Protecting Your Home Devices Against Attack

A growing number of people’s homes have multiple devices responding to a tap in an app, or the sound of your voice. However, every device that’s connected to your Wi-Fi are also transmitting data which will be of interest to criminals, not least your speakers, voice assistants, cameras, intruder alarms, cameras, door locks and security lighting. Or even your kids’ toys.

Not setting up and maintaining the appropriate security measures for your smart devices, their apps and your Wi-Fi network could lead to your information being stolen and even your every movement being observed.

Another consideration is that the data provided by your smart devices - or the information you supply when you set them up - could be used by manufacturers for unwanted purposes, including being sold on to third parties.

Top Tips For Your Smart Devices

  • Consider that buying well-known, reputable brands means that more care has probably been taken in securing the products – for your and your family’s security.
  • For smart devices for which you need to log in to connect, replace factory-set passwords with secure ones you create yourself. This is because default administrator passwords may be common to every device shipped, and potentially insecure. If in doubt, check manufacturers’ instructions on how to change passwords.
  • Don’t use the same password for more than one connected device, nor share passwords with those you already use for other online accounts.
  • Make sure your Wi-Fi network is secure. Use a VPN    
  • Make sure that all your computers and mobile devices are protected with updated internet security software / app, and that access to these devices is safeguarded with a PIN or passcode.
  • Check the apps associated with your connected devices and install updates as soon as prompted. Also, regularly check manufacturers’ websites for updates, as they can be slow to push these out via the app.
  • Limit the amount of information you provide when setting up an app to what is absolutely necessary.
  • Be aware that devices like voice assistants, smart TVs, smart speakers and cameras are always active and potentially recording unless you switch off or disable them.  

For everything you need to know about securing your smart devices, visit:  Your Connected Home

Get Safe Online:      NCSC:      NCSC:

You Might Also Read: 

Home Working Creates More Cyber Attacks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« WEBINAR | Uplevel Your Cloud Security Posture With CSPM
British University Data Breaches Are A Lesson For All »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum is a catalyst platform designed to create a more resilient and better cyberworld for all.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.

NetBird

NetBird

NetBird combines a WireGuard-based overlay network with Zero Trust Network Access, providing a unified platform for reliable and secure connectivity.