Alltech IT Solutions Blog

This Year’s CES Was All About Surveillance Technology

This Year’s CES Was All About Surveillance Technology

Held from Sunday, January 5 to Friday, January 10, 2020, this year’s Consumer Electronics Show took place in Las Vegas, Nevada. This event is an annual opportunity for startups and major companies alike to showcase their newest consumer-focused products. However, this year’s show has many security experts expressing sincere and legitimate concerns.

These concerns primarily come from the prevalence of devices that could potentially create very serious privacy and security issues. We’ll explain.

CES Served as a Platform for Surveillance Technology

This year, a huge variety of security-focused devices were showcased. Unfortunately, the way they were showcased gave pause to many security experts.

Their worries were primarily focused on the opportunity that these devices (which included smart cameras, interactive speakers, and fitness trackers) could be used as a means to invade someone’s privacy -- not to mention the idea that the smart cameras and their advanced facial recognition capabilities could potentially set a dangerous precedent. Of course, it doesn’t help that the past year or so has been filled with revelations about undermined privacy. The Amazon division that creates the Ring security cameras had a “Ring House” to demonstrate the capabilities of their devices, more or less immediately following reports of these very devices being hijacked and used to harass children.

It was only after receiving backlash that the company made a CES announcement that camera owners could also change their privacy settings to prevent Ring/Amazon from sending data over to the police without the user’s consent. One of their competitors, Wyze Labs, had announced a data breach just after Christmas that impacted 2.4 million customers and was then named as an honoree in CES’ innovation awards.

Sunflower Labs showcased a home drone security system, which would automatically track anyone who entered your property with an automated drone and send a live stream to your mobile phone. Their chief executive made a point of addressing security concerns, stating that the drone was better for your neighbor’s privacy… after all, the drone is only looking down at your property specifically. 

Privacy Concerns of Such Devices

Hopefully, it is apparent why regulators and privacy advocates aren’t totally enthused about such devices, especially when the security protecting them has historically been questionable at best. Most of these experts agree that some level of regulation is likely to come to these manufacturers to help make these devices more secure for the end user.

It must also be said that these topics were also discussed at CES, and moderators have noticed a greater acceptance of responsibility coming from companies to protect data and a shift in their view of themselves--away from owners of consumer data, and more of a view as caretakers.

Unfortunately, some of the other practices at CES contradicted this, like facial recognition being available as a sort of sign-in tool. CEO of the Consumer Technology Association (which puts on CES each year) Gary Shapiro defended these practices, saying that, “You’re opting in,” and “If you want to do it, you’ll have an opportunity to do it.” However, Executive Director Cindy Cohn of the Electronic Frontier Foundation, held a very different view: “There is a risk treating this as an individual decision... That’s not really fair or right to do to people. We need to fix the policies.”

There does seem to be some momentum toward doing so, as well, with various states restricting (or, to be more accurate, banning) the use of facial recognition technology in a variety of applications. Time will only tell.

Of course, this is also important to your business as well, despite the focus on consumer electronics. After all, if an employee has a vulnerable device, like the hottest new wearable, your network could be affected. It is important that you accept this possibility, and take the necessary steps to mitigate these risks.

Alltech IT Solutions can help. Reach out to us to start a conversation by calling 954-628-3770.

Four Ways Managed Services Can Help Optimize Your ...
Tip of the Week: Doing More With the Windows Key


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 15 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

User Tips Workers Environment Managed IT Services Samsung Authentication Leadership Credit Cards Wi-Fi Virtual Reality Employee-Employer Relationship Saving Money IT Support Email Management Hiring/Firing Touchscreen Voice over Internet Protocol Two-factor Authentication Payment Cards Cybercrime Hardware Mobile Security Remote Work Scams Business Management Office Tips Telephone Systems Electronic Health Records Spam Blocking Customer Service Ransomware Windows XP Computers Millennials Movies Paste Outsourced IT Downloads Hosted Solutions Webcam Encryption Managed Service Emoji CrashOverride Recovery Database Management Remote Working Workplace Tips Trends Business Intelligence Maintenance Eliminating Downtime Tech Support Windows 7 Batteries Virtual Assistant Innovation Project Management Unified Threat Management Spam Virtualization Staffing Disaster Recovery Microsoft Office Document Management Internet Sports Virus Threats Hard Drive e-waste User Tip Smartphone Insurance Multi-Factor Authentication Email Error Backup and Disaster Recovery Employees Remote Monitoring and Management Cost Management Social Network Knowledge Employer-Employee Relationship Network Security Business Co-Managed IT Emergency Vendor Management Apple Cortana The Internet of Things Windows Content Filtering Mobility Windows 10 Reporting Server Management File Sharing Scalability Quick Tips Managed IT Services Shortcut Smart Technology Facebook Network Attached Storage Virtual Private Network Comparison HaaS IT budget Hosted Desktop Artificial Intelligence Data Backup Firewall Going Green Excel Android Customer Relationship Management Regulations Compliance Technology Tips Regulation Licensing Proactive IT Solid State Drive Operating System Lead Generation Television Phishing Router Healthcare Vulnerability Threat IaaS Printer Laptop Analytics Streaming Media Unified Communications Analysis Chrome Copy Access Computer Care Worker Wireless Internet Authorization Save Money Gmail Data loss G Suite Cloud Computing Data Recovery Productivity Telecommute Telecommuting Government Printing Dongle Specifications IT Services RAM HIPAA App Wearables Social Media Cryptocurrency Medical IT eWaste Internet Explorer Spotify Hard Drives Certification WannaCry Live Streaming Automation Computer Training Benchmarks Edge Remote Workers Patch Management Battery Microsoft Teams Net Neutrality Mobile Office User Security Data Breach Office 365 Websites Scam Remote Computing Money Video Games Files VoIp Communications Plug-In Gaming Console Sales Payment WhatsApp National Security Hosted Solution Tip of the week Remote Support Settings Managed IT Service Apps Taskbar Processor Connectivity Health Processors Remote Data Management Mobile Device Management Technology Freedom of Information Marketing HP Holiday Online Shopping Collaboration Printers Server Security Cameras OneNote Managed Services Provider GDPR Tactics Recycling Password Cables Antivirus Employer Employee Relationship Troubleshooting Holidays Cloud Applications Company Culture Users Shadow IT Meetings Outlook Managed IT Business Computing Access Control SaaS Browser BYOD Information VPN Wireless Thank You VoIP File Management Entertainment Cabling Video PCI DSS Covid-19 Best Practices Bandwidth Value Backup Upgrade Software IT Management Automobile Gadgets Avoiding Downtime Bitcoin Staff Tech Terms Remote Monitoring Instagram Dark Data Risk Management Physical Security Business Technology SSD Google IT Help Desk Biometrics Small Business Managing Stress Machine Learning Human Resources A.I. How To Mobile Personal Information Wireless Charging News Multi-Factor Security Tip of the Week Distribution Hackers Compliance Voice over IP Budget Alerts E-Commerce Synergy Botnet Internet of Things Humor Passwords Telephony Telephone System Congratulations PowerPoint Printer Server Microsoft Mobile Device Remote Control Word Yahoo Network Financial Twitter Autocorrect Profitability Windows 10 Vulnerabilities Windows Server 2008 R2 Amazon Data Profiles Time Management Managed Service Provider Memes WiFi BDR Efficiency Travel Paper Law Enforcement Google Maps Miscellaneous IT Support Malware Spyware Data Security Hybrid Cloud Bring Your Own Device Hacking Digital Display Tech Term Ink Politics Security Privacy Search Hacker Data Protection Fleet Management Google Drive Scheduling Smartphones Updates Blockchain Safety Conferencing Gadget Work/Life Balance Networking DDoS Mobile Devices Cleaning Business Continuity Information Technology Chrome OS Hard Disk Drive Storage Paperless Office Vendor eCommerce instant Messaging Cybersecurity Microsoft Office 365 Retail disposal Update Communication Productivity Tablet Big Data Inventory Current Events Education Dark Web Phone System Office Website iPhone Alert