Did you hear about the FaceTime bug that allowed users to eavesdrop on one another? How about the US family convinced by their Nest Camera that a nuclear attack was imminent?
IoT devices are now a top target for brazen cyber criminals eager to take advantage of anything in order to get their hands on someone elseâs personal details.
Yet despite the dramatic headlines, thereâs no need to unplug altogether. Instead, there are several simple and easy hacks that you can do to add an extra layer of security to your smart home devices. Hereâs our top 10 tips on how:
[ul]
[li]Smart homes at greater security risk than ever[/li][li]Protecting your data in the age of smart homes[/li][li]6 ways to secure your home Wi-Fi[/li][/ul]
1. Use two-factor authentication (2FA)
For most devices, there is usually an option to set up 2FA. With 2FA youâre asked to enter a secondary form of verification after submitting your username and password. This second layer of security helps repulse particularly persistent hackers.
When it comes to finance, security is crucial so many banks go further than 2FA by sending customers a unique code to enter. Facebook gets even more creative, asking users to verify friends in photos.
However, neglecting 2FA isnât amusing; recently a hacker spoke to a baby through a Nest security camera and then turned up the central heating. With proper 2FA, this was a situation that could have been avoided.
[IMG alt="dM5C8aQ3AWwyEGQw68KbAT" width="690px" height="388px"]https://cdn.mos.cms.futurecdn.net/dM5C8aQ3AWwyEGQw68KbAT.jpg[/IMG]
Image Credit: Pixabay
2. Set up a secondary or âguestâ network
Broadband suppliers allow you to create multiple networks on your Wi-Fi router. Itâs how parents set up controlled kidsâ networks and guest networks for visitors. The same can be done for smart devices.
Create a separate Wi-Fi network so that your IoT devices operate separately from personal ones like your laptop or phone. Many routers now segregate all devices on a guest network so that they cannot communicate with each other. This makes it harder for a would-be hacker to gain access to data on this network.
When creating this new network, opt for WPA2 if given a choice between this and WPA; itâs the standard encryption method used worldwide.
3. Kill the bugs
Modern technology is impressive, but we all know that mistakes do happen. One of the most common ways hackers target smart devices is by exploiting a vulnerability missed by the software developer.
Luckily, this is also one of the easiest issues to address - simply update the device. Maybe think twice before clicking âask me laterâ the next time an update notification appears on your phone or laptop. There are bigger bugs to fry.
4. Disable unnecessary features
Smart devices are full of features, often enabled by default. Remote access is a good example of something that may be surplus to requirements. Donât need it? Disable it.
5. Is your device qualified?
When purchasing a smart device, make sure it has the correct certification. The âWorks with Alexaâ and âWorks with Apple HomeKitâ badges show that devices meet certain standards in responsiveness, reliability and functionality.
However, certification is especially important in regards to smart security devices. Itâs worth noting that in the UK a smart alarm needs to be certified by either the National Security Inspectorate (NSI) or the SSAIB if you want a police response.
[IMG alt="U2utormEpFuvCRjF6JqwxH" width="690px" height="388px"]https://cdn.mos.cms.futurecdn.net/U2utormEpFuvCRjF6JqwxH.jpg[/IMG]
Image Credit: Shutterstock
6. Resist accessing smart devices using public Wi-Fi
Public Wi-Fi has weak security protocols and information transmission is generally unencrypted. If your Wi-Fi router is hacked your information can easily be intercepted undetected. This is whatâs called a âman-in-the-middleâ attack.
If you are on the go and want to check your CCTV then perhaps itâs better to take the hit and just use your own 3G/4G connection.
7. But if you must⊠Make sure the public Wi-Fi is genuine
Another man-in-the-middle attack exists, appropriately dubbed âEvil Twin.â In this case, the hacker creates a Wi-Fi network to mimic a public one nearby. For example, a network named Free_Cafe_Wifi could be created next to a Starbucks. This technique is especially dangerous as login pages may automatically appear, enticing you to enter personal details.
If you cannot avoid public Wi-Fi altogether, ask a café employee for the correct Wi-Fi name to make sure you are logging into the correct one.
8. Secure your phone and smart accessories
Simple, but effective. Your smartphone should have a passcode that isnât easily guessed. No birthdays or â1234â.
You should also keep track of portable smart home accessories. Nowadays, smart alarms often come with key tags, allowing the alarm to be set and unset by waving them next to a panel. If lost, make sure you deactivate the tag on your smartphone until itâs found.
9. Buy from trusted brands
Cybersecurity is a top priority for consumers, but not always for brands. Beware the âpoundshopâ types you see on Amazon or Ebay boasting good reviews and low prices. Do your research: look up the brandâs website and search opinions on news-sites and forums.
Itâs also worth checking whether the brands encrypts personal content. Ring, for example, is known for not encrypting customersâ videos because of Ringâs belief âthat encryption would make the company less valuable.â Earlier this year, this created a storm when allegations arose that Ringâs Ukraine-based employees had unfettered access to video created by Ring camera.
[IMG alt="dEpz5LV5PYpqYBngLd6omi" width="690px" height="388px"]https://cdn.mos.cms.futurecdn.net/dEpz5LV5PYpqYBngLd6omi.jpg[/IMG]
Image Credit: Shutterstock
10. Remember: passwords are key
Itâs a cybersecurity tale as old as time. But itâs true. Your passwords must be secure. Make sure each one is unique and at least 12 characters long. Avoid full words; MySecurePasswrd is far more secure than MySecurePassword simply because itâs missing the âoâ.
Adding numbers and symbols helps, but shouldnât be prioritised over character length. The password âH@GG1s!â is less secure than âhaggis-is-tastyâ because it halves the character count (7 vs 15). Besides, hackers are usually well aware of which letters are commonly replaced with numbers or symbols.
A good password will defend against âbrute forceâ attacks: a trial-and-error method where a computer submits thousands of passwords, using common words and patterns, to gradually narrow it down.
If youâre concerned about remembering multiple passwords then use a password manager like LastPass or Dashlane. You can also get built-in options like Keychains for iOS or Password Manager for Google Chrome.
Last but not least, donât forget to give your broadband network a suitably obscure name. âWilliamâs Wi-Fiâ is not ideal. Think outside the box, your favourite movie or car model for instance. Maybe even try putting a smile on a neighbourâs face with something a little playful like âPretty Fly for a Wi-Fiâ or âThe LAN Before Timeâ. You just never know. It could be the difference between being hacked or having said hacker move elsewhere.
Paul Walton, Co-Founder of Boundary
[ul]
[li]Weâve also highlighted the best smart home devices[/li][/ul]
Continue readingâŠ
IoT devices are now a top target for brazen cyber criminals eager to take advantage of anything in order to get their hands on someone elseâs personal details.
Yet despite the dramatic headlines, thereâs no need to unplug altogether. Instead, there are several simple and easy hacks that you can do to add an extra layer of security to your smart home devices. Hereâs our top 10 tips on how:
[ul]
[li]Smart homes at greater security risk than ever[/li][li]Protecting your data in the age of smart homes[/li][li]6 ways to secure your home Wi-Fi[/li][/ul]
1. Use two-factor authentication (2FA)
For most devices, there is usually an option to set up 2FA. With 2FA youâre asked to enter a secondary form of verification after submitting your username and password. This second layer of security helps repulse particularly persistent hackers.
When it comes to finance, security is crucial so many banks go further than 2FA by sending customers a unique code to enter. Facebook gets even more creative, asking users to verify friends in photos.
However, neglecting 2FA isnât amusing; recently a hacker spoke to a baby through a Nest security camera and then turned up the central heating. With proper 2FA, this was a situation that could have been avoided.
[IMG alt="dM5C8aQ3AWwyEGQw68KbAT" width="690px" height="388px"]https://cdn.mos.cms.futurecdn.net/dM5C8aQ3AWwyEGQw68KbAT.jpg[/IMG]
Image Credit: Pixabay
2. Set up a secondary or âguestâ network
Broadband suppliers allow you to create multiple networks on your Wi-Fi router. Itâs how parents set up controlled kidsâ networks and guest networks for visitors. The same can be done for smart devices.
Create a separate Wi-Fi network so that your IoT devices operate separately from personal ones like your laptop or phone. Many routers now segregate all devices on a guest network so that they cannot communicate with each other. This makes it harder for a would-be hacker to gain access to data on this network.
When creating this new network, opt for WPA2 if given a choice between this and WPA; itâs the standard encryption method used worldwide.
3. Kill the bugs
Modern technology is impressive, but we all know that mistakes do happen. One of the most common ways hackers target smart devices is by exploiting a vulnerability missed by the software developer.
