Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Accidentally Gifting a Security Breach?

Are You Accidentally Gifting a Security Breach?

The holidays are a time filled with good food, visits from dear friends and family, and exchanging gifts with those you care about. However, to keep the season bright and merry, you need to be a little cautious during your next gift exchange, as many gifts can present some unexpected risks to your recipient’s security. Be mindful if you see the following items on someone’s wish list.

Digital Assistants and Smart Home Hubs
These little devices have made a splash as a useful household appliance, answering a user’s questions and controlling their various media. However, these nifty gizmos are always listening--literally. These devices rely on microphones that automatically activate, meaning that they hear everything you have to say. Imagine what a cybercriminal could do with the information they extract from them.

What’s worse, many of these devices now also come equipped with cameras, allowing a cybercriminal to effectively invade your privacy from anywhere.

While it may be a neat idea to take control of one’s environment through technology, it provides cybercriminals with the opportunity to take advantage of these devices as they victimize you, along with your family or staff. These devices can be used to spy on you and collect enough information to piece together your daily routine--invaluable intel for the criminal class. It’s important to keep this in mind if you are purchasing these devices for young children. Although Google and Amazon want to be on top of their security, it’s important to consider the lack of security awareness kids might have.

Connected Toys
While many of these devices may seem like they appeal to an older demographic, there are plenty of toys and games for children that are getting smarter. This also increases their creepiness factor, as hackers could use some toys--such as a Toymail Talkie--to communicate directly with children. Other connected playthings could provide hackers with details about a child’s life that are far too intimate. Edwin the Duck, a connected bath toy, could be used to extrapolate how often a child is bathed and when they are put to bed.

Smart Appliances
Of course, adults can have toys of their own in the form of appliances, and they are more and more frequently being built with smart capabilities included. We’re talking about wearables like fitness trackers and Internet of Things devices. Basically anything that connects to the Internet that isn’t a traditional computer or laptop would fall into this category. What isn’t always included is any sufficient security to keep these appliances from being made a part of a botnet. Furthermore, like digital assistants, these devices can easily collect data based on the activity around them.

DNA Testing Kits
This one may come as a surprise to many, but those kits that you send away with a vial of your spit may be the next major cause of privacy issues. After all, the product itself requires the most unique piece of personally identifiable information you have: your DNA. This specific data can quickly become valuable, especially for research purposes.

The agreements that you have to sign in order to use these services often have terms that grant the company permission to do as they will with your genetic data--which includes sharing a digitized version of this data with those who are willing to pay. While the Genetic Information Nondiscrimination Act of 2008 forbids the use of genetic data as a justification for discrimination-or firing someone because they have a predisposition to a condition-this kind of discrimination would be awfully hard to prove.

While the holidays should be a time of happiness, few things can put a damper on that happiness quicker than a security breach of your data. Mozilla has helpfully created a list of potentially risky products for consumers to reference as they do their holiday shopping.

So, what do you think? Is getting a good deal on an item for someone special worth risking a data breach? Let us know in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Hackers Malware Business Internet Business Computing Hosted Solutions Computer Microsoft Software Backup Windows 10 Ransomware Network Security Android Mobile Devices Smartphone IT Services User Tips Data Management Hardware Google Small Business Productivity Windows Browser Server Cloud Computing Gmail Data Business Continuity App Encryption Facebook Office 365 Upgrade Efficiency Smartphones Saving Money Data Recovery Artificial Intelligence Internet of Things Managed Service Provider Phishing Word Tip of the week Business Management Managed IT Services Remote Monitoring Innovation Workplace Tips Data Backup Office Tips Government IT Support Outsourced IT Infrastructure Microsoft Office Disaster Recovery Big Data Spam Social Media Apple Firewall Settings Customer Service Content Filtering Passwords IT Support Two-factor Authentication Robot Risk Management Productivity IT Management Employer-Employee Relationship Antivirus Cybersecurity Tech Term Chrome Data storage WiFi Money Communication Miscellaneous Windows 10 Tablet HIPAA Apps Customer Relationship Management Vulnerability Network Wi-Fi Hacking Storage Holiday VPN Hosted Solution Mobile Security Data Security Presentation Hacker Avoiding Downtime Virtual Private Network YouTube communications End of Support Office Server Management Wireless Technology Recovery Printing Managed IT Services Telephone Systems Save Money Website Virtual Reality Computing Maintenance Google Drive SaaS LiFi Unified Threat Management Analytics Augmented Reality Monitors Safety Business Technology Data loss Bandwidth BYOD Automation Outlook The Internet of Things Search Mobile Device Administration VoIP IBM Password Wireless Scam Mouse Google Calendar telephony Best Practice Retail Net Neutrality User Solid State Drive Router How To Remote Computing Cortana Fraud Networking Legislation Heating/Cooling Business Growth IT service Applications Social Engineering Competition FCC Current Events Hard Disk Drive Downtime Modem Firefox 5G Legal Comparison Dark Data Servers Alt Codes Politics BDR Cybercrime IT Technicians Title II Going Green Collaboration Cookies Knowledge Hotspot Techology Marketing Specifications Document Management Typing Tech Support Google Maps Mirgation How To IP Address Online Mail Merge File Sharing Nanotechnology Unified Communications Samsung Experience Language Network Congestion Unified Threat Management Operating System Black Friday Identity Theft Statistics Cryptocurrency Websites Running Cable Chatbots Mobile Office Microsoft Excel Address Virtual Desktop Quick Tips Computing Infrastructure Computers Hard Drives User Error Cyber Monday Bluetooth Bitcoin Laptop Identity Mobile Device Management Blockchain Information Technology Corporate Profile VoIP Alerts Display Refrigeration Printer Google Docs Smart Technology Windows 8 Halloween Public Speaking Lithium-ion battery Permissions Google Wallet WannaCry Time Management Licensing Access Control Distributed Denial of Service Digital Payment Cabling Scary Stories Compliance Drones Network Management Fun Cooperation Undo SharePoint Managed IT Service Managed IT Social Sports Regulations Application Lenovo Gadgets Digital Education Computer Care Touchscreen Deep Learning Staff Virtualization Downloads Humor Break Fix Shortcut Hacks Disaster Social Networking Vendor Management Superfish Budget Users Spyware sip Training Bring Your Own Device Wearable Technology Writing Multi-Factor Security Dark Web Patch Management Automobile Uninterrupted Power Supply Buisness Motherboard IT solutions Paperless Office Staffing Gadget Mobile Computing Administrator Personal Information Web Server GPS Computer Repair Cameras Processors Tracking Health CCTV Alert Electronic Medical Records Travel Screen Reader G Suite Notifications Supercomputer Botnet Upgrades Domains Motion Sickness Smart Tech Taxes Crowdsourcing IT Budget Machine Learning 3D Printing Connectivity Update Emergency IT Consultant Relocation Unsupported Software Chromebook Meetings Cleaning Private Cloud Mobile Data Emoji Webcam Work/Life Balance Error Black Market Point of Sale Law Enforcement Physical Security Twitter CrashOverride