Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. Examples include devices that direct your car to an open spot in […]
Change your device’s factory security settings from the default password. This is one of the most important steps to take in the protection of IoT devices. You should consider using the longest password or passphrase allowable. Get creative and create strong and unique passwords for all your IoT devices.
Not all internet-connected devices carry the same level of cybersecurity risk; Internet of Things (IoT) endpoints are often more exposed than PCs or smartphones. You can minimize your overall risk by isolating IoT traffic onto its own network segment. Check if your router allows you to set up the VLANs necessary for segmentation.
It’s been obsolete for years, but make sure you are not still securing any Wi-Fi networks with the legacy WEP standard. WPA2 is ideal as of early 2018 and supported by any legitimate modern router or wireless-enabled device. Be on the lookout for WPA3-certified products in the coming years, as they will have additional features.
Everything from your Wi-Fi router to a new baby monitor might ship with a default username and password, such as “admin” for both credentials. You should change them right away to prevent exposure to botnets designed to take over devices with easily guessed logins.
The Internet of Things includes a wide variety of networked devices like cameras and thermostats. Unfortunately, many of them run software and firmware with known exploits that will never be patched. It’s usually best to throw them out and get newer, safer replacements.
Privacy /
Legal
Cookie Policy
Do Not Sell My Information
Copyright ©2024 Total Defense LLC. All Rights Reserved.
At Total Defense we take your privacy seriously. We recently made updates to our privacy policy to comply with the European Union’s General Data Privacy Regulation. This policy explains:
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.