![]() ![]() Install a unified threat management appliance (UTM) if you have a highly-connected home, Martincavage suggested. "If require a wide-open access to, or from, the Internet, beware!" Martincavage said. Port restrictions will cut down on opportunistic network-probing attempts. Set the firewall to allow traffic on those specific ports and no others. Most networked IoT devices include information about the ports, network protocols and IP addresses used in the owner's guide or the support website. "Every home with an Internet connection should have ," Martincavage said. Here's How to Fix Itįirewall the network, either with a stand-alone appliance or software that ships with the router, to restrict incoming connections. When possible, usernames should be also changed to make it even harder for attackers to brute-force their way in. Change each admin password to something suitably strong and complex, and regularly change them going forward. Neither network equipment (such as routers and switches) nor newfangled gadgets (such as smart TVs) should use default factory-set administrator passwords. Trey Ford, global security strategist at security company Rapid7, suggests one network for computers, tablets and smartphones used for online banking, shopping and general Web activity another network can be for smart devices. For instance, don't call it " House." Instead, call it something random, such as "FBI Surveillance Van."ĭisable guest network access entirely, and to be strict about who - or what - can get on the network.Ĭreate two different Wi-Fi networks if your router can handle multiple SSIDs. ![]() Give your Wi-Fi network an obscure name, or SSID, that doesn't give attackers personal information they can use in social-engineering attempts. Make sure the home wireless network is instead protected by the Wi-Fi Protected Access II (WPA2) protocol and a strong, complex password. The old Wired Equivalent Privacy (WEP) protocol is still widely used, but it is weak and easily compromised. Here are some steps to protect your home network and the gadgets connected to it. How to make your connected home more secure The Internet of Things is not a case of "just connect and you are done," Sherry said. "Consumers need to focus on their perimeter and do the basics."įirst, accept that "you will be compromised," Sherry warned, adding that users should lock down as much as they can and invest in fraud monitoring and identity protection. "The sad part is that protecting the device itself is near impossible," said Christopher Martincavage, a senior sales engineer at cloud-security company SilverSky. Networking infrastructure is what makes the Internet of Things possible, and as more types of devices get assigned Internet Protocol addresses, it becomes even more important to stick to network-security basics. What do Internet of Things devices have in common? They are all somehow connected to a network. In the "Internet of Things: Connected Home" survey, the results of which were released in June, 70 percent of respondents said they were somewhat or extremely concerned about the prospect of a data breach as a result of connected appliances. The good news is that many people already think about protecting their data, according to a survey of 1,801 tech-savvy homeowners in 11 countries conducted for network-security provider Fortinet. Burglars could use data stolen from either type of device to know when to break into homes while residents are away. So could alarm systems that can be remotely accessed via smartphone apps. ![]() For example, the best fitness trackers that monitor the wearer's location could give hackers details about daily routines and patterns.
0 Comments
Leave a Reply. |