Paul Ducklin, principal research scientist at IT security company Sophos, offers some tips for keeping IoT devices and other connected computers secure at home – especially if you are working from home as well.
Ducklin says there are seven questions you should ask yourself about devices on your home network and about the setup of your network in general. Think of it as going through your very own Cybersecurity Awareness Month at home.
1. Do I actually need this device online? If not, consider removing it from your network. Or if you don't need it listening in or activated all the time, consider powering it down when you aren't using it. (Simply unplugging it from the wall socket is often all you need to do.)
2. Do I know how to update it? If not, find out how; if the vendor can't reassure you about security updates, consider switching products to a vendor that does (and see step 1).
3. Do I know how to configure it? Make sure you know what security settings are available, what they are for, and how to set them up (and see step 2).
4. Have I changed any risky default settings? Many IoT devices come with remote troubleshooting features turned on, which crooks may be able to abuse, and default passwords, which the crooks will definitely know. Check and change defaults before you make the device live (and see step 3).
5. How much am I sharing? If the device is hooked up to an online service, familiarise yourself with how much data the device is sharing, and how often. You may be happy to share some data, but never feel squeezed into turning all the options ‘to the max’ (and see steps 3 and 4).
6. Can I ‘divide and conquer’ my network? Some home routers let you split your Wi-Fi into two networks that can be managed separately. This is useful if you are working from home because it means you can put your home IoT devices on a ‘guest’ network and your work devices, such as a laptop, on another.
7. Do I know who to turn to if there's a problem? If your work has an IT department or offers access to tech support, make sure you know where to report anything suspicious. Ask them what information they are likely to need and provide it at the outset in order to speed up the process.
“By the way,” adds Ducklin, “if you're an IT department looking after remote workers, make it easy for your less-technical colleagues to reach out for cybersecurity advice, or to report suspicious activity, and take the attitude that there's no such thing as a stupid question.”
Obituary: Steven James Meyer January 1957 - January 2022 Technews Publishing
It is with deep sadness and shock that we announce the sudden death of SA Instrumentation & Control Editor, Steven Meyer.
Steven joined Technews in October 2007 in the position of Deputy Editor. His ...
Read more...LPWAN markets and applications Avnet Silica EBV Electrolink Technews Publishing
Telecoms, Datacoms, Wireless, IoT
In South Africa, the large installed base of IoT devices using legacy telecommunication protocols is a hindrance to the advancement of LPWAN and the continued kerfuffle over radio frequency spectrum is hampering this market.
Read more...The LPWAN state of play in SA RF Design Technews Publishing Altron Arrow Otto Wireless Solutions
Editor's Choice Telecoms, Datacoms, Wireless, IoT
To help give our readers the low-down on what to be aware of and what to expect for the future, we consulted a few leading minds on the subject to get some of their insights and opinions.
Read more...Electronics News Digest Technews Publishing
News South Africa
A multi-million rand programme to fund research and innovation initiatives in Africa was launched under the Horizon Europe programme during a virtual event held be the Department of Science ...