ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Windows 10 Anniversary Update Doesn’t Let You Turn Off Cortana

The Windows 10 Anniversary Update Doesn’t Let You Turn Off Cortana

Voice assistants like Apple’s Siri and Google Now have become omnipresent on smartphones and other devices, and Microsoft’s Cortana is hoping to capitalize on their popularity. However, Windows 10’s anniversary update has not been kind to the voice assistant, and actually makes it somewhat of a security issue to use on your Windows 10 devices.

Since Windows 10’s release last year, there has been much said about Windows 10’s innate settings and their ability to harvest information from its users. There are arguments that suggest Windows 10 shares too much data and that Microsoft needs to do something about it. Microsoft may have tried to provide a functional and user-friendly virtual assistant, but what they provided didn’t sit well with users who advocate for privacy and security.

The main issue that people have with the post-update Cortana is that it can’t be turned off. The Windows 10 anniversary update, called Windows 10 SP1, disables the ability to turn off Cortana completely--and if you can’t turn it off, she’ll be listening for commands, using your voice to deliver targeted ads and collect information. The only easy way to keep Cortana from doing this is to set Cortana up the way you want upon Windows 10’s installation.

If you’re installing Windows 10 on your device for the first time, we strongly recommend that you steer clear of the “Express Settings.” These settings may provide a higher-end user experience with more functionality, but you’ll be sacrificing security and privacy in the process. You can customize Cortana’s access to information that you may want to keep private, like your contacts, location, calendar data, email, and more. However, doing so limits Cortana’s functionality to a basic search function within your operating system. It’s up to you to determine whether you want to make this choice or not, but you only have one shot to do it.

Plus, organizations are also finding fault with Cortana’s new ability to perform basic search functionality without the user logging into the device. While this might seem like a cool new feature, think about it; any feature that lets any functionality happen without a login could place the device at risk of a security discrepancy. As with any security risk, hackers will eventually try to capitalize on it. Thankfully, this is one of the features that you can disable. Just go through Cortana’s settings and turn off the “Use Cortana even when my device is locked” feature.

Of course, there are plenty of security benefits to keeping Windows 10 updated, so completely ignoring the update isn’t advisable either.

For those who are too late to disable Cortana completely, there are still ways to turn off Cortana, but we don’t recommend them to anyone who isn’t aware of how to navigate the inner machinations of the Windows 10 operating system. If you’re unfamiliar with how to adjust your registry, contact ClearView IT. We can help your organization implement solutions that are designed to maximize the security of your infrastructure.

