Alltech IT Solutions Blog

This Year’s CES Was All About Surveillance Technology

This Year’s CES Was All About Surveillance Technology

Held from Sunday, January 5 to Friday, January 10, 2020, this year’s Consumer Electronics Show took place in Las Vegas, Nevada. This event is an annual opportunity for startups and major companies alike to showcase their newest consumer-focused products. However, this year’s show has many security experts expressing sincere and legitimate concerns.

These concerns primarily come from the prevalence of devices that could potentially create very serious privacy and security issues. We’ll explain.

CES Served as a Platform for Surveillance Technology

This year, a huge variety of security-focused devices were showcased. Unfortunately, the way they were showcased gave pause to many security experts.

Their worries were primarily focused on the opportunity that these devices (which included smart cameras, interactive speakers, and fitness trackers) could be used as a means to invade someone’s privacy -- not to mention the idea that the smart cameras and their advanced facial recognition capabilities could potentially set a dangerous precedent. Of course, it doesn’t help that the past year or so has been filled with revelations about undermined privacy. The Amazon division that creates the Ring security cameras had a “Ring House” to demonstrate the capabilities of their devices, more or less immediately following reports of these very devices being hijacked and used to harass children.

It was only after receiving backlash that the company made a CES announcement that camera owners could also change their privacy settings to prevent Ring/Amazon from sending data over to the police without the user’s consent. One of their competitors, Wyze Labs, had announced a data breach just after Christmas that impacted 2.4 million customers and was then named as an honoree in CES’ innovation awards.

Sunflower Labs showcased a home drone security system, which would automatically track anyone who entered your property with an automated drone and send a live stream to your mobile phone. Their chief executive made a point of addressing security concerns, stating that the drone was better for your neighbor’s privacy… after all, the drone is only looking down at your property specifically. 

Privacy Concerns of Such Devices

Hopefully, it is apparent why regulators and privacy advocates aren’t totally enthused about such devices, especially when the security protecting them has historically been questionable at best. Most of these experts agree that some level of regulation is likely to come to these manufacturers to help make these devices more secure for the end user.

It must also be said that these topics were also discussed at CES, and moderators have noticed a greater acceptance of responsibility coming from companies to protect data and a shift in their view of themselves--away from owners of consumer data, and more of a view as caretakers.

Unfortunately, some of the other practices at CES contradicted this, like facial recognition being available as a sort of sign-in tool. CEO of the Consumer Technology Association (which puts on CES each year) Gary Shapiro defended these practices, saying that, “You’re opting in,” and “If you want to do it, you’ll have an opportunity to do it.” However, Executive Director Cindy Cohn of the Electronic Frontier Foundation, held a very different view: “There is a risk treating this as an individual decision... That’s not really fair or right to do to people. We need to fix the policies.”

There does seem to be some momentum toward doing so, as well, with various states restricting (or, to be more accurate, banning) the use of facial recognition technology in a variety of applications. Time will only tell.

Of course, this is also important to your business as well, despite the focus on consumer electronics. After all, if an employee has a vulnerable device, like the hottest new wearable, your network could be affected. It is important that you accept this possibility, and take the necessary steps to mitigate these risks.

Alltech IT Solutions can help. Reach out to us to start a conversation by calling 954-628-3770.

Four Ways Managed Services Can Help Optimize Your ...
Tip of the Week: Doing More With the Windows Key


