Are Your Smart Devices (Siri, Alexa, Google) Eavesdropping On You?

Picture of Hodgson Consulting & Solutions

Hodgson Consulting & Solutions

Have you ever had a conversation about a topic, and then later that day you start seeing news, ads, or updates about that subject, and said to yourself, “This can’t be a coincidence”?
Well, you’re probably right.
According to Norton, which you may remember as an antivirus software company and which now also owns LifeLock, your smart devices ARE listening to you because that’s their job.
However, you probably didn’t realize how much they are listening to you or what they do with the information they collect.
In this blog, you’ll see that your devices are listening to you, using, and distributing the information they get, and how you can protect yourself while still taking advantage of the features these smart devices offer.
A quick search of the terms for Siri (https://www.apple.com/legal/privacy/data/en/ask-siri-dictation/) advises you that when you use Siri and Dictation, your device will send other Siri data, such as:
These are just some of the highlights from their privacy policy, which is a lengthy 15 pages.
You’ve got to remember; the privacy policy isn’t there to protect you – it’s there to protect the companies that create them!
So, what do you do? Do you stop using smart devices, get rid of your phone, and build a house in the woods?
That’s probably a little extreme for most, so here are two things that actually make sense.
First, you can take some basic actions to disable a few of the “eavesdropping” features built into your smart devices. Norton (the antivirus people) has a three-step way to do that at: https://us.norton.com/blog/how-to/is-my-phone-listening-to-me
Second, you need to know that if your data is going to be stolen, it’s probably NOT through Alexa, Siri, or Google.
Most data breaches come from malicious links in e-mails, old, unpatched security vulnerabilities in software, and unsuspecting employees taking actions they shouldn’t be taking.
These risks can be mitigated and monitored, and existing vulnerabilities can often be eliminated simply by having the right software updates installed.
While it’s a little weird that Apple may know that your favorite musician is actually Taylor Swift, it’s much worse if your business data gets stolen or locked down and you’re out of business until you pay ransom to hackers.

Share Post: