Security Market Segment LS
Friday, 09 December 2016 08:22

Don’t let IoT spoil your holiday

By

Internet of Things (IoT) devices have a deservedly bad rap when it comes to security. There are too many instances of security cameras, routers, baby monitors, climate control, door locks, appliances and more being hijacked for DDoS or other cyber attacks – or simply letting thieves into a vacant home over the Christmas break.

The problem is that many people don’t realise that IoT has silently invaded their homes. A Wi-Fi router, a media storage device, even a set-top box can all generate alerts, check websites, and most can be remotely updated through insecure backdoors by the manufacturer. If a device becomes part of a botnet, you end up paying as it uses your data to carry out cyberattacks.

There is a free app for iOS and Android, Fing, that is typically called a network sniffer. After signing in with a Google account (iOS not tested), you can also access it from a Web browser. It will reveal all the devices connected to your network, let you set alerts (like email you when it is offline or accessed), tune the network, etc.

Fing app

Fing is also releasing the Fingbox that will detect intruders onto the network, identify bandwidth hogs, find Wi-Fi sweet spots, monitor Internet speed and service quality, and scan for open ports, etc. It looks like a comprehensive offering, but it won’t be shipping until mid-2017.

Domenico Crapanzano, chief executive of Fing said, “There are now so many ways that intruders can enter into unsuspecting homes and cause real damage, so it is of the utmost importance to implement a home network monitoring solution/strategy.”

He recommends that consumers think about IoT before leaving on holidays.

  • Change passwords on both admin and user accounts on routers – this is the main entry point to a home network. If you don’t know how to do this, find or download the router’s manual and persevere.
  • If you have a Wi-Fi security camera, change passwords as well. Not that criminals can disrupt Wi-Fi signals so it may be best to hard wire such critical devices. Check that their alerts have the correct email or SMS address.
  • Change any the passwords of any other devices connected to the network – it is good practice even if you only do it annually.
  • Use strong passwords – at least ten characters with a mix of upper and lower case letters, numerals, and symbols.
  • Have a look at the “apps” installed on connected tablets and devices and check for updates or if you don’t use them uninstall them – a lot of apps gather data from your network so the fewer, the better.
  • The obvious one – switch off IoT devices that you don’t need while you are away.

Crapanzano says that user awareness of the security issues is fine, but you must do something about it. He recommends more research before purchasing and attaching any new IoT devices.

 

 

DIGITAL MARKETING HAS NO SOCIAL DISTANCING OR TRAVEL RESTRICTIONS

As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email andrew.matler@itwire.com

CONTACT US!

LAYER 1 ENCRIPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments