Own IT – The Internet of Things (IoT)

 

Perhaps you’ve heard the term Internet of Things, or IoT, but not many have a clear understanding of what they do.

IoTs refers to smart devices, any object that is connected to the internet.  These set of devices, which can send and receive data over the internet includes cars, appliances, smart watches, lighting devices, home assistants, home security, etc. – Yes, even crock-pots have become “Smart” recently.

But, why should we care?

  • Cars, appliances, wearables, lighting devices, healthcare devices, and home security devices all contain sensing devices that can “talk” to another device and trigger other actions. Examples include devices that direct your car to an open spot in a parking lot; mechanisms that control energy use in your home (Smart thermostat); and tools that track eating, sleeping, and exercise habits – wearables such as SmartWatches, FitBits, etc.
  • Internet connected devices provide a level of convenience in our lives, but they require that we share more information than ever.
  • The security of this information, and the security of these devices is not always guaranteed. Once your device connects to the internet, you and your device could potentially be vulnerable to all sorts of risks.
  • With more connected devices (“things”) entering our homes, and our workplaces each day, it is important that everyone knows how to secure their digital lives.

Simple tips to Own IT.

  • Shake up your password protocol. Change your device’s factory security settings from the default password. This is one of the most important steps to take in the protection of IoT devices. According to the National Institute of Standards and Technology (NIST) guidance, you should consider using the longest password or passphrase permissible. Get creative and create a unique password for your IoT devices. Read my Passwords Best Practices page.
  • Keep tabs on your apps. Many connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with apps running in the background, or using default permissions you never realized you had approved – gethering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and learn to say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.
  • Secure your network. Properly secure the wireless network you use to connect internet-enabled devices. Consider placing these devices on a separate and dedicated network. For more information on how to secure your network, view the National Security Agency’s Cybersecurity Information page.
  • If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems. If you have the option to enable automatic updates to defend against the latest risks, TURN IT ON!

 

Stay tuned next week for the series Secure IT, where I’ll discuss Strong Passwords, Multi-Factor Authentication (MFA), Work Secure, Phishing (yet again), and E-Commerce.

 

Leave a Reply

Your email address will not be published. Required fields are marked *