Protecting Your Home Devices Against Attack

A growing number of people’s homes have multiple devices responding to a tap in an app, or the sound of your voice. However, every device that’s connected to your Wi-Fi are also transmitting data which will be of interest to criminals, not least your speakers, voice assistants, cameras, intruder alarms, cameras, door locks and security lighting. Or even your kids’ toys.

Not setting up and maintaining the appropriate security measures for your smart devices, their apps and your Wi-Fi network could lead to your information being stolen and even your every movement being observed.

Another consideration is that the data provided by your smart devices - or the information you supply when you set them up - could be used by manufacturers for unwanted purposes, including being sold on to third parties.

Top Tips For Your Smart Devices

  • Consider that buying well-known, reputable brands means that more care has probably been taken in securing the products – for your and your family’s security.
  • For smart devices for which you need to log in to connect, replace factory-set passwords with secure ones you create yourself. This is because default administrator passwords may be common to every device shipped, and potentially insecure. If in doubt, check manufacturers’ instructions on how to change passwords.
  • Don’t use the same password for more than one connected device, nor share passwords with those you already use for other online accounts.
  • Make sure your Wi-Fi network is secure. Use a VPN    
  • Make sure that all your computers and mobile devices are protected with updated internet security software / app, and that access to these devices is safeguarded with a PIN or passcode.
  • Check the apps associated with your connected devices and install updates as soon as prompted. Also, regularly check manufacturers’ websites for updates, as they can be slow to push these out via the app.
  • Limit the amount of information you provide when setting up an app to what is absolutely necessary.
  • Be aware that devices like voice assistants, smart TVs, smart speakers and cameras are always active and potentially recording unless you switch off or disable them.  

For everything you need to know about securing your smart devices, visit:  Your Connected Home

Get Safe Online:      NCSC:      NCSC:

You Might Also Read: 

Home Working Creates More Cyber Attacks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« WEBINAR | Uplevel Your Cloud Security Posture With CSPM
British University Data Breaches Are A Lesson For All »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)

On-Demand Webinar - Hear security experts from SANS and AWS break down the myths and realities of what an NGFW is and what one can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

SubRosa Cyber Solutions

SubRosa Cyber Solutions

SubRosa Cyber Solutions solves its clients’ most tenacious information security, risk and compliance challenges through a multitude of information technology services and expertise.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.