Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Research by Mozilla Shows Today’s Cars are Terrible, in Terms of Privacy

Today’s cars, trucks, and sport utility vehicles are packed with features, many of which heavily lean on technology in order to operate. While these new vehicles and all their new capabilities are certainly appealing to today’s consumer, it needs to be said that one key aspect of technology has not been improved as these vehicles have been innovated upon.

That one key aspect? Security.

All Car Brands Were Found to Be Awful at Preserving Privacy and Security

Mozilla recently researched 25 car brands, all of which ranked terribly for privacy. Let’s summarize Mozilla’s findings briefly… and we apologize if this makes you reconsider your latest car purchase.

First Off, Mozilla Found that None of the Brands Met Their Minimum Security Standards

During their research, Mozilla found that—despite many brands publishing numerous privacy policies—none of them met the minimum standards that Mozilla expects, or at least, Mozilla couldn’t confirm that they did.

For instance, these cars contain a lot of personal information. Despite this, Mozilla was unable to confirm that this data was encrypted in any of the brands’ vehicles. Exacerbating this issue, most of the companies ignored their requests for more information outright, and those that did respond didn’t really answer their questions.

All of Them Collect Too Much Data, Most of Them Distributing It

Of the 25 brands that Mozilla examined, all of them collected more data than they needed in order to operate the vehicle’s features. That’s 100%, for those keeping track, that gathered personal information that wasn’t needed… and when you consider how many opportunities a modern car presents to collect data, there’s a lot of data that you might unwittingly be giving them. The fact that modern cars connect to a mobile device and can collect data from the services installed on it significantly increases the data that cars have access to, and that’s just the start.

Adding to the situation, most of the car companies—84%—also share the data they collect, with 76% selling it when they can. A little more than half (56%) will share this data with government officials by request—not court order, mind you, but just a request.

Drivers are Given Almost No Control Over Their Data

It’s important that consumers are given the ability to demand their data to be deleted. Unfortunately, 92% of the car companies that Mozilla examined wouldn’t allow drivers to do so… the only exceptions both being owned by a single company and only available in Europe, meaning that the General Data Protection Regulation applies, and they have to abide by deletion requests as a result. 

In Short, This Might Make You Want to Buy Used Until Car Companies Are Made to Do Better

Fortunately, when it comes to your business, you don’t have to compromise your security for added features and benefits. Not only can we help you get the most out of your technology, we can ensure that it is done with the security standards you need to remain safe.

Give us a call at 800.618.9844 to get started, or to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 08 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship BYOD Applications Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR Computing Hacker HIPAA Information Technology Website Health Analytics 2FA Office Tips Help Desk Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Big Data Managed IT Services Operating System Computers Router Risk Management Virtual Private Network Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel Remote Workers The Internet of Things Scam Telephone Data loss Social Free Resource Cooperation Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring End of Support Vulnerability Microsoft 365 Customer Service Vendor Management Cybercrime Solutions Physical Security Display Computer Repair User Tip Modem Mobile Security Virtual Desktop Processor Data storage LiFi Holidays Word Data Storage Outlook Supply Chain Smart Technology Machine Learning Video Conferencing Money Humor Managed Services Provider Saving Time Virtual Machines Professional Services Safety Maintenance Antivirus Managed IT Service Sports Mouse Downloads iPhone Licensing Administration Entertainment Vulnerabilities Data Privacy Robot Images 101 Customer Relationship Management Telephone System Multi-Factor Authentication Mobility Settings Wireless Cost Management Printing Content Filtering Hacking IT Management YouTube Meetings Presentation VPN Employees Cryptocurrency Wireless Technology Integration Username IP Address Google Docs Managing Costs Amazon Unified Communications Experience eCommerce Bitcoin Network Management SSID Black Friday Running Cable Tech Support Virtual Assistant Outsource IT Monitors Surveillance Database Google Wallet Virtual Machine Environment IT Technicians Recovery Media Proxy Server Reviews Cookies Hard Drives Windows 8 Medical IT Cyber Monday Laptop Websites Transportation Small Businesses Hotspot Development Tactics Domains Drones SharePoint Hypervisor Displays Mirgation Electronic Medical Records Shopping Optimization Nanotechnology Refrigeration PowerPoint Halloween Employer/Employee Relationships Outsourcing Language Writing Addiction Public Speaking Lenovo Management PCI DSS Lithium-ion battery Chatbots Navigation Virtual Reality Gig Economy Screen Reader Hacks Server Management Workplace Distributed Denial of Service Entrepreneur Scary Stories Private Cloud Teamwork Hiring/Firing Computing Infrastructure Identity Theft Fun Internet Service Provider Service Level Agreement Superfish Regulations Compliance Identity Deep Learning Evernote Paperless Twitter Bookmark Memes Smart Tech Undo Co-managed IT Error SQL Server Technology Care Alerts Education Social Engineering Net Neutrality Download Financial Data History Business Communications Remote Computing Browsers Smartwatch IT Connectivity Mobile Computing Scams Break Fix Azure Hybrid Work Tablet Search Procurement Upload Social Network Telework Cyber security Application Best Practice Tech Human Resources Multi-Factor Security Alert Buisness File Sharing Dark Data CES Communitications IoT Managed IT Cables Dark Web IBM Legal IT solutions How To Supply Chain Management Trends Customer Resource management FinTech Regulations Business Growth Term Google Apps Google Calendar Notifications Travel Data Analysis IT Assessment Star Wars IT Maintenance Microsoft Excel Techology Value Business Intelligence Staff Google Maps Cortana Flexibility Gamification Organization Social Networking Alt Codes Shortcuts Legislation Downtime Unified Threat Management Fileless Malware Digital Security Cameras Smart Devices Competition Ransmoware Unified Threat Management Memory Vendors Wearable Technology Hosted Solution Remote Working Content Health IT Data Breach Motherboard Typing Google Play Be Proactive Comparison Network Congestion Directions Videos Electronic Health Records Assessment Workforce Permissions Google Drive User Error Wasting Time Threats User Knowledge Trend Micro Security Cameras Workplace Strategies Specifications Point of Sale 5G Microchip Software as a Service Internet Exlporer Meta Fraud

Blog Archive