Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Voyage Technology can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Computer Google Phishing Email Workplace Tips IT Services Hosted Solutions Collaboration Users Workplace Strategy Ransomware Mobile Device Microsoft Quick Tips Small Business Cybersecurity Passwords Backup Saving Money Communication Data Backup Smartphone Managed Service Android Smartphones Productivity Upgrade VoIP Business Management Mobile Devices communications Disaster Recovery Data Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Gadgets Cloud Computing Information Holiday Covid-19 Miscellaneous Training Server Managed Service Provider Remote Work Outsourced IT Spam Employee/Employer Relationship Compliance Encryption Office Windows 10 Government IT Support Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Managed Services Voice over Internet Protocol HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Healthcare Operating System Router Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device 2FA Managed IT Services Big Data Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Customer Service Free Resource Display Project Management Windows 7 Printer Paperless Office Infrastructure Microsoft 365 Monitoring Solutions Document Management Firewall Telephone Windows 11 Scam Data loss The Internet of Things Cooperation Excel Social Going Green Patch Management Save Money Remote Workers Settings Wireless Printing iPhone Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Vulnerabilities Cryptocurrency Data Privacy User Tip Modem Hacking Presentation Computer Repair Mobile Security Images 101 Processor Mobility Multi-Factor Authentication Virtual Desktop LiFi Wireless Technology Data storage Smart Technology Outlook Machine Learning Employees Money Saving Time Integration Word Humor Managed IT Service Maintenance Antivirus Sports Downloads Mouse Holidays Licensing Data Storage Safety Supply Chain Entertainment Administration Video Conferencing Managed Services Provider Professional Services Virtual Machines Telephone System Robot Cost Management Net Neutrality Alt Codes Content IBM SQL Server Technology Care Wearable Technology Comparison Financial Data Health IT History Downtime Unified Threat Management Motherboard Business Communications IT Hosted Solution Assessment Scams Permissions Smartwatch Unified Threat Management Directions Procurement Typing Azure Hybrid Work Tech Human Resources Network Congestion Specifications Telework Cyber security Communitications Internet Exlporer Competition Cables Knowledge Fraud CES Google Drive User Error Microchip Supply Chain Management Username Term Google Apps 5G Black Friday FinTech Point of Sale IT Assessment Unified Communications Database IT Maintenance Experience Google Docs Flexibility Bitcoin Network Management Value Business Intelligence Running Cable Tech Support IT Technicians User Shortcuts Monitors Cyber Monday Organization Google Wallet Proxy Server Cookies Smart Devices Tactics Ransmoware Hotspot Digital Security Cameras Remote Working Windows 8 IP Address Memory Vendors Laptop Websites Mirgation Google Play Be Proactive Drones Data Breach Nanotechnology Electronic Health Records Addiction Workforce Electronic Medical Records Language Videos SharePoint Management Wasting Time Threats Halloween Chatbots Recovery Security Cameras Workplace Strategies Writing Distributed Denial of Service Lenovo Trend Micro Screen Reader Hard Drives Software as a Service Service Level Agreement Domains Meta Virtual Reality Computing Infrastructure Hacks Server Management Managing Costs Amazon Scary Stories Private Cloud Identity SSID Fun Superfish Bookmark eCommerce Identity Theft Smart Tech Refrigeration Surveillance Deep Learning Download Public Speaking Virtual Assistant Outsource IT Twitter Alerts Lithium-ion battery Virtual Machine Environment Error Media Medical IT Social Engineering Break Fix Entrepreneur Reviews Browsers Education Connectivity Development Upload Transportation Small Businesses Remote Computing Mobile Computing Social Network Hypervisor Displays Multi-Factor Security Undo PowerPoint Search Dark Web Shopping Optimization Tablet IoT Best Practice Trends Employer/Employee Relationships Outsourcing Alert PCI DSS Managed IT Customer Resource management Buisness File Sharing Regulations Navigation Dark Data Google Calendar Workplace How To Microsoft Excel Gig Economy Legal Data Analysis IT solutions Star Wars Internet Service Provider Business Growth Gamification Teamwork Hiring/Firing Notifications Staff Regulations Compliance Travel Social Networking Application Evernote Paperless Legislation Google Maps Co-managed IT Cortana Techology Fileless Malware Memes

Blog Archive