ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday IT Support Windows 10 Managed Service Apps Browser Miscellaneous Cloud Computing Outsourced IT Remote Work Data Management Internet of Things Managed Service Provider Government Saving Money Operating System Networking Gadgets Windows Artificial Intelligence Managed IT services Workplace Strategy Business Technology Mobile Device Management Remote App Blockchain Virtualization Spam Server Information WiFi Bandwidth Encryption Budget Gmail Office Employee/Employer Relationship History Two-factor Authentication Apple Office 365 Information Technology Big Data Health Conferencing Access Control Data Security Analytics Cybercrime BDR Wi-Fi IT Management Help Desk Training Hacking Employer-Employee Relationship Cost Management Voice over Internet Protocol Hacker Patch Management Document Management Remote Computing Vendor Save Money Remote Monitoring Compliance IBM Website BYOD Computing Search... Best Practice Vendor Management Hard Drive Data loss Retail Alert Legal Hiring/Firing Money Mobile Office Outlook Customer Service Data storage Password Managed Services Unified Threat Management Firewall Applications Project Management Augmented Reality Word Vulnerabilities Cleaning Mobile Computing Healthcare Meetings Mobility Windows 11 Robot Router Marketing Running Cable Google Maps Scam The Internet of Things YouTube Storage VPN Laptop Twitter Update Law Enforcement End of Support Remote Workers Printer User Paperless Office Windows 7 Data Breach Antivirus Sports Free Resource Social SaaS DDoS Maintenance Chrome How To Travel Virtual Reality Social Engineering iPhone Cryptocurrency Education Cortana Monitoring Black Market Websites Content Filtering Presentation Vulnerability Specifications Software as a Service Politics Saving Time IT Consultant Processors Settings Data Protection Machine Learning Employees Avoiding Downtime Bitcoin Customer Relationship Management Computers Holidays Co-Managed IT Solid State Drive Telephone Entertainment Cooperation Chromebook Video Conferencing Drones Excel Wireless Technology Virtual Machines Tech Terms Automobile Computer Repair eWaste Managed IT Professional Services Digital How To Downtime Microchip Virtual Assistant HIPAA Flexibility Safety Taxes Managed Services Provider Virtual Desktop Hack Experience Identity Theft Notifications Virtual Private Network Unified Communications Processor Physical Security Google Docs Current Events Bluetooth Distributed Denial of Service Disaster Solutions Office Tips Memory PowerPoint Start Menu Private Cloud Images 101 Computer Care Integration Multi-factor Authentication Administration Downloads Display Lithium-ion battery Flash Trend Micro Service Level Agreement Entrepreneur Computing Infrastructure Uninterrupted Power Supply LiFi AI Webcam Digital Security Cameras Documents Telephone Systems Electronic Health Records Management Application Business Growth Transportation Device security Business Mangement Business Intelligence Microsoft Excel Phone System Tablets Wasting Time Wireless Headphones eCommerce Going Green Modem Business Cards Tech Videos Supercomputer Securty Banking Surveillance Error Google Wallet Google Calendar Virus Supply Chain Messenger Bookmark Domains Deep Learning Managing Costs Motion Sickness Term Download SSID Piracy Computer Accessories Google Drive Media Business Metrics Development Hosted Solution Employer/Employee Relationships HTML Comparison Nanotechnology Workplace Books Browsers Virtual Machine Reviews Google Play Language Optimization Upload Society Software License Knowledge Corporate Profile Telephony 2FA Employer Employee Relationship Social Network Public Speaking Teamwork Television Hypervisor Screen Reader Visible Light Communication Scams Cabling Streaming Media Reading Data Storage Data Analysis Monitors Shopping G Suite Security Cameras Trends Keyboard Windows 8 Medical IT Mobile Technology Tablet VoIP Paperless Tracking Customer Resource management Hard Drives SQL Server Devices Mouse Licensing intranet Advertising Tip of the week Cables Relocation PCI DSS Fileless Malware Displays Gig Economy Web Server Wireless Work/Life Balance Humor Gamification Shortcut Tech Support Company Culture Troubleshooting Business Communications Digital Payment Internet Service Provider Telephone System Heating/Cooling Azure Regulations Environment SharePoint Managed IT Service Backup and Disaster Recovery Social Networking Point of Sale Worker Windows XP Regulations Compliance Directions Memes Content Desktop Access In Internet of Things Time Management Human Resources Shortcuts Public Cloud Hacks Net Neutrality Electronic Medical Records Network Congestion Accountants Database Reliable Computing Financial Data Writing Risk Management IT Business Owner Audit Spyware Google Apps Be Proactive File Sharing Health IT Equifax Tactics Hard Drive Disposal Redundancy Scalability Telework Administrator Smartwatch Staffing Text Messaging Communitications Username Proactive IT Microsoft 365 Cache Freedom of Information Unified Threat Management Workplace Strategies Workers Bring Your Own Device Procurement IP Address Startup Addiction email scam FinTech Navigation CES CCTV IT Assessment Music Mobile Security Inbound Marketing Printing News Touchscreen Supply Chain Management User Tip Value Legislation Cyber security Network Management Emergency Organization Computer Malfunction Evernote Botnet Recovery Smart Devices Competition Vendor Mangement Fake News Smart Technology Samsung Rental Service Remote Working Proxy Server Micrsooft Emails Electronic Payment

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?