Voice Tech Vulnerability
Artificial Intelligence has silently taken over much of our daily lives and homes without most of us even realising it, with voice playing a lead role. While smartphones have already been part of our routine for a long time now, voice assistants are a new rage, assisting us in our day-to-day lives. When Apple introduced Siri to the world in 2011, it was hard to imagine the life that voice assistants would take on. The idea of having a conversation with a computer isn’t new. We’ve seen it every futuristic film but the problem is, this isn’t the future, it’s happening right now. We’ve gotten used to having voice command technology around and we trust it.
The media is rife with articles detailing the speed at which the technology has grown in sophistication and become more accessible, as well as the risks involved. As technology continues to make life easier for us, it does the same for hackers. We’ve rounded up 5 tips to help you stay secure.
Be Careful With What You Connect
Your voice assistant can be a hub for all your connected devices but choose carefully. Don’t make it easy for anyone with poor intentions to gain access to your door lock, surveillance camera, your calendar or address book as these can all be rich sources of information.
Regularly listen back to old commands and delete them. This is a good practice to get into to wipe the slate of any sensitive information. Your voice assistant may need to relearn these commands but luckily they’re a quick learner.
Be Careful With What You Share
There are so many things that you wouldn’t want your voice assistant to know. Passwords, bank account details, pin numbers, credit card information. The list goes on. Be careful with the information you share with your voice assistant.
Turn off The Microphone
The best way to safeguard yourself when discussing sensitive information is to ensure your voice assistant is turned off when you’re not using it.
Strengthen Your Passwords
Protect the service account linked to your device with a strong password. Use two factor authentication if available. This can prevent anyone who has access to the account from listening in remotely.