Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Accidentally Gifting a Security Breach?

Are You Accidentally Gifting a Security Breach?

The holidays are a time filled with good food, visits from dear friends and family, and exchanging gifts with those you care about. However, to keep the season bright and merry, you need to be a little cautious during your next gift exchange, as many gifts can present some unexpected risks to your recipient’s security. Be mindful if you see the following items on someone’s wish list.

Digital Assistants and Smart Home Hubs
These little devices have made a splash as a useful household appliance, answering a user’s questions and controlling their various media. However, these nifty gizmos are always listening--literally. These devices rely on microphones that automatically activate, meaning that they hear everything you have to say. Imagine what a cybercriminal could do with the information they extract from them.

What’s worse, many of these devices now also come equipped with cameras, allowing a cybercriminal to effectively invade your privacy from anywhere.

While it may be a neat idea to take control of one’s environment through technology, it provides cybercriminals with the opportunity to take advantage of these devices as they victimize you, along with your family or staff. These devices can be used to spy on you and collect enough information to piece together your daily routine--invaluable intel for the criminal class. It’s important to keep this in mind if you are purchasing these devices for young children. Although Google and Amazon want to be on top of their security, it’s important to consider the lack of security awareness kids might have.

Connected Toys
While many of these devices may seem like they appeal to an older demographic, there are plenty of toys and games for children that are getting smarter. This also increases their creepiness factor, as hackers could use some toys--such as a Toymail Talkie--to communicate directly with children. Other connected playthings could provide hackers with details about a child’s life that are far too intimate. Edwin the Duck, a connected bath toy, could be used to extrapolate how often a child is bathed and when they are put to bed.

Smart Appliances
Of course, adults can have toys of their own in the form of appliances, and they are more and more frequently being built with smart capabilities included. We’re talking about wearables like fitness trackers and Internet of Things devices. Basically anything that connects to the Internet that isn’t a traditional computer or laptop would fall into this category. What isn’t always included is any sufficient security to keep these appliances from being made a part of a botnet. Furthermore, like digital assistants, these devices can easily collect data based on the activity around them.

DNA Testing Kits
This one may come as a surprise to many, but those kits that you send away with a vial of your spit may be the next major cause of privacy issues. After all, the product itself requires the most unique piece of personally identifiable information you have: your DNA. This specific data can quickly become valuable, especially for research purposes.

The agreements that you have to sign in order to use these services often have terms that grant the company permission to do as they will with your genetic data--which includes sharing a digitized version of this data with those who are willing to pay. While the Genetic Information Nondiscrimination Act of 2008 forbids the use of genetic data as a justification for discrimination-or firing someone because they have a predisposition to a condition-this kind of discrimination would be awfully hard to prove.

While the holidays should be a time of happiness, few things can put a damper on that happiness quicker than a security breach of your data. Mozilla has helpfully created a list of potentially risky products for consumers to reference as they do their holiday shopping.

So, what do you think? Is getting a good deal on an item for someone special worth risking a data breach? Let us know in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Business Computing Software Internet Hosted Solutions Ransomware Microsoft Android Network Security IT Services Business Google Computer Mobile Devices Backup Smartphone Windows Data Management Small Business Windows 10 Innovation App Cloud Computing Artificial Intelligence Hardware Encryption Data Server Business Continuity Browser Internet of Things Business Management Efficiency IT Support Saving Money Productivity Managed IT Services Phishing User Tips Data Recovery Outsourced IT Gmail Tip of the week Smartphones Office 365 Remote Monitoring Managed Service Provider IT Management Word Risk Management Robot Productivity Google Drive Cybersecurity Upgrade Antivirus IT Support Settings Chrome Infrastructure Data storage Money Office Tips Windows 10 Communication Big Data Vulnerability Facebook Telephone Systems Administration Content Filtering VPN Alert Data Security Server Management Firewall Analytics Virtual Private Network Computing Employer-Employee Relationship Network End of Support Data Backup Government HIPAA Hosted Solution Unified Threat Management Managed IT Services Mobile Security Microsoft Office BYOD Workplace Tips Bandwidth Maintenance YouTube Business Technology Outlook communications Monitors Social Media Save Money Automation Mouse Disaster Recovery Two-factor Authentication Miscellaneous Mobile Device Virtual Reality Passwords Scam Apple Storage SaaS LiFi Data loss Holiday Google Calendar Dark Data Servers Windows 8 Tech Term desktop Dark Web Retail Digital Cooperation Politics Legislation Collaboration Customer Service Compliance IT solutions Microsoft Excel Office Samsung Quick Tips Spyware Staff Document Management Vendor Management Techology Tech Support Operating System Tablet File Sharing Running Cable Statistics Social Regulations Solid State Drive Blockchain Social Engineering Buisness Mail Merge Information Technology VoIP Best Practice Augmented Reality Identity Theft Virtual Desktop Unified Threat Management Websites Comparison Laptop Bluetooth Hard Disk Drive Deep Learning Permissions Safety Address Google Docs Avoiding Downtime Wearable Technology User Error Cabling Spam Specifications Network Congestion Hacks Bring Your Own Device Fraud Downtime Google Wallet Time Management Business Growth How To Wi-Fi Printer Black Friday Computers Search Password Gadgets Emergency Drones Network Management Hacker Firefox Applications Digital Payment Access Control Disaster Apps Cyber Monday Display Halloween Users Hotspot Touchscreen Alt Codes IT Technicians Education SharePoint Uninterrupted Power Supply Smart Technology Scary Stories Managed IT IBM Language Computer Care Website Lenovo Budget Humor Typing Mirgation Wireless Downloads Unified Communications Distributed Denial of Service Sports Shortcut Current Events Corporate Profile Computing Infrastructure Training Superfish Automobile The Internet of Things Cryptocurrency Chatbots Dell Remote Computing Managed IT Service Paperless Office Patch Management Going Green Customer Relationship Management WannaCry Alerts VoIP Multi-Factor Security Cybercrime Heating/Cooling Bitcoin Identity Google Maps WiFi Break Fix Writing Printing Marketing Licensing Networking Legal Update Cameras Tracking Mobile Data Recovery CCTV Chromebook Notifications Physical Security Emoji Travel G Suite Crowdsourcing Botnet CrashOverride Supercomputer Personal Information Cortana Motion Sickness Taxes Machine Learning IT Budget Virtualization IT Consultant Relocation Computer Repair Meetings Mobile Device Management Cleaning How To Work/Life Balance Private Cloud Health Black Market Webcam Mobile Computing Law Enforcement Error Electronic Medical Records Ben McDonald shares Twitter Point of Sale Upgrades Gadget Staffing 3D Printing Administrator what was your? Web Server Processors GPS Unsupported Software

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3