To learn more about Windows 10 and network security, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Network Mobile Devices Communication Data Recovery Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Browser Managed Service Apps Windows 10 IT Support Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Data Management Remote Work Internet of Things Saving Money Operating System Government Networking Windows Artificial Intelligence Managed IT services Gadgets Workplace Strategy WiFi Business Technology App Virtualization Spam Server Blockchain Remote Bandwidth Mobile Device Management Encryption Information Gmail Information Technology Office Two-factor Authentication Office 365 History Budget Employee/Employer Relationship Apple Big Data Access Control Wi-Fi Data Security Health Conferencing Cybercrime Analytics BDR Voice over Internet Protocol Vendor IT Management Help Desk Hacking Training Document Management Save Money Hacker Employer-Employee Relationship Patch Management Compliance Remote Monitoring Remote Computing Cost Management Website Mobile Office Applications Legal Managed Services Vulnerabilities Data storage Search... Best Practice Money Customer Service Retail Data loss Unified Threat Management BYOD Alert Firewall Computing Augmented Reality Vendor Management Hiring/Firing Project Management Hard Drive Word Outlook Password IBM Remote Workers Chrome Mobility Meetings Router Law Enforcement Windows 7 End of Support Free Resource Printer Google Maps The Internet of Things Scam YouTube Monitoring How To Mobile Computing Healthcare Marketing VPN Laptop Travel Running Cable Virtual Reality Social Engineering Update Cryptocurrency Black Market Storage Cleaning Robot Social Sports SaaS DDoS Paperless Office Antivirus Windows 11 Maintenance User iPhone Education Cortana Content Filtering Websites Data Breach Twitter Vulnerability Processor How To Processors Software as a Service Managed Services Provider Microchip Flexibility Data Protection Virtual Private Network PowerPoint Administration Hack Current Events Identity Theft Notifications Presentation Multi-factor Authentication Specifications Solutions Unified Communications IT Consultant Wireless Technology Google Docs eWaste Tech Terms Integration Bluetooth Saving Time Images 101 Customer Relationship Management Distributed Denial of Service Display Co-Managed IT Office Tips Managed IT Downtime Entertainment Computers Private Cloud Digital Bitcoin Safety Memory Telephone Employees Virtual Desktop Avoiding Downtime Taxes Experience Politics Holidays Machine Learning Excel Settings Cooperation Video Conferencing Solid State Drive Physical Security HIPAA Disaster Virtual Machines Computer Repair Virtual Assistant Drones Chromebook Start Menu Professional Services Lithium-ion battery Downloads Automobile Computer Care Equifax Memes Relocation Uninterrupted Power Supply Displays Webcam Business Intelligence Advertising Health IT Human Resources Tactics Net Neutrality Business Mangement Hard Drive Disposal Work/Life Balance Tech Support Tablets Username Financial Data Cables Securty Startup IT Freedom of Information Domains Risk Management Inbound Marketing Navigation Google Apps Google Calendar Addiction In Internet of Things email scam Supercomputer Network Congestion Telework Virus Point of Sale Mobile Security Hacks Legislation Communitications Reliable Computing News Microsoft 365 Writing Motion Sickness User Tip Smartwatch Evernote Electronic Payment Comparison Network Management Procurement Google Drive Shortcuts Public Speaking FinTech Knowledge Emails IT Assessment Streaming Media Scalability Corporate Profile Fake News Proxy Server CES Proactive IT Television Service Level Agreement Supply Chain Management Phone System Administrator Telephony Be Proactive Computing Infrastructure Value Text Messaging Employer Employee Relationship Keyboard Bring Your Own Device Cabling Hard Drives Management Organization Device security Cyber security Wireless Headphones Smart Devices Tablet Microsoft Excel G Suite intranet Music Tech Mouse Going Green Remote Working VoIP Workplace Strategies Business Cards Wireless Tracking Shortcut Heating/Cooling Environment Error AI Trend Micro Electronic Health Records Windows XP Computer Accessories Transportation Web Server Social Networking Bookmark Digital Security Cameras Term SharePoint Download Botnet Piracy Wasting Time Digital Payment Rental Service Worker Modem Micrsooft HTML eCommerce Nanotechnology Surveillance Access Flash Browsers Videos Business Growth Google Play Upload Time Management Smart Technology Software License Managing Costs Telephone Systems Public Cloud SSID Social Network Media Audit Screen Reader Development Spyware Employer/Employee Relationships Data Analysis Google Wallet Security Cameras Trends Mobile Technology Virtual Machine Staffing Banking File Sharing Optimization Messenger IP Address Deep Learning Customer Resource management Reviews Troubleshooting Redundancy Devices 2FA Cache Tip of the week Teamwork Fileless Malware Hosted Solution Gamification Data Storage Unified Threat Management Supply Chain Company Culture Hypervisor Business Metrics Workers Books Medical IT Telephone System Shopping Regulations Directions Paperless Printing Backup and Disaster Recovery SQL Server Language CCTV Society Competition Content PCI DSS Touchscreen Workplace Desktop Licensing Recovery Accountants Humor Reading Monitors Computer Malfunction Visible Light Communication Electronic Medical Records Gig Economy Business Owner Emergency Business Communications Database Internet Service Provider LiFi Vendor Mangement Azure Entrepreneur Windows 8 Application Regulations Compliance Scams Managed IT Service Documents Samsung

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?