ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Windows 10 Anniversary Update Doesn’t Let You Turn Off Cortana

The Windows 10 Anniversary Update Doesn’t Let You Turn Off Cortana

Voice assistants like Apple’s Siri and Google Now have become omnipresent on smartphones and other devices, and Microsoft’s Cortana is hoping to capitalize on their popularity. However, Windows 10’s anniversary update has not been kind to the voice assistant, and actually makes it somewhat of a security issue to use on your Windows 10 devices.

Since Windows 10’s release last year, there has been much said about Windows 10’s innate settings and their ability to harvest information from its users. There are arguments that suggest Windows 10 shares too much data and that Microsoft needs to do something about it. Microsoft may have tried to provide a functional and user-friendly virtual assistant, but what they provided didn’t sit well with users who advocate for privacy and security.

The main issue that people have with the post-update Cortana is that it can’t be turned off. The Windows 10 anniversary update, called Windows 10 SP1, disables the ability to turn off Cortana completely--and if you can’t turn it off, she’ll be listening for commands, using your voice to deliver targeted ads and collect information. The only easy way to keep Cortana from doing this is to set Cortana up the way you want upon Windows 10’s installation.

If you’re installing Windows 10 on your device for the first time, we strongly recommend that you steer clear of the “Express Settings.” These settings may provide a higher-end user experience with more functionality, but you’ll be sacrificing security and privacy in the process. You can customize Cortana’s access to information that you may want to keep private, like your contacts, location, calendar data, email, and more. However, doing so limits Cortana’s functionality to a basic search function within your operating system. It’s up to you to determine whether you want to make this choice or not, but you only have one shot to do it.

Plus, organizations are also finding fault with Cortana’s new ability to perform basic search functionality without the user logging into the device. While this might seem like a cool new feature, think about it; any feature that lets any functionality happen without a login could place the device at risk of a security discrepancy. As with any security risk, hackers will eventually try to capitalize on it. Thankfully, this is one of the features that you can disable. Just go through Cortana’s settings and turn off the “Use Cortana even when my device is locked” feature.

Of course, there are plenty of security benefits to keeping Windows 10 updated, so completely ignoring the update isn’t advisable either.

For those who are too late to disable Cortana completely, there are still ways to turn off Cortana, but we don’t recommend them to anyone who isn’t aware of how to navigate the inner machinations of the Windows 10 operating system. If you’re unfamiliar with how to adjust your registry, contact ClearView IT. We can help your organization implement solutions that are designed to maximize the security of your infrastructure.

