• Skip to primary navigation
  • Skip to main content
  • About
  • Team
  • Industries
  • Products
  • White Papers
  • Case Studies
  • Portal
  • Pay Now

Advantage Technology

Advantage Tech logoAdvantage Tech logo light

Cybersecurity & Managed IT Service Provider

  • AI
    • AI
    • AI Agents & Automation Consulting
    • AI Fraud Detection
    • AI Inside Advantage.Tech
    • AI Managed IT & Service Desk
    • AI Security Customization
    • AI Tools & Platforms
    • AI Training & Workforce Enablement
  • Managed IT
    • Managed IT
    • Antivirus & Spam Filtering
    • Data Backup & Recovery
    • IT Help Desk
    • Maintenance & Support
    • Remote Monitoring & Management
  • Cybersecurity
    • Cybersecurity
    • Services & Solutions

      • Attack Surface Management (ASM)
      • Cloud Security
      • Continuous Compliance Monitoring
      • Data Loss Prevention (DLP)
      • Email Security
      • Encryption
      • Endpoint Security
      • Identity & Access Management (IAM)
      • Managed Detection & Response (MDR)
      • Multi & Two-Factor Authentication
      • Network Security
      • Security Information & Event Management (SIEM)
      • Security Operations Center
      • Web Security
    • Audits & Testing

      • Cyber Security Risk Assessments
      • Cyber Threat Intelligence
      • Digital Forensics & Incident Response (DFIR)
      • Penetration Testing
      • Vulnerability Management
    • Compliance

      • CMMC Compliance
      • CMMC 2.0 Requirements
      • Certification Audit Support
      • FedRAMP
      • FISMA
      • NIST 800-171
      • Readiness Assessment
      • RPO Support
      • 3PAO Support
  • Infrastructure
    • Infrastructure
    • On-Premises

      • Network Administration
      • Security Camera Installation
      • Server Consolidation
      • Server Installation & Maintenance
      • Server Migration
      • Structured Cabling
    • Cloud-Based

      • Cloud Migration
      • Cloud Hosting
      • Colocation Data Center
      • Virtualization
    • Phone & Telecom

      • PBX Phone Systems
      • SIP Phone Systems
      • Unified Communications (UCaaS)
      • VoIP Phone Systems
    • Data Centers

      • Compliance
      • Management
      • Relocation
      • Structured Cabling
  • Consulting
    • Consulting
    • IT Staff Augmentation
    • GSA Capabilities & Schedule 70
    • Security Awareness Training
    • Technical Support
    • Virtual CIO
    • Virtual CISO
  • Products
    • Products
    • Computers
    • Networking
    • Security Cameras
    • Servers
    • Telecommunications
  • About
    • About
    • Areas Served
    • Blog
    • Careers
    • Case Studies
    • Contact
    • Events
    • Industries
    • News
    • Team
  • Portal
  • Pay Now
  • Request Consultation

Is Big Brother Watching (Or Listening)?

May 30, 2017 · Advantage Technology · Cybersecurity

Within a few years, your house could be loaded with things that see what you buy, hear what you’re saying and know where you’re shopping.

In the last few years, digital assistants have become all the rage. Amazon has it’s Echo powered by Alexa, Alphabet has Google Home, and even Microsoft has partnered with Samsung to deliver Cortana into everyone’s living room. On top of that, you have your smartphones that records everywhere you’ve been and more and more people are putting cameras all over their house and office that send video back to Cloud. It’s easy, convenient and ubiquitous. But should you be worried about what data is being sent to mega-corporations or is the convenience worth it?

Most of the major players in this space do give you controls over what is recorded and the ability to review and delete activity. For example, visit myactivity.google.com and you can see all the stuff Google knows you’ve done, including what you’ve asked the Google Assistant,  what apps you use and where you’ve been. You can even delete data entries. On the Amazon Echo, you go to the app > Settings > History and you can review and delete recordings.

Now, Amazon, Alphabet, et al. claim they are responsible with the data and only use it anonymously to “improve” their services. Apple, for example, has confirmed that they keep all Siri data for two years.

After an Amazon Echo had been subpoenaed in a murder investigation, Amazon went to great lengths to explain that while Echo is always recording, it only saves 60 seconds of pre-roll, not entire 24/7 recordings. The Echo listens for a trigger word, and when it hears it, it sends the preceding 60 seconds plus whatever was recorded afterward.

Coming up next is going to be the Cloud based cameras. Amazon has already announced a camera based version of the Echo called Echo Look and Alphabet acquired the Nest Cam back in 2014. Is there someone surveilling you back at the Amazon or Alphabet home office? No, but the data is all processed to “improve” services.

So, let’s just clarify real quick what “improve” services means. For the most part, improving services to these corporations means better targeting you for advertisers. Don’t be shocked if you’re talking about a product around one of these devices and suddenly gets ads for it the next time you go online.

Within a few years, your house could be loaded with things that see what you buy, hear what you’re saying and know where you’re shopping. That’s why it’s important to understand these technologies and their privacy controls before they become too ubiquitous. Read the Privacy Policies and learn how to view and clear the history of the devices before purchasing them and understand that unplugging the device does nothing to delete the data that is stored online.

A better alternative is to look into getting devices where you control all the endpoints. An example of that would be the kind of IP video cameras we install. We can set them up so that you can view them securely online or have footage stored on a server that only you control.

If you’re worried about security and privacy for your business, please give us a call at 866-497-8060 before you make any decision. We’ll be able to explain to you the pros and cons, all the option out there and maybe even provide you with some options where you’ll maintain total control.

Let's Talk About Your Ideas

Toll-Free: 866-497-8060
support@advantage.tech

Charleston, WV

950 Kanawha Blvd E. #100 / Charleston, WV 25301
V: 304-973-9537 | F: 304-720-1423

Bridgeport, WV

1509 Johnson Avenue / Bridgeport, WV 26330
V: 304-973-9550

Frederick, MD

8 East 2nd St. #201 / Frederick, MD 21701
V: 240-685-1255

"*" indicates required fields

Full Name*
This field is hidden when viewing the form
Send Now

Advantage Tech logo light

Since the early 2000's, Advantage Technology has been providing reliable managed IT services to organizations across a range of industry types. With multiple offices located in West Virginia and Maryland, we tailor our IT solutions to the unique needs and requirements of businesses throughout the Mid-Atlantic region.


Company

  • About
  • Areas Served
  • Blog
  • Careers
  • Case Studies
  • Contact
  • Events
  • Industries
  • News
  • White Papers
  • Team
  • Request Consultation

Managed IT

  • Antivirus & Spam Filtering
  • Data Backup & Recovery
  • IT Help Desk
  • Maintenance & Support
  • Remote Monitoring & Management

Cybersecurity

  • Services & Solutions
  • Audits & Testing

Infrastructure

  • On-Premises
  • Cloud-Based
  • Phone & Telecom

AI

  • Agents & Automation Consulting
  • Fraud Detection
  • Inside Advantage.Tech
  • Managed IT & Service Desk
  • Security Customization
  • Tools & Platforms
  • Training & Workforce Enablement

Consulting

  • IT Staff Augmentation
  • GSA Capabilities & Schedule 70
  • Security Awareness Training
  • Technical Support
  • Virtual CIO
  • Virtual CISO

Link to company Facebook page

Link to company Instagram page

Link to company LinkedIn page

Link to company Twitter page

Link to company YouTube page

© Copyright 2026 | Powered by 321 Web Marketing