Smart Home Automation


Ten cybersecurity smart home tips from Ben-Gurion University

1 September 2018 Smart Home Automation Cyber Security

From laptop computers to off-the-shelf devices, the cyber vulnerabilities keep multiplying as homes and offices incorporate more internet-connected devices. According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.

“There’s a wide range of steps consumers can easily take, though some require a bit more focus or technical prowess,” explains Dr Yossi Oren, a senior lecturer in BGU's Department of Software and Information Systems Engineering and head of the Implementation Security and Side-Channel Attacks Lab at Cyber@BGU. “In previous research we found that internet-connected devices such as baby monitors, home security cameras, doorbells, and thermostats were easily hacked by our researchers. Password protection and updated devices are just as important in a smart home as they are on a computer or mobile phone.

BGU’s Hacktober Tips for Product Security

With the goal of making consumers smarter about smart homes, BGU researchers offer a number of tips to keep families and their IoT devices more secure:

1. Never use the same password on multiple websites or online services. Both Apple and Google offer free password managers that can take care of your passwords for you, and even automatically suggest strong passwords that are hard to crack.

2. Turn on ‘two-factor authentication’ to prevent hackers who’ve stolen your password from logging into your Facebook or Google account. Two-factor authentication sends a text message with a login code to your phone to verify it’s you.

3. On the heels of the recent Facebook hack, in addition to changing your password, use the Facebook settings screen to review the list of apps and websites which you granted access to your data. Remove any apps or websites you don’t recognise and trust.

4. Don’t fall prey to clever phishing scams that ask for payment and indicate they have an old password that you recognise. It was likely bought on the dark web.

5. Do cover your computer camera with tape or use a specially made camera cover to prevent prying eyes.

6. Buy IoT devices (cameras, baby monitors, etc.) only from reputable manufacturers and vendors. Change the admin password as soon as you can connect it. Annually check for security updates which you download.

7. Avoid used IoT devices like routers or cameras. They could already have malware installed.

8. Call your Internet service provider and request an updated router. Many are years old and don’t have the latest security updates. Change the Wi-Fi password on your home router.

9. Automatically back up your data - pictures, contacts and documents. If a computer is compromised, it may be easier to just reformat it than to find the malware, and it will allow your devices to function better.

10. Evaluate your family’s cyber health. While you yourself may be relatively cyber safe, make sure others in your family, like an elderly parent or teenager, are taking similar precautions.

“In only an hour or two, most of these steps can be accomplished, saving you significant headaches, serious theft and the loss of privacy or priceless data,” Dr Oren says.





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Jian: The double-edged cyber sword
Issue 1 2021 , Editor's Choice, Cyber Security
A Chinese-affiliated attack group (APT31) cloned and actively used an American-affiliated attack group’s (Equation Group) cyber-offensive tool codenamed EpMe. Both attack tools exploit a then unknown Windows vulnerability for elevating the privileges of the attacker on the infected machine.

Read more...
Ring Africa launches new cameras in SA
Issue 8 2020 , News, CCTV, Surveillance & Remote Monitoring, Smart Home Automation
Ring Africa has officially launched a range of indoor and outdoor home security cameras in South Africa.

Read more...
Liquid Telecom unveils Cybersecurity unit
Issue 8 2020 , News, Cyber Security
Liquid Telecom has unveiled its Cybersecurity unit, which offers end-to-end managed services for digital security solutions.

Read more...
Nclose moves to secure Microsoft 365 environment
Issue 8 2020 , News, Cyber Security
Nclose has launched dedicated Microsoft 365 managed security services within its Managed Security Services division, to help enterprises with newly-remote workforces close gaps in their security environment.

Read more...
Tips on secure remote working
Issue 3 2020 , IT infrastructure, Cyber Security
NordVPN advises how to stay secure while working from home during the coronavirus outbreak.

Read more...
2020 cybersecurity predictions
Issue 2 2020 , Security Services & Risk Management, Cyber Security
KnowBe4 has compiled a list of its top 10 cybersecurity predictions for 2020 from its executive leadership team and array of security awareness advocates from around the world.

Read more...
What are the cybersecurity issues in video surveillance?
November 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
he importance of the data captured by surveillance cameras – and what can be done with it – has led to a new breed of cybercriminals, looking for insights to steal and sell.

Read more...
Cyber-securing your surveillance infrastructure
CCTV Handbook 2019, Genetec, Hikvision South Africa , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
When it comes to cybersecurity, understanding the risks and the solutions as well as engaging in open communication helps everyone.

Read more...
Keeping your things to yourself
October 2019, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Three experts spoke to Hi-Tech Security Solutions to offer advice on keeping your IoT working for you and not for cyber criminals.

Read more...
IoT in security
October 2019, Duxbury Networking, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Using the Internet of Things is not really optional these days, but securing the Internet of Things is compulsory, no matter what industry you operate in.

Read more...