To learn more about Windows 10 and network security, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Windows 10 Facebook Business Continuity Disaster Recovery Passwords Holiday Covid-19 IT Support Browser Apps Managed Service Windows 10 Miscellaneous Cloud Computing Outsourced IT Internet of Things Managed Service Provider Data Management Remote Work Government Saving Money Operating System Workplace Strategy Managed IT services Networking Gadgets Windows Artificial Intelligence Remote Server Information WiFi Bandwidth Encryption Mobile Device Management App Business Technology Virtualization Blockchain Spam Employee/Employer Relationship Budget Gmail Office Apple History Two-factor Authentication Information Technology Office 365 Access Control Analytics Data Security Wi-Fi Cybercrime BDR Big Data Health Conferencing Hacker Remote Computing Save Money Patch Management Vendor Compliance Voice over Internet Protocol Remote Monitoring Help Desk Cost Management IT Management Hacking Employer-Employee Relationship Training Document Management Hiring/Firing Data storage Money Outlook Password Customer Service Unified Threat Management Firewall Applications Augmented Reality Word Project Management Mobile Office BYOD Vulnerabilities IBM Computing Website Managed Services Vendor Management Hard Drive Search... Best Practice Retail Data loss Legal Alert User Update Travel Sports Social SaaS Virtual Reality DDoS Data Breach Windows 11 Social Engineering Chrome Cryptocurrency Paperless Office Antivirus Black Market Maintenance Cleaning iPhone Education Cortana Robot Remote Workers Content Filtering Monitoring Mobile Computing Windows 7 Free Resource Healthcare Router Websites Marketing Mobility Running Cable Meetings How To The Internet of Things YouTube Twitter Storage Google Maps Scam Law Enforcement Laptop End of Support Printer VPN Holidays Notifications Managed IT Digital Unified Communications Virtual Assistant Virtual Desktop Google Docs Cooperation Experience Bluetooth Taxes Video Conferencing Distributed Denial of Service Office Tips Virtual Machines Private Cloud Processor Memory Computer Repair Professional Services Disaster Physical Security PowerPoint Politics Administration Machine Learning Settings Lithium-ion battery Managed Services Provider Presentation Multi-factor Authentication Start Menu Specifications Solid State Drive Downloads IT Consultant Computer Care Virtual Private Network Processors Vulnerability Saving Time Current Events Customer Relationship Management Chromebook Software as a Service Drones Co-Managed IT Data Protection Computers Bitcoin Solutions Entertainment Automobile Telephone Images 101 Integration Display How To Microchip Wireless Technology Excel eWaste Flexibility Employees Downtime Avoiding Downtime Tech Terms Hack Identity Theft HIPAA Safety SSID Telephone System Regulations Scalability Directions Backup and Disaster Recovery Web Server Media Development Employer/Employee Relationships Virtual Machine Administrator SharePoint Text Messaging Content Proactive IT Digital Payment Desktop Worker Accountants Reviews Optimization Smart Technology Bring Your Own Device Electronic Medical Records Business Owner Access Database 2FA Teamwork Data Storage Hypervisor Time Management Music Public Cloud Equifax Shopping Medical IT Health IT Staffing SQL Server Audit Spyware Tactics IP Address Hard Drive Disposal Paperless PCI DSS Licensing Botnet Username File Sharing Micrsooft Startup Freedom of Information Gig Economy Humor Supply Chain Rental Service Redundancy Inbound Marketing Azure Navigation Flash Cache Addiction email scam Business Communications Internet Service Provider Regulations Compliance Managed IT Service Telephone Systems Unified Threat Management Business Growth Workers Mobile Security Legislation Competition News Memes Workplace User Tip Recovery Printing Evernote Electronic Payment Network Management CCTV Human Resources Net Neutrality Financial Data LiFi Banking Touchscreen Google Wallet Entrepreneur Documents Deep Learning Emails Application Computer Malfunction Fake News Risk Management IT Scams Messenger Emergency Proxy Server Vendor Mangement Service Level Agreement Phone System Computing Infrastructure Google Apps Business Intelligence Telework Business Metrics Management Hosted Solution Samsung Device security Securty Uninterrupted Power Supply Wireless Headphones Webcam Microsoft Excel Smartwatch Communitications Microsoft 365 Cables Books Tech Language Business Mangement Going Green Domains Society Business Cards Procurement FinTech Error Tablets Monitors Computer Accessories Visible Light Communication CES IT Assessment Point of Sale Reading Bookmark Value Google Calendar Term Download Windows 8 Supercomputer Piracy Supply Chain Management Organization Cyber security Shortcuts Virus HTML Displays Nanotechnology Public Speaking Advertising Motion Sickness Smart Devices Relocation Browsers Comparison Google Play Streaming Media Work/Life Balance Google Drive Upload Tech Support Software License Remote Working Keyboard AI Trend Micro Be Proactive Social Network Corporate Profile Screen Reader Hard Drives Digital Security Cameras Electronic Health Records Transportation Knowledge Data Analysis Wasting Time In Internet of Things Television Security Cameras Telephony Trends Employer Employee Relationship Mobile Technology intranet Shortcut eCommerce Modem Workplace Strategies Hacks Customer Resource management Troubleshooting Wireless Network Congestion Cabling Devices Writing Tablet Heating/Cooling G Suite Tip of the week Videos Environment Surveillance Reliable Computing Fileless Malware Managing Costs Mouse Windows XP VoIP Gamification Tracking Company Culture Social Networking

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?