Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Today’s cars, trucks, and sport utility vehicles are packed with features, many of which heavily lean on technology in order to operate. While these new vehicles and all their new capabilities are certainly appealing to today’s consumer, it needs to be said that one key aspect of technology has not been improved as these vehicles have been innovated upon.

That one key aspect? Security.

All Car Brands Were Found to Be Awful at Preserving Privacy and Security

Mozilla recently researched 25 car brands, all of which ranked terribly for privacy. Let’s summarize Mozilla’s findings briefly… and we apologize if this makes you reconsider your latest car purchase.

First Off, Mozilla Found that None of the Brands Met Their Minimum Security Standards

During their research, Mozilla found that—despite many brands publishing numerous privacy policies—none of them met the minimum standards that Mozilla expects, or at least, Mozilla couldn’t confirm that they did.

For instance, these cars contain a lot of personal information. Despite this, Mozilla was unable to confirm that this data was encrypted in any of the brands’ vehicles. Exacerbating this issue, most of the companies ignored their requests for more information outright, and those that did respond didn’t really answer their questions.

All of Them Collect Too Much Data, Most of Them Distributing It

Of the 25 brands that Mozilla examined, all of them collected more data than they needed in order to operate the vehicle’s features. That’s 100%, for those keeping track, that gathered personal information that wasn’t needed… and when you consider how many opportunities a modern car presents to collect data, there’s a lot of data that you might unwittingly be giving them. The fact that modern cars connect to a mobile device and can collect data from the services installed on it significantly increases the data that cars have access to, and that’s just the start.

Adding to the situation, most of the car companies—84%—also share the data they collect, with 76% selling it when they can. A little more than half (56%) will share this data with government officials by request—not court order, mind you, but just a request.

Drivers are Given Almost No Control Over Their Data

It’s important that consumers are given the ability to demand their data to be deleted. Unfortunately, 92% of the car companies that Mozilla examined wouldn’t allow drivers to do so… the only exceptions both being owned by a single company and only available in Europe, meaning that the General Data Protection Regulation applies, and they have to abide by deletion requests as a result. 

In Short, This Might Make You Want to Buy Used Until Car Companies Are Made to Do Better

Fortunately, when it comes to your business, you don’t have to compromise your security for added features and benefits. Not only can we help you get the most out of your technology, we can ensure that it is done with the security standards you need to remain safe.

Give us a call at 800.618.9844 to get started, or to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 10 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones AI Data Recovery VoIP Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Managed Services Voice over Internet Protocol Budget Gmail Apple Networking BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi 2FA Big Data Operating System Router Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Excel Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Physical Security Customer Service Display Printer Paperless Office Infrastructure Monitoring Document Management Remote Workers Firewall Telephone Scam Data loss The Internet of Things Cooperation Free Resource Windows 11 Project Management Images 101 Supply Chain Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management VPN Employees YouTube Meetings Integration Cryptocurrency Hacking User Tip Modem Processor Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data Privacy Data storage LiFi Wireless Technology Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Word Managed IT Service Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Safety Administration Vulnerabilities Entertainment IT solutions Star Wars IT Assessment How To Microsoft Excel Displays Legal Data Analysis Business Growth Gamification Flexibility Notifications Staff Value Legislation Outsourcing Organization Travel Social Networking Application Google Maps Smart Devices Cortana Techology Fileless Malware Digital Security Cameras Workplace Alt Codes Content Remote Working IBM Wearable Technology Memory Comparison Google Play Hiring/Firing Health IT Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Paperless Unified Threat Management Directions Videos Co-managed IT Typing Wasting Time Network Congestion Specifications Security Cameras Technology Care Trend Micro Internet Exlporer Software as a Service Competition Knowledge Fraud Business Communications Google Drive User Error Microchip Scams Username Managing Costs 5G Black Friday SSID Hybrid Work Point of Sale eCommerce Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Human Resources Cables Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine User Cookies Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Tactics Development Hotspot Transportation Google Apps IT Maintenance Windows 8 IP Address Laptop Websites Mirgation Hypervisor Nanotechnology Optimization PowerPoint Business Intelligence Drones Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Shortcuts Navigation Ransmoware Management PCI DSS Halloween Chatbots Recovery Screen Reader Hard Drives Writing Distributed Denial of Service Vendors Lenovo Gig Economy Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Be Proactive Evernote Workforce Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Refrigeration Fun Threats Superfish Bookmark Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Workplace Strategies Meta Financial Data Lithium-ion battery Error History Education Connectivity IT Social Engineering Break Fix Entrepreneur Amazon Browsers Smartwatch Upload Procurement Remote Computing Azure Multi-Factor Security Tech Outsource IT Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Undo Search Dark Web Environment Media CES Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Small Businesses Managed IT Customer Resource management FinTech Buisness File Sharing Regulations

Blog Archive