ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Managed IT Services Data Recovery Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Facebook Business Continuity Windows 10 Covid-19 Disaster Recovery Passwords Holiday Managed Service Windows 10 IT Support Apps Browser Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Gadgets Workplace Strategy Artificial Intelligence Managed IT services Networking Windows App Server Virtualization Information Remote Spam Bandwidth Business Technology WiFi Blockchain Encryption Mobile Device Management Office Apple Two-factor Authentication History Information Technology Employee/Employer Relationship Office 365 Budget Gmail Access Control Data Security Health BDR Analytics Cybercrime Wi-Fi Conferencing Big Data Help Desk Hacking Cost Management Patch Management Employer-Employee Relationship Vendor Document Management Hacker Remote Monitoring Save Money Remote Computing Voice over Internet Protocol Compliance IT Management Training Search... Best Practice Applications Retail Legal Alert Data storage Project Management Vulnerabilities Money Hiring/Firing Outlook Customer Service Unified Threat Management Firewall Password Mobile Office Augmented Reality Managed Services Word BYOD Data loss IBM Website Computing Vendor Management Hard Drive Update The Internet of Things Running Cable YouTube Twitter Data Breach Storage Law Enforcement Laptop End of Support Paperless Office Antivirus Printer Maintenance Windows 11 Monitoring User Sports Travel Healthcare Social Websites SaaS DDoS Virtual Reality Remote Workers Social Engineering Meetings Mobility Cryptocurrency Black Market Chrome Windows 7 Free Resource iPhone Cleaning Google Maps Education Cortana Robot Scam Content Filtering How To Mobile Computing VPN Router Marketing Drones Managed IT Chromebook Customer Relationship Management Digital Virtual Assistant Automobile Co-Managed IT Employees Entertainment Taxes Avoiding Downtime How To Holidays Wireless Technology Microchip Flexibility Processor eWaste Cooperation Physical Security Downtime Video Conferencing Hack Safety Identity Theft Virtual Machines Notifications HIPAA Unified Communications Computer Repair Multi-factor Authentication Virtual Desktop Google Docs Start Menu Professional Services Experience Computer Care Bluetooth Downloads Distributed Denial of Service Office Tips Vulnerability Saving Time Private Cloud Memory Software as a Service Managed Services Provider Data Protection Computers Bitcoin Disaster Virtual Private Network Telephone Politics Current Events Machine Learning PowerPoint Settings Lithium-ion battery Administration Excel Solutions Solid State Drive Presentation Specifications Processors Tech Terms Images 101 IT Consultant Integration Display Telephone System AI Regulations Trend Micro Be Proactive Reading Monitors Directions Digital Security Cameras Visible Light Communication Backup and Disaster Recovery Electronic Health Records Web Server Transportation Digital Payment Desktop Wasting Time SharePoint Windows 8 Content Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Computer Accessories Relocation Public Speaking Displays Videos Advertising Access Database Surveillance Public Cloud Managing Costs Streaming Media Work/Life Balance Tech Support Time Management Keyboard Health IT Equifax SSID Hard Drives Audit Media Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Username File Sharing Virtual Machine In Internet of Things intranet Shortcut Network Congestion Redundancy Reviews Startup Optimization Freedom of Information Smart Technology Wireless Hacks email scam Teamwork Reliable Computing Heating/Cooling Writing Navigation 2FA Environment Cache Addiction Unified Threat Management Data Storage Workers Mobile Security Hypervisor Windows XP Troubleshooting Social Networking User Tip Shopping Legislation News Medical IT CCTV SQL Server Scalability Printing Evernote Paperless Network Management Touchscreen PCI DSS Licensing Administrator Text Messaging Proactive IT Emergency Proxy Server Gig Economy Emails Humor Computer Malfunction Fake News Supply Chain Bring Your Own Device Computing Infrastructure Azure Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Management Regulations Compliance Samsung Device security Managed IT Service Business Owner Music Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Staffing Business Cards IP Address Tech Human Resources Business Mangement Going Green Net Neutrality Error Financial Data Tablets Botnet Micrsooft Bookmark Risk Management IT Scams Rental Service Supercomputer Piracy Flash Google Calendar Term Google Apps Download Virus Telework HTML Inbound Marketing Telephone Systems Business Growth Competition Browsers Smartwatch Nanotechnology Communitications Motion Sickness Microsoft 365 Cables Recovery Software License Comparison Google Play Google Drive Upload Procurement Social Network FinTech LiFi Banking Entrepreneur Google Wallet Application Deep Learning Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Electronic Payment Point of Sale Documents Messenger Employer Employee Relationship Mobile Technology Value Television Security Cameras Business Intelligence Telephony Trends Supply Chain Management Customer Resource management Organization Cabling Devices Cyber security Shortcuts Business Metrics Hosted Solution Securty Books Phone System Fileless Malware Tablet Smart Devices G Suite Tip of the week Tracking Company Culture Domains Language Mouse Society VoIP Gamification Remote Working

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?