logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
F-Secure
20th July 2018 by CyberVision 0 Comments 924 Views
20th July 2018 by CyberVision in F-Secure

4 Ways to protect your Internet of Things

IoT

 

The Internet of Things (IoT) describes the growing number of intelligent objects that are being connected to the internet and each other. These systems are infiltrating the heart of our critical infrastructure and are forming the basis of current & future smart services. PCs, tablets, smart phones, wearable technology and intelligent home devices are now being adopted at record rate and form part of our everyday lives, even starting to appear on enterprise networks. The lines between whether you are at work or home are also becoming  blurred as more and more people become mobile workers in the knowledge economy with more devices that one may not initially have thought of as being smart devices entering the business networks. This poses a more complex security risk and may have serious consequences. Companies are not always necessarily aware of all devices on their networks. And if you are not aware of something, how do you protect yourself against any possible dangers? Here are 4 useful ways to protect your company’s Internet of things.

 

  1. Know which devices are connected to your network

Note your business’ connected devices — including anything with a microphone or camera — and verify what information each device has access to. You cannot secure your devices if you’re not aware of their vulnerabilities. Insecure connections can make your device vulnerable to hacking, so ensure that you only maintain the use of wi-fi if it is password protected. Not to be ignored, the security of your smart phone is just as important.

  1. Regular password updates

Make sure that you use strong passwords that include a combination of letters, numbers and symbols. It’s important not to use the same password for multiple accounts – otherwise, should a hacker manage to get in, they’ll have wider access to other devices.

  1. Create a separate network for your devices

Many routers allow you to set up multiple networks. Consult your router’s manual to create at least one separate network for your IoT devices. The more you segment your networks, the harder it is for hackers to access all of your devices and information.

  1. Install a firewall

A firewall helps prevent hackers, viruses, and worms from reaching your connected devices over the internet by denying unauthorized traffic. Some computer systems offer a default firewall, which is sufficient for many users. For an added layer of protection, install a firewall that offers more security functions that meet your needs, or configure a hardware firewall to offer wider network defense.

 

In addition to these tips, turning off any smart devices when you aren’t using them, particularly those with microphones and video cameras, will help with your online security. While some connected devices, such as smart thermostats, require a constant internet connection, other devices — including smart TVs, coffee makers, and video cameras — do not. Prevent a hacker from connecting to your video or audio streams by disconnecting whenever you can.

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • f-secure
  • f-secure cyber security
  • Internet of things
  • IOT
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo