Skip to main content

Securing Smart Home Ecosystems

Information Technology Blog - - Securing Smart Home Ecosystems - Information Technology Blog

“Alexa, curtains up. Alex, coffee on.” Smart home ecosystems are very much here, and they’re often held together by the glue of a virtual assistant: Amazon’s Alexa, Google’s Assistant, or Apple’s Siri. These systems bring your compatible devices together to work as one, but they don’t do all the work for you. Even if your Alexa orders your groceries and makes your ice, you still need to sort out your own home security.

Connected smart home devices present real security risks. While some of these are inherent in the device (i.e., the collection of your voice data), others can be protected if you take the right steps.

What are the risks of a smart home ecosystem, and what can you do to minimize and mitigate them? Thankfully, while the risks are abundant, protecting your home from intruders is more about taking basic steps than fighting off hackers.

What are the Risks of a Smart Home Ecosystem?

The biggest risk in any smart home ecosystem is internet connectivity. These devices are connected to the Internet 24/7/365, which means they are also targeting all the time. What’s more, there are already billions of devices with more on the way. In other words, these devices are prime targets for hackers because there are simply too many entry points to cover them all.

Perhaps the biggest risk of a smart home ecosystem is that the connectivity between devices means that a breach doesn’t impact just one device. It can affect all other devices on your network including phones, laptops, and smartwatches.

Planning for a smart home device breach isn’t a matter of “if” as much as a matter of “when.” At the end of 2019, ZDNet published a list of 13 of the biggest hacks of the year. One of them is believed to have been committed by a 14-year-old. Fortunately, many attacks boast similarities, which is good news for device owners when setting up a cybersecurity strategy.

How to Protect Your Smart Home

Much of consumer cybersecurity comes down to three simple concepts: frequent updates, password hygiene, and secure wifi networks. None of them require more technical know-how than you already need to set up a smart home ecosystem. The trick is to treat cybersecurity like essential home maintenance that’s no different from mowing the lawn or inspecting your winter furnace.

Let’s start with frequent updates. Smart device manufacturers roll out updates for their software that provide security fixes and patches identified since the previous update. If the manufacturer knows about a hole in their software, then hackers usually do too. As a result, it is incredibly important to update your smart devices to ensure you’re always running the latest version of the software. And don’t forget to update your router firmware, especially if you have an older model that doesn’t update itself.

Second, choose your passwords wisely and change them regularly. It’s also important to avoid using the same password over and over again. Doing so leaves you vulnerable to an attack called “credential stuffing,” which occurs when a compromised, frequently used password is used to try to gain access to the rest of your accounts or services. Anonymous passwords are the best way to go because it protects you even if an old password list gets stolen.

Finally, you need to protect your wifi network. Your router should have a strong password, and it should be changed on a regular basis, as annoying as that sounds. Ideally, you should also run two networks. Use the first network for connecting your phone and computer and devices that you use to access personal accounts like iPads or smartwatches. Then, connect any smart home devices to the second network. In the event of a breach from a smart home device, the hacker will have a more difficult time accessing your core devices, at least over your wifi network.

If you want to go even further, get into the habit of skipping public wifi. Connecting your devices to public wifi can make them vulnerable to hackers and compromise your devices.

Choose Your Devices Carefully

Ultimately, you’ll need to choose your devices carefully and weigh the benefits vs. the security risks. It’s helpful to buy devices from companies actively patching their software and using internal security measures to mitigate breaches when they do happen.

A good example is Amazon’s Ring video doorbell. Ring offers video surveillance of your front door when someone rings the doorbell as well as alerts you when someone lingers by your door. It’s easy to set up and use. While the Ring doorbell has had security concerns in the past, you can still enjoy the protection it offers by ensuring you use a unique, anonymous password and two-factor authentication to help ward off serious breaches. Keeping it on a secondary wifi network only for devices, as already noted, will also help.

Smart devices can add a huge amount of value to your home or apartment, but they also carry vulnerabilities. It’s up to you to do your part to keep intruders out so that you remain protected, even if the device manufacturers’ defenses fail.

The post Securing Smart Home Ecosystems appeared first on Information Technology Blog.



Udimi - Buy Solo Ads from Information Technology Blog https://ift.tt/2Ki994r
via IFTTT

Comments

Popular posts from this blog

9 VCs in Madrid and Barcelona discuss the COVID-19 era and look to the future

Spain’s startup ecosystem has two main hubs: Madrid and Barcelona. Most observers place Barcelona first and Madrid second, but the gap appears to close every year. Barcelona has benefitted from attracting expats in search of sun, beach and lifestyle who tend to produce more internationally minded startups. Madrid’s startups have predominantly been Spain or Latin America-focused, but have become increasingly international in nature. Although not part of this survey, we expect Valencia to join next year, as city authorities have been going all-out to attract entrepreneurs and investors. The overall Spanish ecosystem is generally less mature than those in the U.K., France, Sweden and Germany, but it has been improving at a fast clip. More recently, entrepreneurs in Spain have moved away from emulating success in pursuit of innovative technologies. Following the financial crisis, the Spanish government supported the creation of startups with the launch of FOND-ICO GLOBAL, a €1.5 billi...

How to Stay Creative and Keep SEO in Mind

Information Technology Blog - - How to Stay Creative and Keep SEO in Mind - Information Technology Blog Search engine optimization (SEO) refers to customizing your website’s content to ensure that web browsers give your website a high SEO score. The sites with the highest SEO scores are featured on the search engine’s first page of search results for relevant searches.  71%  of the click-throughs happen with articles listed on the first page of results on the search engine. This means that if your website’s article is the second (or third, or fourth page), it’s less likely the search user will even see your article. You want your article to be ranking as close to the top of the first page of results as possible. In order to have a good SEO score your site’s content needs to feature keywords and relevant phrases. It must be optimized for easy navigation between pages. It also needs to be referenced via external links that drive traffic to your site. Incorporating all of t...

Everything we know about HHS Protect, a secretive government project with Peter Thiel's Palantir that helps brief Trump's coronavirus task force

A secretive project at the US Department of Health and Human Services is working with technology companies to collect and analyze data related to the novel coronavirus .  Dubbed "HHS Protect," the effort tracks information from around the country about coronavirus case numbers, hospital capacity, and even supply chain issues.  HHS uses Palantir Technologies , a data firm cofounded by Peter Thiel, to distill that information for the White House coronavirus task force. Visit Business Insider's homepage for more stories . A secretive project at the US Department of Health and Human Services is working with technology companies to collect and analyze data related to the novel coronavirus.  Dubbed "HHS Protect," the effort includes roughly 2.5 billion pieces of data from healthcare providers, government officials, and labs around the country about coronavirus case numbers, hospital capacity, and even supply chain issues.  The goal is learn about the progress...