Luckily, this is also one of the easiest issues to address - simply update the device. Maybe think twice before clicking âask me laterâ the next time an update notification appears on your phone or laptop. There are bigger bugs to fry.
4. Disable unnecessary features
Smart devices are full of features, often enabled by default. Remote access is a good example of something that may be surplus to requirements. Donât need it? Disable it.
5. Is your device qualified?
When purchasing a smart device, make sure it has the correct certification. The âWorks with Alexaâ and âWorks with Apple HomeKitâ badges show that devices meet certain standards in responsiveness, reliability and functionality.
However, certification is especially important in regards to smart security devices. Itâs worth noting that in the UK a smart alarm needs to be certified by either the National Security Inspectorate (NSI) or the SSAIB if you want a police response.
[IMG alt="U2utormEpFuvCRjF6JqwxH" width="690px" height="388px"]https://cdn.mos.cms.futurecdn.net/U2utormEpFuvCRjF6JqwxH.jpg[/IMG]
Image Credit: Shutterstock
6. Resist accessing smart devices using public Wi-Fi
Public Wi-Fi has weak security protocols and information transmission is generally unencrypted. If your Wi-Fi router is hacked your information can easily be intercepted undetected. This is whatâs called a âman-in-the-middleâ attack.
If you are on the go and want to check your CCTV then perhaps itâs better to take the hit and just use your own 3G/4G connection.
7. But if you must⊠Make sure the public Wi-Fi is genuine
Another man-in-the-middle attack exists, appropriately dubbed âEvil Twin.â In this case, the hacker creates a Wi-Fi network to mimic a public one nearby. For example, a network named Free_Cafe_Wifi could be created next to a Starbucks. This technique is especially dangerous as login pages may automatically appear, enticing you to enter personal details.
If you cannot avoid public Wi-Fi altogether, ask a café employee for the correct Wi-Fi name to make sure you are logging into the correct one.
8. Secure your phone and smart accessories
Simple, but effective. Your smartphone should have a passcode that isnât easily guessed. No birthdays or â1234â.
You should also keep track of portable smart home accessories. Nowadays, smart alarms often come with key tags, allowing the alarm to be set and unset by waving them next to a panel. If lost, make sure you deactivate the tag on your smartphone until itâs found.
9. Buy from trusted brands
Cybersecurity is a top priority for consumers, but not always for brands. Beware the âpoundshopâ types you see on Amazon or Ebay boasting good reviews and low prices. Do your research: look up the brandâs website and search opinions on news-sites and forums.
Itâs also worth checking whether the brands encrypts personal content. Ring, for example, is known for not encrypting customersâ videos because of Ringâs belief âthat encryption would make the company less valuable.â Earlier this year, this created a storm when allegations arose that Ringâs Ukraine-based employees had unfettered access to video created by Ring camera.
[IMG alt="dEpz5LV5PYpqYBngLd6omi" width="690px" height="388px"]https://cdn.mos.cms.futurecdn.net/dEpz5LV5PYpqYBngLd6omi.jpg[/IMG]
Image Credit: Shutterstock
10. Remember: passwords are key
Itâs a cybersecurity tale as old as time. But itâs true. Your passwords must be secure. Make sure each one is unique and at least 12 characters long. Avoid full words; MySecurePasswrd is far more secure than MySecurePassword simply because itâs missing the âoâ.
Adding numbers and symbols helps, but shouldnât be prioritised over character length. The password âH@GG1s!â is less secure than âhaggis-is-tastyâ because it halves the character count (7 vs 15). Besides, hackers are usually well aware of which letters are commonly replaced with numbers or symbols.
A good password will defend against âbrute forceâ attacks: a trial-and-error method where a computer submits thousands of passwords, using common words and patterns, to gradually narrow it down.
If youâre concerned about remembering multiple passwords then use a password manager like LastPass or Dashlane. You can also get built-in options like Keychains for iOS or Password Manager for Google Chrome.
Last but not least, donât forget to give your broadband network a suitably obscure name. âWilliamâs Wi-Fiâ is not ideal. Think outside the box, your favourite movie or car model for instance. Maybe even try putting a smile on a neighbourâs face with something a little playful like âPretty Fly for a Wi-Fiâ or âThe LAN Before Timeâ. You just never know. It could be the difference between being hacked or having said hacker move elsewhere.
Paul Walton, Co-Founder of Boundary
[ul]
[li]Weâve also highlighted the best smart home devices[/li][/ul]
Continue readingâŠ