Skip to main content
IT Service Status
IT Service Status

Securing Your Internet of Things

There's no denying that new devices are fun, but while there are more opportunities to interact with people, share information, and stay connected, we also need to be aware of the risks these things may introduce. The Internet of Things (IoT) continues to expand as more of our “things” become connected. The IoT can include watches, televisions, appliances, smart speakers, security systems, vehicles and much more. Networked “smart homes are common.

Security Precautions for Connected Devices

Understand what information your devices collect and how that information is managed and used. To ensure that a new device is an asset, rather than a liability, here are a few things to keep in mind:

  • Be aware of what's being collected. Most IoT devices require data collection. Take the time to understand what information your connected devices collect and how that information is managed and used. Ask whether you need that device to be connected. What are the advantages of having your fridge broadcast the whereabouts of your cheese? Is the potential to activate remote maintenance with the device provider important to you? Do you want to interact with that device remotely? Then by all means, keep that connection. If you don't need the maintenance options or to monitor or interact with the device remotely, turn off the device's connectivity.
  • Understand how to keep IoT devices up to date. This includes any software updates that might be needed and passwords or other ways of securing devices.
  • Own your online presence. Be careful about how personal information is collected through apps. Set the privacy and security setting levels for information sharing. Review company policies periodically for changes in terms of agreement.
  • Check your privacy settings. How have you secured your social media accounts? Always be cautious about what you post publicly.

Using your devices to store and process sensitive information every day makes protecting your desktop, laptop, tablet, smartphone, and other devices an important part of securing both your identity and your data. Find out more: Tips for Securing Your Devices.