(This guide is Part 2 of seven in our Cybersecurity Safety Content Basics Special.)
Quick Tips: Five steps to better protect your smart devices at home
1) Secure your home network
Building a more secure smart home starts with a secure home network, as it forms the base that connects all your connected devices and makes them operable. Here are a few additional steps you should consider:-
- Change the default password and name of your router.
- Ensure that your network name does not give away your address, so hackers can’t locate it.
- Then check that your router is using an encryption method, like WPA2 (or newer), which will keep your communications secure. More info in our prior article.
- Consider putting your smart devices on a guest network.
- Yet another tip is to set your SSID broadcast to invisible so it can’t be seen without specialised Wi-Fi detection software.
2) Check the access settings for your devices
Your IoT devices might come with default privacy and security settings. You will want to consider changing them, as some default settings could benefit the manufacturer more than they benefit you. For example, some IoT devices can come with a variety of services such as remote access, often enabled by default. If you don’t need it available, be sure to disable it. If it has 2FA options, enable it. But each connected device can be different. If you’re securing a printer for example, the first step is to determine if it needs to be connected to your network. Then you should enable a password to protect Remote Access if your printer has it.
3) Disconnect it from the Internet
Consider whether the device needs internet access. By cutting it off, one possible entry point to prevent hackers from exploiting a vulnerability will be cut off. Take, for example, a smart fridge. The home appliance will still function the same way and provide many of the benefits a smart fridge offers within a home network, but it won’t be available to be used as an entry point to your entire home network.
4) Regularly update your devices
Stay on top of software updates from your device manufacturer. Available updates are not always advertised, so visit the manufacturer’s website regularly. Additionally, make sure to update the mobile apps that pair with your IoT device. Adjust the respective app's settings to turn on automatic software updates, so you will always have the latest security patches.
5) Check if your service provider can support you
You don’t have to do it alone. Your service provider may be able to help by providing some form of managed security service like these from Singtel, StarHub and ViewQwest.
Why smart devices need better security oversight
Following a secure home network (our first topic of the Cybersecurity Safety basics), you would also need to pay attention to connected smart home devices like a smart fridge that can send a message reminding its owner to order more milk, a smart doorbell that video calls a homeowner when a visitor arrives, a smart TV box that connects to Netflix and Disney+, or even a printer that will call its manufacturer when it senses its ink levels are getting low.
Anything that connects to the internet needs to be secured. One example often quoted is the 2016, DDoS attacks on DNS service provider Dyn using Mirai malware installed on a large number of IoT devices (webcams, smart doorbells etc), many of which were still using their default usernames and passwords. These attacks resulted in websites including GitHub, Twitter, Reddit, Netflix, and Airbnb becoming inaccessible.
Do you know how many connected devices you have?
Image source: Pixabay.
Home cameras, printers, and other home IoT are vulnerable to cyberattack because they are dependent on their manufacturer for a suitable firmware to secure them. This can result in them being left vulnerable to malware. The more devices connect to the Internet, the more endpoints become available for hackers to exploit. Each new web-enabled device that connects to your network increases the 'attack surface' of your network.
Some common security issues of such devices include:
- No system hardening, which would otherwise provide them with a means of protection and make them more secure.
- No mechanism for updating software, which can create vulnerabilities.
- Connected with the default or hardcoded passwords left intact which can be exploited.
Once access to the devices is gained, attackers can penetrate networks, steal data, organise IoT botnets, and orchestrate attacks on other people and businesses. Access to device data can help attackers with social engineering attacks and trick others into doing the attackers' bidding. And like a recent D-Link NAS security threat has exposed, NAS (network attached storage) devices should be monitored if exposed to the Internet as they can be targeted to steal data or encrypt in ransomware attacks. In the the case of NAS devices, it's vital to look into tip number 3 to save you the hassle of all the extra monitoring.
Image source: Pixabay.
While this article is just a primer for cybersecurity safety, it belongs to a 7-part series of articles for consumers to take easy, actionable steps to better prepare against online security threats and what you can do to stay safe. Stay tuned as we roll out more stories over the next few days.
Our articles may contain affiliate links. If you buy through these links, we may earn a small commission.