Protecting Your Home Devices Against Attack

A growing number of people’s homes have multiple devices responding to a tap in an app, or the sound of your voice. However, every device that’s connected to your Wi-Fi are also transmitting data which will be of interest to criminals, not least your speakers, voice assistants, cameras, intruder alarms, cameras, door locks and security lighting. Or even your kids’ toys.

Not setting up and maintaining the appropriate security measures for your smart devices, their apps and your Wi-Fi network could lead to your information being stolen and even your every movement being observed.

Another consideration is that the data provided by your smart devices - or the information you supply when you set them up - could be used by manufacturers for unwanted purposes, including being sold on to third parties.

Top Tips For Your Smart Devices

  • Consider that buying well-known, reputable brands means that more care has probably been taken in securing the products – for your and your family’s security.
  • For smart devices for which you need to log in to connect, replace factory-set passwords with secure ones you create yourself. This is because default administrator passwords may be common to every device shipped, and potentially insecure. If in doubt, check manufacturers’ instructions on how to change passwords.
  • Don’t use the same password for more than one connected device, nor share passwords with those you already use for other online accounts.
  • Make sure your Wi-Fi network is secure. Use a VPN    
  • Make sure that all your computers and mobile devices are protected with updated internet security software / app, and that access to these devices is safeguarded with a PIN or passcode.
  • Check the apps associated with your connected devices and install updates as soon as prompted. Also, regularly check manufacturers’ websites for updates, as they can be slow to push these out via the app.
  • Limit the amount of information you provide when setting up an app to what is absolutely necessary.
  • Be aware that devices like voice assistants, smart TVs, smart speakers and cameras are always active and potentially recording unless you switch off or disable them.  

For everything you need to know about securing your smart devices, visit:  Your Connected Home

Get Safe Online:      NCSC:      NCSC:

You Might Also Read: 

Home Working Creates More Cyber Attacks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« WEBINAR | Uplevel Your Cloud Security Posture With CSPM
British University Data Breaches Are A Lesson For All »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

Opticks Security

Opticks Security

Opticks provides fraud detection and monitoring solutions for leading brands. agencies and networks. Our relentless mission is to deliver reliable and innovative software to beat digital fraud.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

Cyber and Fraud Centre – Scotland

Cyber and Fraud Centre – Scotland

The Cyber and Fraud Centre – Scotland exists to ensure Scottish organisations are as resilient as they can be against cyber and fraud crime.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.