KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy hackers Technology Email malware Internet Business Computing Network Security Cloud Google software User Tips Efficiency Backup Business Ransomware Data Microsoft Computer Android IT Support Small Business IT Support Mobile Device Management cybersecurity Gmail Mobile Devices Money VoIP Facebook Productivity Hardware Network Phishing Smartphone Windows Managed IT Services Hosted Solutions Business Continuity Internet of Things Cloud Computing Operating System Alert Microsoft Office Artificial Intelligence Data Security IT Management communications Windows 10 Data Management IT Services Hard Drive security cameras Disaster Recovery Passwords Antivirus Communication data breach End of Support Apple Nextiva vulnerability Update Business Management Encryption Managed IT Services Robot Smartphones Outlook Outsourced IT Networking Office 365 Bandwidth Cost Management Data storage Unified Communications Upgrade Social Media BDR Windows 10 Information Security Best Practice Holiday Start Menu security solutions Server Drones Social Engineering Spam News History Firewall Events Productivity Data Protection Word Browser Event Marketing Local Buzz Innovation Scam Lunch and Learn Save Money Law Enforcement Data Recovery Document Management SaaS Saving Money Bitcoin South Dakota Information Technology Cryptocurrency Politics Data Backup Hacking Digital App Automation Access Control Collaboration Big Data The Internet of Things IoT vulnerabilities Patch Management Apps BYOD Gadgets Remote Monitoring botnet Google Wallet Customer Service IBM Google Docs Project Management Analytics WiFi Search Legal YouTube Google Maps Flash Hard Drive Disposal Managed Service Provider Cache LiFi DDoS security precautions Kaseya Connect Mixer enterprise productivity software Monitors Fortinet VoIP Hosted Solution Lawyers Society IT Strategy Sarbanes-Oxley Act Streaming Media IT Security Computer Care Settings email scam Emergency Visible Light Communication Conference Vendors Email Security Displays Business Security IT Solutions Windows 8 Administration Unified Threat Management End User Testing Windows XP password manager LastPass Running Cable Freedom of Information Chamber of Commerce eWaste Workplace Tips Business Technology Communications How To Website Uninterrupted Power Supply Compliance Community Involvement Fast food Printing Proactive IT Time Management Quick Tips Attorneys Tech Support face user confidence Cabling Bluetooth Fake News Computing Infrastructure Office Tips Disaster Phone System Advertising Download Downloads Music Unified Threat Management Managed Services Printer Virtual Desktop surveillance cameras Safety Microsoft Excel Cortana Hardware as a Service Content Filtering Corporate Profile Programming healthcare Government Writing Google Calendar Business Cards Trend Micro LastPass Worker Rebrand communication device Knowledge HaaS Managed IT AtomBombing Cloud Backup Rapid City tool Virtual Reality File Sharing Business Communications Black Market Business Comunications Distributed Denial of Service VPN Press Release Google Play Store Web Servers Blockchain Applications appointment business owner Local Technology Tech Terms Vendor Mangement Virtual Machines Cleaning IoT Devices Workers Retail Comparison Physical Security Touchscreen Cybercrime Internet 101 Memory Excel Tips and Tricks communication solutions Sales Tax Business Mangement Risk Creep Webcam Penetration Testing Samsung Specifications Business Growth Websites Network Congestion Access botnet attack camera Virtualization identity theft Tip of the week Internet Connected Devices IT for Oil Companies Microsoft Bookings Deep Learning Social Phishing Scams Budget Laptop Remote Computing Dell ’s Sonicwall Global Management System Tablets Microsoft Office 365 Television Software as a Service media experience Virtual Assistant Redundancy Spyware Education macbook Risk Management Experience booking process Mobility Office Audit Google Drive Hack Virus IT Consultation Tablet Password Microsoft Office 365 features Mouse information Mobile Device DDoS attacks Kaseya Sports Event Vendor Management Maintenance Telephony Law IT Wireless Technology IT Assessment Solid State Drive SOX SharePoint Supercomputer base infrastructure Hacks Documents IT Consultant Phone Systen Automobile Text Messaging network security professionals security solution Notifications PDF Business Metrics Computing Training end-of-support date Playbook CrashOverride holiday season Marketing Chromebook Language Employer Employee Relationship Rental Service Flexibility Digital Payment breach methods UTM holidays Miscellaneous Reliable Computing Public Cloud Taxes Threat management scammers Twitter Scalability Paperless Office Protection scams Telephone Systems G Suite Travel Processors Health Computer Malfunction Employer-Employee Relationship Banking Sync Messenger Private Cloud Microchip 3D Printing CCTV Downtime Books IT service Web Server In Internet of Things Motion Sickness Meetings Piracy Reading Work/Life Balance Ordinary Computers Machine Learning Hiring/Firing Users Emails Software License Bring Your Own Device Relocation Tracking quantum computers Administrator Hacker Wi-Fi collaboration capabilities