Apple has announced that Siri will be coming to the next Mac OS, and for the first time the digital assistant will be compatible with third party apps such as WhatsApp and Uber. Ipswitch has just commissioned a survey with FreeForm Dynamics that found, as virtual assistants are given more access to operating systems and apps that contain sensitive data, there are increasing concerns about security and deskilling in the IT industry. On this news, Michael Hack, SVP of EMEA Operations at Ipswitch commented below.
Michael Hack, SVP of EMEA Operations at Ipswitch:
“Apple’s announcement that it is bringing its virtual assistant Siri to the next Mac operating system is yet another sign that intelligent systems are fast becoming a reality for consumers and businesses alike. In a recent study into intelligent systems commissioned by Ipswitch and carried out by Freeform Dynamics, 63% of IT professionals say that expert decision support systems are already active in their business or expected to be within the next 12 months. Almost half said the same of bots and electronic assistants.
“However, technological developments in intelligent systems and assistants are complex and have associated risks. Personally, the most havoc Siri manages with my phone is to ring my wife’s mother instead of mine. Awkward, but no big deal. However, as this technology develops into systems that people and businesses rely on for critical decision making and task performance, there are key concerns that need to be addressed. In our recent study entitled ‘Intelligent Systems in Action’, key concerns around intelligent systems in corporate IT are security risks, complacency leading to a lack of human oversight and commercial damage caused by decisions, recommendations or actions.
“There’s no doubt that the machines are coming to a corporate network near you. IT professionals need to approach intelligent machines with their eyes wide open, then as they grow more confident with intelligent systems, they will become increasingly willing to tackle more complex applications.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.