As we enter the new year, many are getting their homes back in order. This process can include setting up and organizing the many “techy” gifts that you and your family may have recently received.
So-called “smart homes” incorporate electronic technology and systems that you can control remotely using an internet connection. These devices connect to your home Wi-Fi network for a variety of functions. Common smart devices seen in many homes include thermostats, lights, security cameras, health-monitoring gadgets and appliances.
These devices communicate with each other and the user through a central hub and/or smartphone app. There are many benefits to this new technology, including being more efficient and convenient than alternatives. However, if not secured properly, these connected devices may allow cybercriminals access to your home and compromise your personal identifiable information (PII).
Last year, we shared tips via newsletter and video on how to secure your new Internet of Things (IoT) devices. Review those still-relevant tips for smart devices utilizing the IOT, then read through the tips below to further strengthen your cybersecurity posture.
- Secure Wi-Fi and routers.
- Change the default settings on your router, including the username, password and network, often provided by your internet service provider (ISP). See the resource page for tips on strong passwords. If you need assistance, contact your ISP.
- Enable encryption in your settings.
- Check for updates continuously and set weekly or monthly reminders.
- Disconnect unused devices from Wi-Fi. Recycle/dispose of old technology properly (more on that in our “Cyber Habit of the Month” at the end of this newsletter).
- Use a separate Wi-Fi network for your household IoT devices.
- Why keep your smart washing machine and laptop on separate networks? If threat actors do infiltrate a network through a smart home device, they will look for a device that holds information they can exploit, which is usually a laptop or a smartphone. Criminals will likely vacate the network quickly if they can’t access any PPI.
- Most routers likely have 2.4 GHz and 5 GHz bands to use (some even have a third 6 GHz band). At the very least, your router will come with a network that can be set up as a guest network, which can be used to connect your smart devices. Consult your router’s instruction manual or contact your ISP to ensure this action is taken correctly.
- Avoid unnecessary vulnerabilities.
- Many IoT devices come with features that access your microphone, camera, Bluetooth or location tracking. If these features are not integral in the use of your device, disable them in the device’s settings and/or deny access when prompted.
- Some appliances now come with a companion app on another device, such as a phone or tablet. Check the app’s permissions and disable any that aren’t required. Does the app for your dryer really need access to your contact list?
- Look for features, like file sharing or remote access, that you may not ever need to use. Disable these features to limit any vulnerability that a threat actor could use to enter your network.
- Use a reviewed, trusted security suite for extra protection against vulnerabilities. These companies utilize software to help you keep track of and secure your devices.
- Secure physical access to devices.
- Our main focus has been on software-based cybersecurity, but keep in mind that if cybercriminals can gain physical access to a device, they can bypass a lot of those security features.
- Keep devices in secure, out-of-sight areas, especially if they record video or audio.
- Set up lock screens on IoT devices that have interactive touch screens.
- Locate the reset button on any smart devices and be sure it cannot be tampered with. Check the instruction manual to learn if your device has such a button and where it is located.
As you enjoy your new devices, remember that security is a continuous process. Keeping your devices on a separate network, updating your hubs and devices, and staying up to date on new scams are all part of the cybersecurity journey. Every connection, including Bluetooth and Wi-Fi, offers a possible backdoor into your home that could be accessed by bad actors. Following the steps above will keep your IoT electronics secure so you can have peace of mind in your smart home!
Additional Resources
FTC: Securing Your Internet-Connected Devices at Home
CISA: Five Steps to Protecting Your Digital Home
CISA: Secure New Internet-Connected Devices
Cyber Habit of the Month
Safely dispose of old electronics. Back up important data, then perform a factory reset on the device to erase all personal data. Be sure to remove any SIM or memory cards; consider using specialized data destruction services for sensitive information before recycling or donating the device. For maximum security, you can physically destroy the hard drive in certain cases. Never throw electronics away in the regular trash. Instead, check with your local landfill or municipality on where to dispose of your electronic waste, or e-waste. Be sure to check out CISA’s guide to proper disposal for more in-depth tips!