Protecting Your Home Devices Against Attack

A growing number of people’s homes have multiple devices responding to a tap in an app, or the sound of your voice. However, every device that’s connected to your Wi-Fi are also transmitting data which will be of interest to criminals, not least your speakers, voice assistants, cameras, intruder alarms, cameras, door locks and security lighting. Or even your kids’ toys.

Not setting up and maintaining the appropriate security measures for your smart devices, their apps and your Wi-Fi network could lead to your information being stolen and even your every movement being observed.

Another consideration is that the data provided by your smart devices - or the information you supply when you set them up - could be used by manufacturers for unwanted purposes, including being sold on to third parties.

Top Tips For Your Smart Devices

  • Consider that buying well-known, reputable brands means that more care has probably been taken in securing the products – for your and your family’s security.
  • For smart devices for which you need to log in to connect, replace factory-set passwords with secure ones you create yourself. This is because default administrator passwords may be common to every device shipped, and potentially insecure. If in doubt, check manufacturers’ instructions on how to change passwords.
  • Don’t use the same password for more than one connected device, nor share passwords with those you already use for other online accounts.
  • Make sure your Wi-Fi network is secure. Use a VPN    
  • Make sure that all your computers and mobile devices are protected with updated internet security software / app, and that access to these devices is safeguarded with a PIN or passcode.
  • Check the apps associated with your connected devices and install updates as soon as prompted. Also, regularly check manufacturers’ websites for updates, as they can be slow to push these out via the app.
  • Limit the amount of information you provide when setting up an app to what is absolutely necessary.
  • Be aware that devices like voice assistants, smart TVs, smart speakers and cameras are always active and potentially recording unless you switch off or disable them.  

For everything you need to know about securing your smart devices, visit:  Your Connected Home

Get Safe Online:      NCSC:      NCSC:

You Might Also Read: 

Home Working Creates More Cyber Attacks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« WEBINAR | Uplevel Your Cloud Security Posture With CSPM
British University Data Breaches Are A Lesson For All »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum is a catalyst platform designed to create a more resilient and better cyberworld for all.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Patriot Consulting Technology Group

Patriot Consulting Technology Group

Patriot Consulting's mission is to help our clients manage cybersecurity risk through secure deployments of Microsoft 365.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.