Smart Home Automation


Seven tips for securing your home IT

28 October 2020

Paul Ducklin, principal research scientist at IT security company Sophos, offers some tips for keeping IoT devices and other connected computers secure at home – especially if you are working from home as well.

Ducklin says there are seven questions you should ask yourself about devices on your home network and about the setup of your network in general. Think of it as going through your very own Cybersecurity Awareness Month at home.

1. Do I actually need this device online? If not, consider removing it from your network. Or if you don't need it listening in or activated all the time, consider powering it down when you aren't using it. (Simply unplugging it from the wall socket is often all you need to do.)

2. Do I know how to update it? If not, find out how; if the vendor can't reassure you about security updates, consider switching products to a vendor that does (and see step 1).

3. Do I know how to configure it? Make sure you know what security settings are available, what they are for, and how to set them up (and see step 2).

4. Have I changed any risky default settings? Many IoT devices come with remote troubleshooting features turned on, which crooks may be able to abuse, and default passwords, which the crooks will definitely know. Check and change defaults before you make the device live (and see step 3).

5. How much am I sharing? If the device is hooked up to an online service, familiarise yourself with how much data the device is sharing, and how often. You may be happy to share some data, but never feel squeezed into turning all the options ‘to the max’ (and see steps 3 and 4).

6. Can I ‘divide and conquer’ my network? Some home routers let you split your Wi-Fi into two networks that can be managed separately. This is useful if you are working from home because it means you can put your home IoT devices on a ‘guest’ network and your work devices, such as a laptop, on another.

7. Do I know who to turn to if there's a problem? If your work has an IT department or offers access to tech support, make sure you know where to report anything suspicious. Ask them what information they are likely to need and provide it at the outset in order to speed up the process.

“By the way,” adds Ducklin, “if you're an IT department looking after remote workers, make it easy for your less-technical colleagues to reach out for cybersecurity advice, or to report suspicious activity, and take the attitude that there's no such thing as a stupid question.”


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Obituary: Steven James Meyer
January 1957 - January 2022

Technews Publishing News
It is with deep sadness and shock that we announce the sudden death of SA Instrumentation & Control Editor, Steven Meyer. Steven joined Technews in October 2007 in the position of Deputy Editor. His ...

Read more...
From the editor's desk: Weather forecast – partly sunny, moderately windy, opportunities on horizon
Technews Publishing Editor's Choice News
Be it wind or solar, new business is on the horizon for the South African manufacturing sector to support REI4P, and new opportunities are in the offing for companies including those in the electronics industry.

Read more...
LPWAN markets and applications
Avnet Silica EBV Electrolink Technews Publishing Telecoms, Datacoms, Wireless, IoT
In South Africa, the large installed base of IoT devices using legacy telecommunication protocols is a hindrance to the advancement of LPWAN and the continued kerfuffle over radio frequency spectrum is hampering this market.

Read more...
From the editor's desk: China’s growing hunger for chips
Technews Publishing News
No, this column is not about the chips you eat, I’m talking about the chips we in the electronics industry know and love best – those of the semiconductor variety. In light of China’s escalating aggression ...

Read more...
From the Editor's desk: Hacking sure ain’t what it used to be
Technews Publishing News
There was a time when the idea of security exploits involving the Internet of Things (IoT) amounted to little more than amusement over someone having managed to hack into their home network through a ...

Read more...
A technical overview of three top LPWAN architectures
Technews Publishing Editor's Choice Telecoms, Datacoms, Wireless, IoT
Hopefully one day soon, enough broad network rollouts will come online that it will become a simple case of choosing the one that fits your application, and your pocket, just right.

Read more...
The LPWAN state of play in SA
RF Design Technews Publishing Altron Arrow Otto Wireless Solutions Editor's Choice Telecoms, Datacoms, Wireless, IoT
To help give our readers the low-down on what to be aware of and what to expect for the future, we consulted a few leading minds on the subject to get some of their insights and opinions.

Read more...
From the Editor's desk: Turning off the 2G taps
Technews Publishing News
Update: Following the publication of this article, specifically the part about Cell C, the company reached out to set the record straight on its strategy around the decommissioning of its RAN (radio area ...

Read more...
From the Editor's desk: Sustainability in an unsustainable world
Technews Publishing Editor's Choice News
It is probably the case that almost every generation of humans has believed it faces ‘unprecedented’ challenges of one kind or another. Partly this can be put down to us having relatively short ‘cultural’ ...

Read more...
Electronics News Digest
Technews Publishing News
South Africa A multi-million rand programme to fund research and innovation initiatives in Africa was launched under the Horizon Europe programme during a virtual event held be the Department of Science ...

Read more...