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, February 27 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Training Live Streaming Streaming Media Cables Going Green Compliance Windows 7 Emergency Leadership Automation Vulnerability Employees Users Virtual Assistant Collaboration Security Cameras Windows Android Hacker Help Desk Efficiency Project Management Upgrade Artificial Intelligence Biometrics Multi-Factor Authentication DDoS Virtualization disposal Apps Entertainment Benchmarks SSD Data Management Congratulations Instagram Multi-Factor Security Government Tactics Scams Budget Remote Support Tip of the week Information Server HaaS Mobile Security Vendor Hybrid Cloud Shadow IT Productivity eCommerce Profiles Router Browser Tech Terms Botnet Inventory Software Financial Tip of the Week Telephone Systems Employer Employee Relationship Retail Microsoft Teams Ink Batteries Business Technology RAM Mobile Device Management Authentication Mobile Devices Emoji File Management Mobility Display National Security WhatsApp Edge Maintenance Ransomware Analytics Comparison Privacy Saving Money Microsoft Office 365 Yahoo Remote Control Profitability Customer Service Social Media User Tips Millennials Video Games Managed Service Provider Telecommute Data Breach Current Events Fleet Management Technology Tips Dongle Paperless Office Backup Productivity Marketing Mobile Hosted Solution Bring Your Own Device Bitcoin Trends Sales Network Attached Storage Cybercrime Wearables Social Network Hard Drive Remote Monitoring Connectivity Dark Web Health Hard Disk Drive Printer Server Unified Communications Innovation Printer Business Computing Travel Managed IT User Security Hackers Update Eliminating Downtime Webcam Threats Spam Telephony Smartphone Value Data Co-Managed IT BYOD Printers eWaste Touchscreen Solid State Drive Politics Net Neutrality Recovery Internet Explorer Staffing Windows XP Sports Access Control Hosted Desktop Wireless Internet Facebook Data loss BDR Microsoft Office News instant Messaging Video Taskbar Hardware Scheduling Scalability Law Enforcement Scam Wireless Email Managed Service Communication Server Management Environment Licensing Database How To Gadget Two-factor Authentication Website Outlook Internet of Things Payment A.I. VPN Business Management Office Bandwidth Spyware Dark Data Storage Office Tips Human Resources Workers Hosted Solutions Apple VoIp Windows 10 Payment Cards Cybersecurity Phone System Tech Support Updates Paper Small Business File Sharing Regulation Miscellaneous Telecommuting Vulnerabilities Files Cryptocurrency Cleaning Google Unified Threat Management Google Maps Data Security Voice over Internet Protocol Business Continuity Blockchain Managed IT Service Chrome OS Remote Computing Cortana Education Mobile Device Shortcut Websites Network Microsoft Lead Generation Smart Technology The Internet of Things Employer-Employee Relationship Troubleshooting Gaming Console G Suite Cloud Networking Threat Laptop Telephone System Alert Patch Management Risk Management e-waste Data Recovery Virus Windows Server 2008 R2 Physical Security Copy Alerts WiFi Distribution Workplace Tips Synergy Operating System Network Security Managed IT Services IT Support Amazon Data Protection IT Disaster Recovery Knowledge Plug-In Wi-Fi E-Commerce Document Management Insurance Automobile HIPAA App IT budget Analysis Cloud Computing Thank You Malware HP Mobile Office WannaCry Gadgets Computer Healthcare Chrome Best Practices Movies Twitter Wireless Charging Business Intelligence Computer Care Cost Management Search Office 365 IT Management User Tip Authorization Online Shopping Digital Content Filtering Personal Information Password Autocorrect GDPR Technology Encryption Spotify Tablet Humor Vendor Management Error Freedom of Information Antivirus IaaS Conferencing Tech Term Communications Internet Applications VoIP Employee-Employer Relationship Television Printing Downloads Managing Stress CrashOverride Battery Safety Big Data Holiday Backup and Disaster Recovery Processors Paste iPhone Samsung Medical IT Smartphones Excel Business IT Support Cabling IT Services Memes Processor Quick Tips Proactive IT Remote Monitoring and Management Access Firewall Virtual Private Network Phishing Specifications Time Management Security Customer Relationship Management Email Management Hard Drives Hiring/Firing PowerPoint Google Drive SaaS Recycling Company Culture Hacking Settings Credit Cards Staff Voice over IP Holidays Reporting Data Backup Gmail Certification Information Technology Managed IT Services Outsourced IT Avoiding Downtime Computers Spam Blocking Passwords Money Work/Life Balance Managed Services Provider Machine Learning Save Money OneNote Word Worker Windows 10 Electronic Health Records