Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Voyage Technology can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 13 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Hosted Solutions Users Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Microsoft Cybersecurity Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service VoIP Business Management Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Browser Data Recovery Windows Managed IT Services Social Media Microsoft Office Remote Current Events Network Tech Term Internet of Things Productivity Artificial Intelligence Facebook Automation AI Cloud Computing Covid-19 Gadgets Server Managed Service Provider Remote Work Miscellaneous Information Holiday Outsourced IT Training Employee/Employer Relationship Encryption Spam Compliance Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Two-factor Authentication Data Security IT Support Mobile Office Vendor Apps Chrome BYOD Mobile Device Management Budget Gmail Apple App Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking How To Hacker BDR Avoiding Downtime Office 365 Marketing HIPAA Applications Access Control WiFi Tip of the week Conferencing Computing Information Technology Computers Analytics Website Office Tips Augmented Reality Router Storage Virtual Private Network Password Bring Your Own Device Health Help Desk Big Data Retail Operating System Healthcare Managed IT Services Risk Management Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Firewall Display Printer Paperless Office Windows 11 Infrastructure The Internet of Things 2FA Monitoring Excel Social Document Management Going Green Remote Workers Telephone Cybercrime Scam Data loss Customer Service Data Privacy Presentation Virtual Desktop Images 101 Data storage LiFi Wireless Technology Telephone System Multi-Factor Authentication Robot Mobility Cost Management Outlook Money Humor Word IT Management VPN Employees Meetings Integration User Tip Modem Sports Processor Mouse Computer Repair Mobile Security Holidays Safety Administration Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Settings Wireless Printing Managed IT Service Content Filtering Maintenance Antivirus Customer Relationship Management Downloads iPhone YouTube Licensing Cryptocurrency Hacking Entertainment Vulnerabilities Google Docs Alert Unified Communications Experience Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Bitcoin Dark Data Google Calendar Term Google Apps Running Cable User Data Analysis Star Wars IT Assessment Google Wallet How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Gamification Flexibility Organization Travel Social Networking Windows 8 IP Address Legislation Shortcuts Laptop Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Drones Ransmoware Wearable Technology Memory Vendors Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Halloween Recovery Hard Drives Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Domains Trend Micro Hacks Network Congestion Specifications Security Cameras Workplace Strategies Scary Stories Refrigeration Fun User Error Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Deep Learning Public Speaking Username Point of Sale eCommerce Lithium-ion battery Black Friday SSID Education Entrepreneur Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Network Management Proxy Server Reviews Cookies Mobile Computing Monitors Cyber Monday Medical IT Undo Search Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Best Practice Shopping Nanotechnology Optimization PowerPoint Buisness IT solutions SharePoint Addiction Legal Electronic Medical Records Language Employer/Employee Relationships Outsourcing Management PCI DSS Chatbots Business Growth Navigation Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Application Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Cortana Service Level Agreement Internet Service Provider Server Management Regulations Compliance Private Cloud Identity Alt Codes IBM Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Downtime Twitter Alerts SQL Server Technology Care Hosted Solution Download Net Neutrality Financial Data Error History Typing Business Communications Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Competition Knowledge Upload Procurement Google Drive Social Network Telework Cyber security Multi-Factor Security Tech Human Resources 5G CES Tablet IoT Communitications Dark Web Cables

Blog Archive