance Evernote Paperless Deep Learning Download Twitter Alerts Error Memes Co-managed IT Undo SQL Server Technology Care Browsers Education Connectivity Social Engineering Break Fix Net Neutrality Financial Data History Business Communications Upload Remote Computing Smartwatch Multi-Factor Security IT Scams Mobile Computing Social Network Azure Hybrid Work Tablet IoT Search Dark Web Procurement Telework Cyber security Tech Human Resources Application Best Practice Trends Alert Buisness File Sharing Regulations CES Dark Data Google Calendar Communitications Cables Managed IT Customer Resource management IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Supply Chain Management FinTech Term Google Apps Business Growth Gamification Notifications Staff Travel Social Networking Legislation IT Assessment IT Maintenance Value Business Intelligence Techology Fileless Malware Google Maps Cortana Flexibility

Blog Archive