January 29, 2020
Using IoT devices and appliances to manage your home is an increasingly common practice in most modern-day households. Home assistants, smart doorbells, and internet-connected household appliances communicate via IoT technologies. Though prevalent in our lives, securing these devices from cyber attacks is still a major challenge technologists and manufacturers face.
You’ve probably heard news reports about compromised IoT devices being responsible for a large-scale botnet — when a network of private devices become infected with malicious software. The botnet can launch denial-of-service attacks, steal data, inundate users with spam or even access devices and their connection without the owner’s knowledge.
In terms of an IoT-connected Smart Home appliance, this most likely means a botnet would be accessing and controlling the device. If you’re wondering why anyone would want to hack into your toaster, you’re not alone. Yet, hackers can find valuable data about you from the most minor appliances in your house.
“Manufacturers need to be held more accountable with regards to road maps for updates for any devices they sell,” says IEEE Senior member Kevin Curran. “Even something which seems innocent, such as an IoT-connected coffee maker, could be hacked, and allow attackers to know our pattern of use. From that, they can make predictions as to when we are at home or not.”
Here are three ways to protect yourself and your devices from cyber invasion.
What Can You Do to Protect Your IoT Devices from Cyber Attacks?
Make Stronger Passwords
Some states have started to enforce stricter rules for IoT device manufacturers. The law requires each device to come with a unique password or allow the user to create a stronger password. Plus, the manufacturers must also provide security updates.
But even if you don’t live in California or the United States, it’s still wise to change your password after buying a device. “Whenever you buy an Internet-Connected device, such as a router, baby monitor or connected closed circuit tv (CCTV), change the default password,” says Curran. “In fact, every device you purchase that has a default password should be changed on first use. There are search engines which crawl the web for connected IoT devices, and hackers will try default passwords on those devices.”
If you do not change your password, “you are basically leaving your keys in the door,” says Curran.
Another tip to making your passwords stronger is to use different passwords on all sites.” Install a reputable password manager which will create complex strong passwords and store them in an encrypted file on your own computer,” suggests Curran. “You then only need to remember one master password and the password manager will automatically take care of logging you into different sites with secure passwords.”
Update Your Devices Immediately
Sometimes updating your smart, or IoT-connected devices is the last thing on your “to-do” list, and it’s easy to forget to update your mobile app. But making sure your devices, like your smart assistant, home security device or baby monitor are using the most recent software is an easy way to ensure your safety from potential hacks.
“The one aspect that I wish everyone knew was the importance of timely patches to software and operating systems,” says Curran. “Running the most recent versions of your mobile operating system, security software, apps and web browsers is among the best defenses against malware and other threats.”
“When you see a message on your computer or mobile to update, then do so immediately,” adds Curran. “These updates often contain security patches which protect against new vulnerabilities.”
Buy Devices From Manufacturers Committed to Protecting You
Only buy devices from manufacturers committed to ensuring your family’s security and privacy is protected. Do some research before you buy a smart device to see if the company has had trouble with cyber attacks in the past.
“Organizations need to ensure they deploy IoT devices with sufficient security policies in place, such as firewalls, and intrusion detection and prevention systems,” says Curran. “But they also need to ensure they cater for the confidentiality of their customers’ data.”
But the truth is, consumers should always be looking out for themselves and stay educated about the ways to protect themselves. “We have too many vulnerabilities because people still assume that someone else is handling it, or the system is handling it, and they don’t have to worry about it,” says IEEE senior member Steven Furnell. “Having taken the responsibility on board, you then need to understand and follow the baseline good practice.”





AI Through Our Ages
Liquid Infrastructure: Our Planet's Most Precious Resource
The Impact of Technology in 2025
Quantum and AI: Safeguards or Threats to Cybersecurity?
Why AI Can't Live Without Us
Bits, Bytes, Buildings and Bridges: Digital-Driven Infrastructure
Impact of Technology in 2024
Emerging AI Cybersecurity Challenges and Solutions
The Skies are Unlimited
Smart Cities 2030: How Tech is Reshaping Urbanscapes
Impact of Technology 2023
Cybersecurity for Life-Changing Innovations
Smarter Wearables Healthier Life
The Global Impact of IEEE's 802 Standards
How Millennial Parents are Embracing Health and Wellness Technologies for Their Generation Alpha Kids
Space Exploration, Technology and Our Lives
Global Innovation and the Environment
How Technology, Privacy and Security are Changing Each Other (And Us)
Find us in booth 31506, LVCC South Hall 3 and experience the Technology Moon Walk
Virtual and Mixed Reality
How Robots are Improving our Health
IEEE Experts and the Robots They are Teaching
See how millennial parents around the world see AI impacting the lives of their tech-infused offspring
Take the journey from farm to table and learn how IoT will help us reach the rising demand for food production
Watch technical experts discuss the latest cyber threats
Explore how researchers, teachers, explorers, healthcare and medical professionals use immersive technologies
Follow the timeline to see how Generation AI will be impacted by technology
Learn how your IoT data can be used by experiencing a day in a connected life
Listen to technical experts discuss the biggest security threats today
See how tech has influenced and evolved with the Games
Enter our virtual home to explore the IoT (Internet of Things) technologies
Explore an interactive map showcasing exciting innovations in robotics
Interactively explore A.I. in recent Hollywood movies
Get immersed in technologies that will improve patients' lives