Menu

SMART HOME FEATURE NEWS

Eight Tips from Experian to Keep Your IoT-Enabled Gifts Secure

By Ken Briodagh December 27, 2016

As we roll past the gift-giving holidays this year, it looks like IoT-enabled devices were among the top holiday gifts, and so more and more people are going to be putting their homes and personal lives online in the next few weeks. Some of these gifts include Amazon Echo and Google Home systems, smart TVs and personal wearables. Of course, all of these new connections mean more possible sources of security and privacy risks.

“A common mistake many of us make with Internet-connected devices is that we treat each one individually. The Internet of Things is only as strong as its weakest link. That’s why it’s so important to understand and treat each connected device as part of a broader network,” said Steve Platt, Global EVP, Fraud and Identity, Experian. “I don’t necessarily think about someone hacking into my new smart thermostat and accessing temperature preferences. But if they can access my thermostat, they can get into my Wi-Fi network. From there they can access my computer or other connected devices where I have a lot more private and valuable information.”

The good news, according to personal security experts Experian, is that consumers can have both convenience and privacy, as long as they learn how to secure these devices.

Here, the company provides eight tips to help protect identity while enjoying these sweet new toys.

  1. Make sure the products and services were purchased from reputable companies.
  2. Take a few minutes to review the privacy and data usage policies for each product or service. These privacy policies and data use statements should be clear, easy to read and easy to understand. It’s important to know how your personal data is used, stored or shared and to be comfortable with the terms before using the device.
  3. Look for devices that use end-to-end encryption, meaning third parties can’t read or listen to your communications. More and more products are including this terminology right in the product description. If it’s not there, ask.
  4. Be careful when turning on features for less secure devices. Remember that a less secure device can open a door into your network, which can lead to access to other connected devices.
  5. Change the default password before connecting the device to your network and enable two-factor authentication options, when available, for additional security.
  6. Pay extra attention to your Wi-Fi network and leverage all available security options, including things like router and network passwords, encryption, firewalls and firmware.
  7. Be aware of the applications installed on devices, and download applications only from reputable providers. Also, only download apps created by trusted entities.
  8. Make sure children are supervised, especially when downloading apps and connecting to other devices.

With a little bit of Internet street smarts, the IoT holds few dangers and all the advantages of our IoT Evolution.




Edited by Alicia Young

Editorial Director

SHARE THIS ARTICLE
Related Articles

Cognitive Systems Develops WiFi Motion Software

By: Chrissie Cluney    5/16/2018

Are you a consumer with a smart home? Or is your company looking to develop the most updated WiFi motion software for products for smart homes?

Read More

Tuya Smart AIoT Platform Helps Lighting Companies Create Smart Bulbs

By: Ken Briodagh    5/15/2018

With WiFi Module, Smartphone App and Cloud, Tuya Gives Lighting Manufacturers Easy 'Smart' Solution so Bulbs Change Color, Hue, Temperature and Even R…

Read More

The True Benefits of the Smart Home

By: Special Guest    5/8/2018

Automated home technology is cool. I mean, just saying it is fun. Come on. Say it with me. "I have a smart home."

Read More

The Future of Smart Lighting Seems Bright, But Is That Really True?

By: Special Guest    4/25/2018

I'm a middle-income-bracket-millennial and none of my friends have smart bulbs installed in their homes. Not even my rich friends. Not even my dad.

Read More

Shutting Out Cybercriminals by Making IoT Devices Hard to Hunt

By: Special Guest    4/13/2018

To hunt prey, predators must first scope out the target's surroundings and everyday activity- something cybercriminals are all too familiar with when …

Read More