A smart home is equipped with several internet-connected devices, performing a specific set of functions. Even though these devices simplify users’ lives, they also give rise to new complications in home security.
Download and share the infographic for free with employees.
How an attacker utilises compromised devices?
The attacker can utilise the capabilities and functions of the devices that are connected to the compromised devices for malicious activities.
- Smart bulb
Turn on all of the lights in the home or facility to overload the power system.
- Smart voice assistant
Play their voice commands or steal voice data as credentials for other voice command systems.
- Smart lock
Take control of who gets in or out of the house or facility.
- Smart gateway
Control connected devices remotely, redirect or modify connections to their advantage.
Spoof other devices connected to the watch and steal user data.
How to secure smart devices?
- Avoid public Wi-Fi networks and use a strong encryption method for Wi-Fi network access.
- Change default and weak passwords of the devices to avoid unwanted access or attacks like brute force or dictionary etc.
- Ensure that security patches are applied as soon as they are released.