In the past, technology was relatively simple: You just connected your computer to the internet and used it for your daily activities. However, technology became more advanced when mobile devices came into our lives, devices such as smartphones and tablets. These devices put the power of desktop computers into our pockets. While far more mobile, these devices also brought their own, unique security challenges.
The next big technical advancement is the Internet of Things. The Internet of Things, often shortened to IoT, is all about connecting everyday devices to the internet, devices from doorbells and light bulbs to toy dolls and thermostats. These connected devices can make our lives much simpler; for example, having your lights automatically activate as your phone recognizes when you get close to home. The IoT market is moving at an amazing pace, with new devices appearing every week. However, like mobile devices, IoT devices also come with their own individual security issues. In this newsletter, we help you understand what those risks are and what you can do to secure your IoT devices, your home, and your family.
Issues with IoT
Know what IoT devices you have connected to your network, isolate them often, keep them updated, and have strong passphrases.
The power of IoT is that most of these devices are simple. For example, you simply plug your coffee machine in and it asks to connect to your home Wi-Fi network. However, all that simplicity comes at a cost. The biggest problem with IoT devices is that many of the companies making them have no experience with security. Instead, their expertise is manufacturing household appliances. Or perhaps it is a startup trying to develop a product the most efficient, fastest way possible, such as on Kickstarter. These organizations are focusing on profits, not cybersecurity. As a result, many IoT devices purchased today have little or no security built into them. For example, some have default passwords that are well known, perhaps even posted on the internet, and cannot be changed.
In addition, many of these devices have no option or ability to configure them; you’re stuck with whatever was shipped. To make matters worse, many of these devices can be difficult to update or may not even have the capability. As a result, many of the IoT devices you are using can quickly become out of date with known vulnerabilities that cannot be fixed, leaving you permanently vulnerable.
Protecting Your IoT Devices
So what can you do? We definitely want you to leverage the power of IoT devices securely and effectively. These devices can provide wonderful features that can make your life simpler, help save money, and increase the physical security of your home. In addition, as the technology grows, you may have no choice but to purchase or use IoT devices. Here are steps you can take to protect your IoT devices and yourself:
- Connect only what you need: The simplest way to secure an IoT device is to not connect it to the internet. If you don’t need your device to be online, don’t connect it to your Wi-Fi network.
- Separate Wi-Fi network: If you do need your IoT devices online, consider creating a separate Wi-Fi network just for them. Many Wi-Fi access points have the ability to create additional networks, such as a guest network. Another option is to purchase an additional Wi-Fi access point just for IoT devices. This keeps your IoT devices on an isolated network, where they cannot be used to harm or attack any computer or mobile devices connected to your primary home network (which is still the main interest of cyber criminals).
- Update when possible: Just like your PC and mobile devices, keep your IoT devices up to date. If your IoT device has the option to automatically update, enable that.
- Strong passwords: Change any passwords on your IoT device to a unique, strong passphrase only you know. Can’t remember all of your passphrases? Don’t worry, neither can we. Consider using a password manager to securely store all of them.
- Privacy options: If your IoT device allows you to configure privacy options, limit the amount of information it shares. One option is to simply disable any information sharing capabilities.
- Consider replacement: At some point, you may want to replace an IoT device when your existing one has too many known vulnerabilities that cannot be fixed or there are newer devices that have far more security built into them.
There is no one size fits all for every device, so it is worth checking for best practices and any publications on how to secure them. Unfortunately, most IoT devices were not developed with cybersecurity in mind, so many manufacturers do not provide much security information. But as awareness for cybersecurity grows, we hope to see more and more IoT vendors build security into their devices and provide more information on how to protect and update them.