Ten cybersecurity smart home tips from Ben-Gurion University
1 September 2018
Smart Home Automation
Information Security
From laptop computers to off-the-shelf devices, the cyber vulnerabilities keep multiplying as homes and offices incorporate more internet-connected devices. According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.
“There’s a wide range of steps consumers can easily take, though some require a bit more focus or technical prowess,” explains Dr Yossi Oren, a senior lecturer in BGU's Department of Software and Information Systems Engineering and head of the Implementation Security and Side-Channel Attacks Lab at Cyber@BGU. “In previous research we found that internet-connected devices such as baby monitors, home security cameras, doorbells, and thermostats were easily hacked by our researchers. Password protection and updated devices are just as important in a smart home as they are on a computer or mobile phone.
BGU’s Hacktober Tips for Product Security
With the goal of making consumers smarter about smart homes, BGU researchers offer a number of tips to keep families and their IoT devices more secure:
1. Never use the same password on multiple websites or online services. Both Apple and Google offer free password managers that can take care of your passwords for you, and even automatically suggest strong passwords that are hard to crack.
2. Turn on ‘two-factor authentication’ to prevent hackers who’ve stolen your password from logging into your Facebook or Google account. Two-factor authentication sends a text message with a login code to your phone to verify it’s you.
3. On the heels of the recent Facebook hack, in addition to changing your password, use the Facebook settings screen to review the list of apps and websites which you granted access to your data. Remove any apps or websites you don’t recognise and trust.
4. Don’t fall prey to clever phishing scams that ask for payment and indicate they have an old password that you recognise. It was likely bought on the dark web.
5. Do cover your computer camera with tape or use a specially made camera cover to prevent prying eyes.
6. Buy IoT devices (cameras, baby monitors, etc.) only from reputable manufacturers and vendors. Change the admin password as soon as you can connect it. Annually check for security updates which you download.
7. Avoid used IoT devices like routers or cameras. They could already have malware installed.
8. Call your Internet service provider and request an updated router. Many are years old and don’t have the latest security updates. Change the Wi-Fi password on your home router.
9. Automatically back up your data - pictures, contacts and documents. If a computer is compromised, it may be easier to just reformat it than to find the malware, and it will allow your devices to function better.
10. Evaluate your family’s cyber health. While you yourself may be relatively cyber safe, make sure others in your family, like an elderly parent or teenager, are taking similar precautions.
“In only an hour or two, most of these steps can be accomplished, saving you significant headaches, serious theft and the loss of privacy or priceless data,” Dr Oren says.
Further reading:
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.
Read more...
Identity and authentication
Technews Publishing SMART Security Solutions
Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity.
SMART Security Solutions obtained insights into the topic and the latest developments from three companies.
Read more...
Smart surveillance and cyber resilience
Axis Communications SA
Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.
Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.
Read more...
Kaspersky detects over 1 million daily tracking attempts
Kaspersky
News & Events Information Security
Kaspersky's latest analysis of the 25 most prevalent web tracking services, including Google services, New Relic and Microsoft, has revealed over 38 billion instances of web trackers collecting user behaviour data in 2024, with an average of one million detections per day.
Read more...
Onyyx wireless alarm
Technews Publishing
Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.
Read more...
Only 4% of surveyed organisations reported no cyberattacks
News & Events Information Security
As cyber threats escalate in frequency and sophistication, new research reveals an alarmingly high rate of security incidents over the past year, due to a lack of awareness and qualified professionals as key contributing factors.
Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.
Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.
Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.
Read more...