Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Voyage Technology can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 06 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Users Ransomware Managed Service AI Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Cloud Computing Training Compliance Gadgets Covid-19 Remote Work Server IT Support Managed Service Provider Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Data Management Government Vendor Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Two-factor Authentication Mobile Office Managed Services Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking WiFi App Applications Computing Physical Security Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Password Managed IT Services How To BDR HIPAA Router Operating System Virtual Private Network Risk Management Computers 2FA Help Desk Health Analytics Website Office Tips Augmented Reality Retail Healthcare Storage Bring Your Own Device Big Data Vendor Management Cybercrime Customer Service Display Windows 11 Printer Paperless Office Monitoring Infrastructure Excel Document Management Remote Workers Managed IT Service Telephone Firewall Scam Data loss Cooperation Free Resource Project Management The Internet of Things Windows 7 Microsoft 365 Social Going Green Patch Management Save Money Remote Monitoring Solutions Vulnerability End of Support Employees Content Filtering IT Management Customer Relationship Management Integration VPN YouTube Meetings User Tip Modem Cryptocurrency Processor Mobile Security Hacking Presentation Computer Repair Holidays Virtual Desktop Data Storage LiFi Wireless Technology Smart Technology Supply Chain Data storage Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Outlook Machine Learning Money Word Humor Downloads Maintenance iPhone Licensing Antivirus Sports Mouse Entertainment Vulnerabilities Data Privacy Safety Administration Images 101 Telephone System Multi-Factor Authentication Mobility Cost Management Robot Settings Printing Wireless Trend Micro Specifications Security Cameras Workplace Strategies Unified Threat Management Hosted Solution Typing Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Username Network Congestion Competition Knowledge eCommerce Black Friday SSID Google Drive User Error Database Surveillance Virtual Assistant Outsource IT 5G IT Technicians Virtual Machine Environment Media Point of Sale Unified Communications Proxy Server Reviews Experience Cookies Cyber Monday Medical IT Google Docs Bitcoin Network Management Running Cable Tech Support User Tactics Development Hotspot Transportation Small Businesses Monitors Mirgation Hypervisor Displays Google Wallet Shopping Nanotechnology Optimization PowerPoint Windows 8 IP Address Laptop Websites Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Drones Management PCI DSS Gig Economy Electronic Medical Records Screen Reader Distributed Denial of Service Workplace SharePoint Halloween Recovery Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Writing Identity Evernote Paperless Lenovo Hard Drives Domains Bookmark Virtual Reality Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Hacks Server Management Scary Stories Private Cloud Download Net Neutrality Financial Data Fun History Business Communications Superfish Identity Theft Refrigeration Deep Learning Public Speaking Browsers Smartwatch Twitter Connectivity IT Break Fix Scams Azure Hybrid Work Lithium-ion battery Error Upload Procurement Social Network Telework Social Engineering Entrepreneur Cyber security Multi-Factor Security Tech Human Resources Education CES Remote Computing IoT Communitications Dark Web Cables Mobile Computing Trends Supply Chain Management Customer Resource management FinTech Search Regulations Google Calendar Term Google Apps Tablet Undo Best Practice Data Analysis Alert Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Managed IT Buisness File Sharing Gamification Flexibility Dark Data Organization How To Social Networking Legislation Shortcuts Legal IT solutions Business Growth Fileless Malware Digital Security Cameras Notifications Smart Devices Ransmoware Wearable Technology Memory Vendors Travel Application Content Remote Working Health IT Cortana Motherboard Data Breach Comparison Google Play Be Proactive Techology Google Maps Alt Codes IBM Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Downtime Unified Threat Management

Blog Archive