Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Today’s cars, trucks, and sport utility vehicles are packed with features, many of which heavily lean on technology in order to operate. While these new vehicles and all their new capabilities are certainly appealing to today’s consumer, it needs to be said that one key aspect of technology has not been improved as these vehicles have been innovated upon.

That one key aspect? Security.

All Car Brands Were Found to Be Awful at Preserving Privacy and Security

Mozilla recently researched 25 car brands, all of which ranked terribly for privacy. Let’s summarize Mozilla’s findings briefly… and we apologize if this makes you reconsider your latest car purchase.

First Off, Mozilla Found that None of the Brands Met Their Minimum Security Standards

During their research, Mozilla found that—despite many brands publishing numerous privacy policies—none of them met the minimum standards that Mozilla expects, or at least, Mozilla couldn’t confirm that they did.

For instance, these cars contain a lot of personal information. Despite this, Mozilla was unable to confirm that this data was encrypted in any of the brands’ vehicles. Exacerbating this issue, most of the companies ignored their requests for more information outright, and those that did respond didn’t really answer their questions.

All of Them Collect Too Much Data, Most of Them Distributing It

Of the 25 brands that Mozilla examined, all of them collected more data than they needed in order to operate the vehicle’s features. That’s 100%, for those keeping track, that gathered personal information that wasn’t needed… and when you consider how many opportunities a modern car presents to collect data, there’s a lot of data that you might unwittingly be giving them. The fact that modern cars connect to a mobile device and can collect data from the services installed on it significantly increases the data that cars have access to, and that’s just the start.

Adding to the situation, most of the car companies—84%—also share the data they collect, with 76% selling it when they can. A little more than half (56%) will share this data with government officials by request—not court order, mind you, but just a request.

Drivers are Given Almost No Control Over Their Data

It’s important that consumers are given the ability to demand their data to be deleted. Unfortunately, 92% of the car companies that Mozilla examined wouldn’t allow drivers to do so… the only exceptions both being owned by a single company and only available in Europe, meaning that the General Data Protection Regulation applies, and they have to abide by deletion requests as a result. 

In Short, This Might Make You Want to Buy Used Until Car Companies Are Made to Do Better

Fortunately, when it comes to your business, you don’t have to compromise your security for added features and benefits. Not only can we help you get the most out of your technology, we can ensure that it is done with the security standards you need to remain safe.

Give us a call at 800.618.9844 to get started, or to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Information Automation Artificial Intelligence Gadgets Compliance Cloud Computing Training Covid-19 Outsourced IT Server Managed Service Provider Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Data Security Managed Services Apps Two-factor Authentication Mobile Office Vendor WiFi Apple Networking App Voice over Internet Protocol Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed IT Services How To Conferencing BDR Computing Physical Security Hacker Information Technology Avoiding Downtime Marketing Access Control HIPAA Office 365 Applications 2FA Help Desk Bring Your Own Device Big Data Healthcare Operating System Computers Virtual Private Network Risk Management Website Health Office Tips Router Analytics Augmented Reality Retail Storage Password Monitoring The Internet of Things Scam Data loss Excel Social Remote Workers Managed IT Service Going Green Patch Management Telephone Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Cooperation Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Firewall Document Management Windows 11 Data Storage Mouse Smart Technology Supply Chain Video Conferencing Managed Services Provider Administration Saving Time Virtual Machines Professional Services Robot Customer Relationship Management Downloads iPhone Settings Printing Licensing Wireless Content Filtering Hacking IT Management Vulnerabilities Entertainment Presentation VPN Data Privacy YouTube Meetings Cryptocurrency Images 101 Wireless Technology Computer Repair Telephone System Multi-Factor Authentication Mobility Cost Management Virtual Desktop Data storage LiFi Word Employees Outlook Integration Machine Learning Money User Tip Humor Modem Mobile Security Processor Safety Holidays Maintenance Antivirus Sports Mirgation Hypervisor Displays Education Social Engineering Remote Computing Shopping Nanotechnology Optimization PowerPoint Mobile Computing Language Employer/Employee Relationships Outsourcing Addiction Management PCI DSS Chatbots Tablet Navigation Search Alert Gig Economy Screen Reader Application Best Practice Distributed Denial of Service Workplace Managed IT Computing Infrastructure Teamwork Hiring/Firing Buisness File Sharing Dark Data Service Level Agreement Internet Service Provider Regulations Compliance IBM Legal Identity IT solutions Evernote Paperless How To Notifications Bookmark Smart Tech Memes Business Growth Co-managed IT Download Net Neutrality Alerts SQL Server Technology Care Travel Financial Data Techology History Google Maps Business Communications Cortana Alt Codes Break Fix Scams Browsers Smartwatch Connectivity IT Upload Procurement Competition Azure Hybrid Work Downtime Unified Threat Management Social Network Telework Unified Threat Management Cyber security Hosted Solution Multi-Factor Security Tech Human Resources Typing Dark Web Cables CES IoT Communitications Trends Supply Chain Management Network Congestion Knowledge Customer Resource management FinTech Google Drive User Error Regulations User Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Point of Sale 5G Experience Organization IP Address Google Docs Social Networking Unified Communications Legislation Shortcuts Bitcoin Network Management Ransmoware Running Cable Tech Support Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Google Wallet Wearable Technology Memory Vendors Monitors Health IT Motherboard Data Breach Recovery Comparison Google Play Be Proactive Hard Drives Windows 8 Permissions Workforce Laptop Websites Directions Videos Assessment Electronic Health Records Domains Drones Wasting Time Threats Electronic Medical Records SharePoint Trend Micro Specifications Security Cameras Workplace Strategies Refrigeration Fraud Meta Halloween Microchip Internet Exlporer Software as a Service Username Public Speaking Lenovo Managing Costs Amazon Writing Virtual Reality Lithium-ion battery eCommerce Black Friday SSID Hacks Server Management Virtual Assistant Outsource IT Entrepreneur Scary Stories Private Cloud Database Surveillance Superfish IT Technicians Virtual Machine Environment Identity Theft Media Fun Twitter Proxy Server Reviews Cookies Deep Learning Cyber Monday Medical IT Undo Hotspot Transportation Small Businesses Error Tactics Development

Blog Archive