Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Voyage Technology can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Computer Google Email Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Ransomware Workplace Strategy Mobile Device Microsoft Small Business Quick Tips Backup Saving Money Cybersecurity Passwords Communication Data Backup Smartphone Managed Service Android Business Management Smartphones Productivity VoIP Upgrade communications Mobile Devices Disaster Recovery Data Recovery Browser Windows Social Media Managed IT Services Microsoft Office AI Network Current Events Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Information Holiday Miscellaneous Gadgets Covid-19 Training Server Managed Service Provider Remote Work Outsourced IT Encryption Spam Compliance Employee/Employer Relationship Windows 10 Office Data Management Government IT Support Business Continuity Windows 10 Blockchain Virtualization Wi-Fi Business Technology Bandwidth Data Security Vendor Apps Two-factor Authentication Mobile Office App Gmail BYOD Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking Mobile Device Management BDR HIPAA WiFi Computing Applications Information Technology Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing How To 2FA Operating System Router Big Data Healthcare Virtual Private Network Risk Management Health Help Desk Office Tips Analytics Computers Augmented Reality Retail Storage Password Website Bring Your Own Device Managed IT Services Windows 11 Firewall Going Green Patch Management Save Money Remote Monitoring Excel Vulnerability End of Support Vendor Management The Internet of Things Cybercrime Remote Workers Physical Security Social Display Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Customer Service Windows 7 Document Management Microsoft 365 Solutions Telephone Scam Data loss Cooperation Holidays Telephone System Data Storage Robot Supply Chain Cost Management Settings Video Conferencing Safety Printing Wireless Managed Services Provider Content Filtering Virtual Machines Professional Services IT Management VPN YouTube Meetings Cryptocurrency User Tip Modem Computer Repair Mobile Security iPhone Processor Virtual Desktop Customer Relationship Management Vulnerabilities Data storage LiFi Data Privacy Smart Technology Images 101 Outlook Hacking Machine Learning Multi-Factor Authentication Presentation Mobility Money Saving Time Humor Wireless Technology Managed IT Service Maintenance Antivirus Sports Downloads Mouse Employees Licensing Integration Entertainment Word Administration How To Microsoft Excel Public Speaking Medical IT Legal Data Analysis IT solutions Star Wars Reviews Business Growth Gamification Notifications Staff Development Lithium-ion battery Transportation Small Businesses Entrepreneur Travel Social Networking Legislation Hypervisor Displays Cortana Optimization PowerPoint Techology Fileless Malware Google Maps Shopping Alt Codes Content Wearable Technology Employer/Employee Relationships Outsourcing Undo Navigation Health IT Downtime Unified Threat Management Motherboard PCI DSS Comparison Gig Economy Permissions Workplace Unified Threat Management Directions Hosted Solution Assessment Typing Internet Service Provider Teamwork Hiring/Firing Evernote Paperless Regulations Compliance Network Congestion Specifications Knowledge Fraud Memes Co-managed IT Google Drive User Error Microchip Internet Exlporer Username Net Neutrality SQL Server Technology Care Application History Business Communications Point of Sale Financial Data 5G Black Friday Smartwatch Experience IT IBM Scams Google Docs Unified Communications Database Bitcoin Network Management Running Cable Tech Support IT Technicians Procurement Azure Hybrid Work Cyber security Tech Human Resources Google Wallet Proxy Server Cookies Telework Monitors Cyber Monday CES Hotspot Communitications Cables Tactics Windows 8 Laptop Websites Mirgation Supply Chain Management Competition Term Google Apps Drones Nanotechnology FinTech Electronic Medical Records Language IT Assessment IT Maintenance SharePoint Addiction Management Halloween Chatbots Flexibility Value Business Intelligence Shortcuts Lenovo Screen Reader Organization Writing Distributed Denial of Service Digital Security Cameras Virtual Reality Computing Infrastructure Smart Devices Ransmoware User Service Level Agreement Hacks Server Management Scary Stories Private Cloud Identity Remote Working Memory Vendors Data Breach Google Play Be Proactive Superfish Bookmark Identity Theft Smart Tech Fun Videos Twitter Alerts Electronic Health Records IP Address Workforce Deep Learning Download Error Wasting Time Threats Trend Micro Security Cameras Workplace Strategies Browsers Education Connectivity Social Engineering Break Fix Remote Computing Software as a Service Meta Recovery Upload Hard Drives Mobile Computing Social Network Multi-Factor Security Managing Costs Amazon eCommerce Domains SSID Tablet IoT Search Dark Web Best Practice Trends Alert Surveillance Virtual Assistant Outsource IT Refrigeration Media Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Virtual Machine Environment

Blog Archive