Tech Made Simple

Hot Topics: Holiday Gift Ideas | How to Fix Bluetooth Pairing Problems | How to Block Spam Calls | Snapchat Symbol Meaning

We may earn commissions when you buy from links on our site. Why you can trust us.

author photo

6 Must-Do Steps for Securing Smart Home Gadgets

by Elizabeth Harper on March 08, 2017

New smart devices arrive on the scene every day, with speculation that 24 billion gadgets will make up the internet of things by 2020. Those “things” are made up of the tech that powers our smart homes, from lights to locks, and their growing number has made them a tempting target for hackers.

While hackers aren’t very interested in what time your smart lights turn on and off, they can cause a lot of trouble using your connected devices. Last year we saw a distributed denial of service (DDoS) attack in which hackers sent so much traffic to internet service providers that it caused a major internet outage, taking down services like Netflix and Spotify. DDoS attacks are nothing new, but in this case the hackers made their attacks using the internet of things—in particular, connected security cameras.

It’s relatively easy for hackers to attack smart home devices because many of them aren’t secure. And while last year’s attack only took out a streaming music service, the next attack on unsecured connected tech could cause a DDoS that shuts down credit card servers or spies through your smart camera and steals your personal data.

Fortunately, there’s an easy answer: secure your connected gadgets. Digital security can be complicated, but if you follow a few simple rules, you can keep your smart tech secure. Here are our top tips.

1. Does it need to be connected to the internet?

In some cases, it’s hard to buy a product that’s not smart. TVs are a great example of this. Almost all new TVs come with built-in internet connectivity so they can access streaming services. But if you use a Roku or Apple TV, there’s no need to connect your smart TV to the network.

If a smart device doesn’t need to be online, don’t put it online, which opens it up to hacking.

2. Change the default password

If any tech you buy comes with a default password, the first thing you should do is change it. Default passwords offer hackers an easy way in to your gadgets, and they’re so simple to change that you really have no excuse not to. The same advice goes for any online accounts your gadgets connect to. Many store or share data using a cloud service, such as cameras that let you view video from anywhere. Make sure those accounts have a strong password.

Use a unique password for every service so that problems with one service doesn’t mean password problems for every site. Consider a password manager to help you keep track of those passwords.

3. Update the software

All your connected gadgets use software or firmware to make them work, and like the software on your computer or smartphone, it needs to be kept up to date. As manufacturers find problems or security vulnerabilities in the software, they provide updates. To avoid being hacked, you’ll want to install those updates as soon as possible.

The smarter your smart device, the more likely it will be able to check for and install updates on their own. More basic smart devices will likely require you to watch for patches yourself. Create an item on your calendar to remind you to check for software updates, so your gadgets are always running the latest software.

4. Only access your smart home from secure devices

Even if your smart home devices are completely secured, if you access them from unsecured devices, they’re still vulnerable to hackers. Using a public computer could allow others to access your connected gadgets, and using a computer without antivirus protection could allow malware onto your connected gadgets. Don’t let your security stop with your smart home!

5. Only buy smart gadgets from reputable brands

Internet-connected devices open up a world of possibilities by letting you access your gadgets from anywhere. But there’s a catch: they often rely on manufacturer support. Any device that stores data in the cloud requires that the manufacturer maintain the cloud so you can access it. If the manufacturer goes out of business or decides to sunset the product, you may find yourself with a very expensive paperweight.

And if you buy from a manufacturer not known for connected products, you may wind up with a gadget that’s simply not secure. The smart stuffed animal CloudPets is an example of both. The gadget stored messages online without any security, and as the manufacturer struggles financially, there’s little incentive to secure your data.

6. Be careful about used devices

Used connected products can mean trouble. There may be no way to clear data already on the device. The manufacturer may not let you transfer ownership to a second party.

Before you buy a used smart product, check the details. Will you be able to gain access to use it, and can you be sure no one else has access to it? Look up the manual online; if anything remains unclear, a web search may point you in the right direction.

[Image credit: Smart home concept via Shutterstock]


Topics

Automation Systems, News, Health and Home, Home Safety & Security, Lighting, Blog


Discussion loading

gravatar

From Earrel on March 12, 2017 :: 4:28 am


Play me no if you can I put spy stuff on and they take it off I’m not a dishonest person and I don’t want to have flriends that are becouse I don’t run the phone good I have to protect myself from then I think I no who it is just want to be sure there not good oeople

Reply

gravatar

From Steve Reeves on April 28, 2017 :: 10:18 pm


I think you’re right… default passwords are one of the biggest culprits.

If your password is “password” then hackers don’t even need to try to bypass the built in security.

Reply

gravatar

From Bill Lintner on June 13, 2017 :: 12:21 am


Really very nice information service provider for home security, thanks for sharing the article. For residential & commercial wireless security system, one can go to www.cinemagicllc.com to get the reviews on available security systems that can help you choose your choice of home security.

Reply

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships | Licensing & Permissions
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.