With the overwhelming popularity of always-listening devices including Amazon Echo, Google Home, and smartphones, you’ve probably heard stories of these devices joining in on conversations without being prompted. It might have even happened to you!
These devices are also not designed or built with security in mind, which often leaves them vulnerable if your home network is not securely configured.
Here are some tips to protect your private information, and conversations, from these always-listening devices:
- Review and delete voice recordings. Your device stores your search and activity history to create a customized experience. To protect your privacy you can review and delete these recordings from the device.
- Mute the microphone. You can mute the microphone to ensure that your device is not listening and recording when you are not using it. It won’t record until you turn the microphone back on.
- Don’t link accounts with sensitive information to your device. If you have any accounts containing personal or university information, don’t link those accounts to your device. This will prevent that information from being impacted by any potential breach.
- Change the settings to manually manage data stored by the device. Managing what data is connected with your account will give you more control over the information that is being stored and will make it easier for you to delete your history.
- Turn off your device when you’re away. If your device doesn’t have a power button, simply unplug it.
By creating habits to better control these always-listening devices, you can protect your personal information and prevent this modern twist on phishing.
ITS will continue to simulate phishing attacks and assign training to those most susceptible. If you believe you’ve been targeted, see Reporting a Phishing Message (How-to).
— Peter Lundstedt, ITS