5 Tips for Securing Your Smart Devices and IoT Devices

Posted on

2. Create a Secondary or ‘Guest’ Network

You can create multiple networks on your Wi-Fi router. This is mostly used to create kids’ networks with parental controls or guest networks for visitors. You may want to create an additional network that is solely for connecting your IoT devices to. By doing this, you prevent potential hackers from accessing sensitive data, shared files and other bits and pieces from your other devices if they breach your network.

All your Wi-Fi router’s networks should be secured with a strong encryption method and robust password. For routers, the standard and most secure encryption method is called WPA2. This should always be used, even for guest networks.

For passwords, avoid things that are common and easy to guess. A strong password is composed of letters, numbers, and symbols, and each network should have a unique one. You can use a password manager to help you remember them all. Never use your router’s default username and password.

Creating a secondary and tertiary network is easy, and most routers let you do this through a user-friendly GUI.

3. Check Your IoT Device Settings and Keep Them Updated

Your IoT device probably comes with default security settings and you may want to consider changing them. Not all manufacturers have your best interests in mind and the default settings may work to benefit them more than you.

Using an IoT device with a default password? Change it!

Additionally, check that you don’t have features enabled that you don’t need. For example, remote and microphone access might not be required, however, network access will be. This depends on the device and its purpose.

Avoid putting off software updates as these are often patches for security vulnerabilities. Many IoT devices will prompt you when an update is available, but it’s good due diligence to check manufacturer websites often.

4. Enable Two-Factor Authentication

Two-factor authentication

If any of your devices offer two-factor authentication, use it. Two-factor authentication is an additional security layer on top of a device’s password that requires secondary authentication—a one-time code sent via email or SMS—before access is granted.

When used properly, two-factor authentication can stop the bad guys gaining access to your accounts and taking control of your IoT devices.

Prev2 of 3Next

Leave a Reply

Your email address will not be published. Required fields are marked *