Thus, as a side effect of our increasingly technologized homes, we are witnessing the emergence of the “admin of Things” – a role that every home resident needs to master to get the most out of smart gadgets.
[...]
Make an inventory of gateways an attacker may exploit
Create a list of the devices connecting to your home network and start thinking like a hacker. How does each device connect? Bluetooth, Wi-Fi or something proprietary? Can it be controlled by a tablet or smartphone? Does it require a PIN or password? Is the data transfer encrypted?
[...]
Review and change credentials
You might discover that your router still uses the default password or that router passwords are stored in plain text. You will probably find one of these three combinations: admin/admin, admin/password, admin/
[...]
Monitor device manufacturer notifications
Firmware updates are vital for fixing bugs and other critical security problems, so update regularly to keep your device in top shape.
[...]
Close open ports
In a home, an unlocked door is a risk. The same goes for unused ports on a switch. When scanning for vulnerabilities, you might find open, unsecured ports on your network, despite ISPs blocking.
[...]
Secure your network
IoT devices have all sorts of proprietary firmware, so it’s impossible to install a security solution on each of them. Fortunately, there’s one integrated home cyber-security solution that secures your entire network and all the devices connected to it.
[...]
Now that you’ve established a full list of potential vulnerabilities, and have taken steps to mitigate each potential threat, you are one step closer to transforming your internet-connected home into a digital fortress.
See more at: macworld.com
No comments:
Post a Comment