A Christmas present may endanger the security of your entire home

A smart device received as a Christmas gift or otherwise just purchased without better information can endanger the data security of the home. The Cyber ​​Security Center explains how it is possible to minimize the risks.

The Cyber ​​Security Center tells you how to minimize the risks associated with IoT devices. Adobe Stock

The Finnish Transport and Communications Agency Traficom’s Cybersecurity Center warns in his weekly review Information security risks of IoT devices.

IoT (Internet of Things) is most commonly translated as internet of things. Software company Kaspersky has defined it as a system of interconnected IT devices that can collect and transfer data over a wireless network without human input.

IoT devices are not only laptops or smartphones, but also smart home appliances connected to the Internet, remotely controlled lights and sockets, surveillance cameras and many other smart home solutions.

Take care of updates

If you’re buying an IoT device yourself, it’s a good idea to add data security to the list of features to check. You can ask the seller, for example, how long the device will receive security updates.

– The device can become unsafe and unusable if the manufacturer does not fix the vulnerabilities in it or keep the product’s information security features up to date, the Cyber ​​Security Center points out and emphasizes that smart devices purchased for the household should also be kept updated.

If the device has already been purchased or received, for example, as a gift, its possible default password must be changed to another upon commissioning.

The story continues below the picture.

More and more homes have home appliances and other smart systems connected to the network. Adobe Stock

A criminal can take control of the device

If the device is subject to a data breach, the situation can be serious.

– Then the criminal often has the opportunity to access all the information contained in the device, to control the device, or to use it as a foothold, i.e. as a springboard to other devices both in the device’s home network and elsewhere on the Internet, the Cybersecurity Center points out.

– If possible, make your own separate network for IoT devices, that’s a tip.

Don’t acquire useless intelligence

The more important the device, the greater the risks to it. Critical devices include home surveillance cameras, remote-controlled locking systems, and HVAC and electrical systems.

The Cybersecurity Center urges you to avoid “useless intelligence” when purchasing home appliances.

– Think about whether you really need the device and its smart features.

Sources: Cyber ​​Security Center, Kaspersky

ttn-54