• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos2 Stats

Securing the Internet of Things - #30SecTech video

Wearable devices, the connected home, and the connected car, although all relatively new technologies, have quickly become the new rage in tech. Everything from the devices in your pocket, to the appliances in your home, and the car you drive can transmit information about your life habits because they all have one thing in common: they are connected to the Internet and you are connected to them. And in some cases they are connected to each other. This new tech phenomenon is called the Internet of Things (IoT).

The Internet of Things allows wearable devices such as wristbands and heart monitors to track your fitness and health goals. These devices can even track the places you’ve visited and your current location. The connected home has brought new meaning to concept of convenience. Whether you need to check the cameras in your home, lock or unlock a door, adjust temperature or lighting, pre-heat the oven, or turn off a TV—you can do it all remotely with just a few taps on your smartphone. Modern cars are also becoming increasingly computerized, and automakers are working with technology companies to bring you a truly connected experience in your car that goes beyond the standard blue tooth technology.

With the rapid adoption of new IoT innovations and products that enter the market, and both consumers and companies embracing the transformation, the Internet of Things is only expected to continue to see growth. This is exciting for the tech enthusiast in all of us, but just remember that when you’re connected to everything, everything can now access your information, which can make all of these connected technologies an attractive target for people who want to make a profit off of that information. Every Internet-connected device you own adds another privacy concern to think about, especially since most of them connect to your smartphone. Smartphones are the most connected devices we own, and as more functionalities are added the more information we store in them, this makes smartphones and anything connected to them particularly vulnerable to different types of attacks. According to Symantec’s 2014 Internet Security Threat Report attackers are turning to the Internet of Things and currently the burden of preventing attacks against IoT devices falls on the user.

Therefore, be sure to stay informed and know the surefire ways to stay protected and secure your information today and in the connected future.

Security concerns associated with wearable technology   

Wearable devices are essentially data collectors. The personal data that is collected and stored with these devices, such as your name, age, health and location can aid criminals in stealing your identity. These devices also have the capability to transmit information via Bluetooth LE or wireless Internet, which can leave the information they hold vulnerable to cyber criminal activity.

Symantec Security Response experts conducted an in-depth study on wearable health tracking devices and apps and found that there were multiple vulnerabilities with these devices, which hackers could exploit to gain access to your personal information. 

Tips for securing the personal information in your wearable’s

  • Use caution when using social sharing with these apps. Social sharing features can give away your location and when you were doing your workout. Cybercriminals can use this to track your movements, which could lead to a potential cyberstalking issue.
  • Always make sure you know the privacy policy of the apps you use.
  • Be aware of what data the device or app wants to use on your phone. If it seems illogical or too risky, deny the permission.

Security concerns associated with the connected home

In addition to making daily tasks more convenient, the applications that go along with connected home devices also collect data about your daily habits and usage. Considering that these applications jointly collect data about your home in one central location, you should know what the companies are doing with all of that data. In addition to the collection of this data, do you know how to stay secure from breaches to keep that data from falling into the wrong hands?

Tips for staying protected in the connected home

A smartphone is typically the control center for the connected home and the home Wi-Fi is usually what connects everything. So, securing your connected home is two-fold, thus it’s important to take steps to secure both your home network and your smartphone to avoid potential breaches.

Security concerns associated with the connected car

There are two concerns when it comes to the connected car: access to the vehicle’s computer systems and the data that it collects and stores.

Tips for securing your Connected Car

  • Secure your smartphone, as this is an easier target for hackers.
  • Update software as soon as it is available. Updates normally patch vulnerable security holes.
  • Only visit certified repair centers. Dishonest shops can steal data, inject malware and trigger false repair alerts.
  • If you want to install after market parts, check with your car dealer first to make sure they are safe.
  • Turn off your phone’s GPS when not using GPS services. This makes it harder to constantly track your location.

Experiencing and using new technology is always exciting. It can add convenience, productivity, and entertainment to our lives in new ways we never thought possible. But with new technology also come new risks and security concerns pertaining to our personal information.  You can freely enjoy this new connected technology as long as you are aware of the potential risks and take measures to keep your information secure.

Related articles:

The Connected Home- Just How Safe Is Convenience?

Security Concerns and the Connected Car

Keeping Your Mobile Fitness Data Secure

Cyber Security Concerns and Smartphones