Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Today’s cars, trucks, and sport utility vehicles are packed with features, many of which heavily lean on technology in order to operate. While these new vehicles and all their new capabilities are certainly appealing to today’s consumer, it needs to be said that one key aspect of technology has not been improved as these vehicles have been innovated upon.

That one key aspect? Security.

All Car Brands Were Found to Be Awful at Preserving Privacy and Security

Mozilla recently researched 25 car brands, all of which ranked terribly for privacy. Let’s summarize Mozilla’s findings briefly… and we apologize if this makes you reconsider your latest car purchase.

First Off, Mozilla Found that None of the Brands Met Their Minimum Security Standards

During their research, Mozilla found that—despite many brands publishing numerous privacy policies—none of them met the minimum standards that Mozilla expects, or at least, Mozilla couldn’t confirm that they did.

For instance, these cars contain a lot of personal information. Despite this, Mozilla was unable to confirm that this data was encrypted in any of the brands’ vehicles. Exacerbating this issue, most of the companies ignored their requests for more information outright, and those that did respond didn’t really answer their questions.

All of Them Collect Too Much Data, Most of Them Distributing It

Of the 25 brands that Mozilla examined, all of them collected more data than they needed in order to operate the vehicle’s features. That’s 100%, for those keeping track, that gathered personal information that wasn’t needed… and when you consider how many opportunities a modern car presents to collect data, there’s a lot of data that you might unwittingly be giving them. The fact that modern cars connect to a mobile device and can collect data from the services installed on it significantly increases the data that cars have access to, and that’s just the start.

Adding to the situation, most of the car companies—84%—also share the data they collect, with 76% selling it when they can. A little more than half (56%) will share this data with government officials by request—not court order, mind you, but just a request.

Drivers are Given Almost No Control Over Their Data

It’s important that consumers are given the ability to demand their data to be deleted. Unfortunately, 92% of the car companies that Mozilla examined wouldn’t allow drivers to do so… the only exceptions both being owned by a single company and only available in Europe, meaning that the General Data Protection Regulation applies, and they have to abide by deletion requests as a result. 

In Short, This Might Make You Want to Buy Used Until Car Companies Are Made to Do Better

Fortunately, when it comes to your business, you don’t have to compromise your security for added features and benefits. Not only can we help you get the most out of your technology, we can ensure that it is done with the security standards you need to remain safe.

Give us a call at 800.618.9844 to get started, or to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Computer Google Workplace Tips Phishing Email IT Services Hosted Solutions Collaboration Users Ransomware Workplace Strategy Mobile Device Microsoft Quick Tips Small Business Passwords Backup Saving Money Cybersecurity Communication Data Backup Smartphone Managed Service Android VoIP Smartphones Productivity Upgrade Business Management Mobile Devices communications Data Recovery Disaster Recovery Social Media Windows Browser Managed IT Services Microsoft Office AI Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Information Covid-19 Holiday Server Managed Service Provider Remote Work Training Outsourced IT Encryption Spam Compliance Employee/Employer Relationship Windows 10 Office IT Support Government Data Management Business Continuity Business Technology Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Data Security Vendor App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail BYOD Budget Apple Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime How To Marketing BDR Office 365 HIPAA Applications WiFi Health 2FA Help Desk Operating System Retail Computers Healthcare Risk Management Managed IT Services Website Office Tips Analytics Augmented Reality Router Storage Password Virtual Private Network Bring Your Own Device Big Data Social Paperless Office Windows 11 Infrastructure Monitoring Going Green Excel Document Management Customer Service Cybercrime Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Firewall Vulnerability End of Support Vendor Management Solutions Physical Security The Internet of Things Display Printer Holidays Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Customer Relationship Management Settings Saving Time Virtual Machines Professional Services Printing Wireless Content Filtering Hacking Managed IT Service Presentation YouTube Maintenance Antivirus Downloads Cryptocurrency iPhone Licensing Wireless Technology Entertainment Vulnerabilities Data Privacy Virtual Desktop Data storage LiFi Images 101 Word Telephone System Multi-Factor Authentication Outlook Robot Mobility Cost Management Money Humor IT Management VPN Employees Meetings Safety Integration Sports Mouse User Tip Modem Computer Repair Mobile Security Processor Administration Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Application Best Practice Hotspot Transportation Small Businesses Buisness Tactics Development Websites Mirgation Hypervisor Displays IBM Legal IT solutions Shopping Nanotechnology Optimization PowerPoint Business Growth Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Management PCI DSS Chatbots Navigation Cortana Alt Codes Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Competition Downtime Service Level Agreement Internet Service Provider Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Hosted Solution Typing Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Download Net Neutrality Knowledge Financial Data Error History Google Drive Business Communications User Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work 5G Upload Procurement Experience Social Network Telework Cyber security IP Address Google Docs Multi-Factor Security Tech Human Resources Unified Communications Bitcoin Running Cable CES Tablet IoT Communitications Dark Web Cables Trends Supply Chain Management Alert Google Wallet Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Recovery How To Microsoft Excel IT Maintenance Hard Drives Windows 8 Laptop Data Analysis Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Business Intelligence Domains Drones Organization Travel Social Networking Legislation Shortcuts Ransmoware Refrigeration Halloween Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors Public Speaking Health IT Unified Threat Management Motherboard Data Breach Lithium-ion battery Comparison Google Play Be Proactive Permissions Workforce Hacks Entrepreneur Scary Stories Unified Threat Management Directions Videos Assessment Electronic Health Records Wasting Time Threats Fun Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Deep Learning Fraud Meta Undo User Error Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Education Point of Sale eCommerce Black Friday SSID Virtual Assistant Outsource IT Mobile Computing Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media Search

Blog Archive