Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world.
Why Should We Care?
- Cars, appliances, wearables, lighting, healthcare, and home security all contain sensing devices that can talk to another machine and trigger other actions. Examples include devices that direct your car to an open spot in a parking lot; mechanisms that control energy use in your home; and tools that track eating, sleeping, and exercise habits.
- New Internet-connected devices provide a level of convenience in our lives, but they require that we share more information than ever.
- The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the Internet, you and your device could potentially be vulnerable to all sorts of risks.
- With more connected “things” entering our homes and our workplaces each day, it is important that everyone knows how to secure their digital lives.
Simple Tips to Own It.
- Shake up your password protocol. Change your device’s factory security settings from the default password. This is one of the most important steps to take in the protection of IoT devices. According to NIST guidance, you should consider using the longest password or passphrase permissible. Get creative and create a unique password for your IoT devices. Read the Creating a Password Tip Sheet for more information.
- Keep tabs on your apps. Many connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.
- Secure your network. Properly secure the wireless network you use to connect Internet-enabled devices. Consider placing these devices on a separate and dedicated network. For more information on how you can secure your network, view the National Security Agency’s Cybersecurity Information page.
- If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems. If you have the option to enable automatic updates to defend against the latest risks, turn it on.
Source: https://niccs.us-cert.gov/national-cybersecurity-awareness-month-2019
Mark Pugh
Director of Operations, Indianapolis
Mark Pugh is currently Director of Indianapolis Operations for Peoria based IT360, Inc. He is a US Air Force veteran who has spent the last 35 years working with computer and information technology in its many forms over the years, including cyber security, Instrumental in 3 startups since 1995, he was awarded Key Technical Contributor by INITA as part of its Million Dollar Awards in 1999. Most recently Mark ran his own startup Managed Service Provider which recently merged with IT360 in 2018.