ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

CES Introduced New Surveillance Technology

CES Introduced New Surveillance Technology

The 2020 Consumer Electronics Show is always a good place to see the most innovative consumer technology. CES features products of all types from companies of all sizes. This year, there was a strong contingent of companies bringing products to market in the physical security space. This isn’t all that uncommon, but the reaction to many of these devices is noteworthy.

There were security devices of all types on display, including cameras, speakers, and access control systems. With all this innovative technology in one place security experts got a good look at all of it and came away with deep reservations that these devices, which are extensively built for security, were actually a threat to the security and privacy of consumers. This concern is exacerbated by the numerous examples of technologies in the same breadth that have been hacked recently. Just recently, Amazon’s Ring security cameras were hijacked and used to harass children, and were sending data over to the police without a user’s consent.

Additionally, one of Ring’s major competitors, Wyze Labs, had a major hack that affected 2.4 million customers. Later, it was named as an honoree in CES’ innovation awards.

A company named Sunflower Labs showed off a home drone security system, which would immediately track anyone who entered a property with an automated drone and send a live stream to a mobile phone. As a part of the sales pitch, their CEO suggested that their system is better for others’ privacy, as it will only view a dedicated property.

It’s not all that surprising that regulators and privacy advocates don’t feel like these device manufacturers have the right motives. Traditionally, “smart” surveillance solutions haven't done an exemplary job at protecting individual privacy; or, improving security, for that matter. 

It should be said that user privacy issues were discussed at the event, and moderators reported that there was more responsibility taken for consumers’ privacy by companies. Flying in the face of this perspective, however, were the products themselves. For example, some companies are creating products that are using facial recognition as a sign-in tool. CES even offered the option to attendees.

The CEO of the Consumer Technology Association (which puts on CES each year), Gary Shapiro defended these practices, saying that, “You’re opting in” and “If you want to do it, you’ll have an opportunity to do it.” However, Executive Director Cindy Cohn of the Electronic Frontier Foundation, held a very different view: “There is a risk treating this as an individual decision... That’s not really fair or right to do to people. We need to fix the policies.”

Of course, momentum is on the side of privacy, so over time we expect to see less demand for products that don’t make privacy a priority. It remains to be seen if that will affect lawmakers’ decisions, but if contemporary signs are any indication, it seems as if privacy will be getting more attention in the coming days. 

If you are looking to incorporate new technology to keep your business secure, call the IT pros at ClearView IT today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 10 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Facebook Business Continuity Windows 10 Disaster Recovery Covid-19 Passwords Holiday Windows 10 Managed Service IT Support Apps Browser Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Windows Gadgets Workplace Strategy Artificial Intelligence Managed IT services Networking Information App Virtualization Mobile Device Management Spam Business Technology Remote Bandwidth Blockchain WiFi Encryption Server Gmail Budget Office Two-factor Authentication History Office 365 Apple Information Technology Employee/Employer Relationship Wi-Fi Big Data BDR Health Analytics Cybercrime Access Control Conferencing Data Security Voice over Internet Protocol Patch Management Help Desk Hacking Remote Monitoring Vendor Employer-Employee Relationship Cost Management Hacker IT Management Remote Computing Training Document Management Compliance Save Money Mobile Office Search... Managed Services BYOD Applications Best Practice Project Management Computing Retail Vendor Management Vulnerabilities Hard Drive Alert Money Hiring/Firing Customer Service Outlook Unified Threat Management Password Legal Firewall Augmented Reality Data storage Data loss Word IBM Website Remote Workers Black Market Marketing Paperless Office Antivirus Cleaning Windows 7 Data Breach The Internet of Things Running Cable Robot Free Resource YouTube Maintenance Storage How To Laptop Websites Monitoring Mobility Meetings Healthcare Twitter User Google Maps Law Enforcement Social Sports Scam DDoS End of Support SaaS Printer Chrome VPN iPhone Education Cortana Update Content Filtering Travel Windows 11 Virtual Reality Mobile Computing Social Engineering Router Cryptocurrency IT Consultant Managed Services Provider Customer Relationship Management Virtual Private Network Co-Managed IT Physical Security Politics Machine Learning Entertainment Settings Processor Current Events Solid State Drive Wireless Technology Solutions eWaste Start Menu Computer Care Downloads Integration Multi-factor Authentication Images 101 Downtime Vulnerability Chromebook Drones Safety Display Automobile Software as a Service Data Protection HIPAA Saving Time Virtual Desktop How To Employees Experience Avoiding Downtime Microchip Bitcoin Flexibility Computers Holidays Telephone Hack Disaster Identity Theft Cooperation Video Conferencing Tech Terms Notifications Excel Unified Communications Managed IT Virtual Machines Computer Repair PowerPoint Digital Google Docs Lithium-ion battery Administration Bluetooth Professional Services Distributed Denial of Service Presentation Office Tips Taxes Virtual Assistant Private Cloud Processors Specifications Memory Content Desktop Botnet Securty Memes Phone System Net Neutrality Domains Spyware Micrsooft Electronic Medical Records Accountants Human Resources Audit Rental Service Workplace Financial Data Flash File Sharing Database Risk Management Redundancy Telephone Systems IT Business Growth Cache Health IT Equifax Google Apps Hard Drive Disposal Scams Telework Unified Threat Management Computer Accessories Workers Tactics Microsoft 365 Username Smartwatch Banking Communitications Public Speaking Google Wallet Procurement Deep Learning CCTV Startup Streaming Media Printing Freedom of Information Messenger email scam Cables FinTech Touchscreen Keyboard Navigation Addiction Computer Malfunction Mobile Security CES Emergency Business Metrics IT Assessment Hard Drives Hosted Solution Supply Chain Management Vendor Mangement Value intranet User Tip Legislation News Books Network Management Point of Sale Organization Wireless Language Cyber security Shortcut Samsung Society Evernote Environment Webcam Smart Devices Heating/Cooling Uninterrupted Power Supply Fake News Reading Shortcuts Remote Working Troubleshooting Business Mangement Monitors Social Networking Visible Light Communication Proxy Server Emails Windows XP Service Level Agreement Computing Infrastructure AI Trend Micro Tablets Windows 8 Transportation Management Device security Digital Security Cameras Electronic Health Records Google Calendar Microsoft Excel Relocation Be Proactive Displays Wasting Time Supercomputer Advertising Wireless Headphones Going Green Business Cards Virus Work/Life Balance eCommerce Tech Support Tech Modem Motion Sickness Error Videos Surveillance Comparison Workplace Strategies Business Owner Google Drive Managing Costs Bookmark Download Piracy In Internet of Things Staffing Term SSID Corporate Profile Network Congestion Employer/Employee Relationships HTML Media Knowledge Hacks Development IP Address Television Reliable Computing Telephony Writing Virtual Machine Employer Employee Relationship Browsers Nanotechnology Upload Software License Reviews Optimization Cabling Google Play Tablet Teamwork G Suite Social Network 2FA Mouse Scalability Smart Technology Data Storage Inbound Marketing VoIP Hypervisor Tracking Data Analysis Screen Reader Medical IT Trends Mobile Technology Administrator Shopping Recovery Text Messaging Competition Proactive IT Security Cameras SQL Server Web Server Customer Resource management Devices Paperless Bring Your Own Device LiFi SharePoint Tip of the week PCI DSS Licensing Entrepreneur Digital Payment Fileless Malware Gamification Company Culture Gig Economy Documents Electronic Payment Humor Application Worker Music Internet Service Provider Access Azure Business Intelligence Telephone System Regulations Business Communications Supply Chain Regulations Compliance Time Management Managed IT Service Public Cloud Directions Backup and Disaster Recovery

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?