IoT in your home: what are the risks?

1 September 2018 Information Security

Smart homes are getting even smarter, with Internet of Things (IoT) devices rapidly coming to market to make homes more efficient and daily life more convenient. But any Internet connection comes with risk attached, and IoT in homes could increase your vulnerability, warns Fortinet.

IoT takes smart home technology a step further into the future, adding smart sensors and independent Internet connections to appliances and devices to take the task of controlling them out of the hands of their owners. For example, where smart fridges or air conditioners might need to be controlled using a mobile app, an IoT-enabled appliance might control itself without needing the homeowner’s input.

IoT-enabled appliances measure temperature or available light, for example, to automatically trigger an action in an appliance. By using IoT sensors and connected SIMs, manufacturers are now producing heaters and air conditioners that switch on and off to maintain a constant room temperature, lights that switch themselves on when a room is dark, planters that automatically water plants when needed, or door locks that recognise the home owner and unlock without them needing keys.

“IoT-enabled appliances will certainly start arriving in the homes of ordinary South Africans soon,” says Doros Hadjizenonos, regional sales director at Fortinet. “People are already moving to smart homes and embracing devices such as smart TVs and media servers. While these devices make life simpler and easier, the challenge is that not all manufacturers make security their top priority when building smart devices.”

Fortinet’s latest Global Threat Landscape Report found that cyber criminals are already targeting IoT devices and media servers in homes for ‘cryptojacking’, in which they use a device’s computing power to mine cryptocurrency. The report said: “They are an especially attractive target because of their rich source of computational horsepower, which can be used for malicious purposes. Attackers are taking advantage of them by loading malware that is continually mining because these devices are always on and connected. In addition, the interfaces for these devices are being exploited as modified Web browsers, which expands the vulnerabilities and exploit vectors on them.”

“Cryptojacking in itself may not be a direct threat to the owner of the IoT device, although it could make it run slower,” says Hadjizenonos. “But once the code in the home is being controlled by someone else, they could also turn their attention to monitoring personal information on the home network.”

Globally, smart devices such as baby monitors and even smart vacuum cleaners have been hacked in the past, and Hadjizenonos says there is little prevent criminals from stealing passwords, monitoring the movements of homeowners, or tracking their children in future.

“Consumers typically connect their smart appliances via one router, so this is where smart home security efforts should be focused,” he says. “Before investing in smart and IoT-enabled devices, it’s recommended that homeowners ensure that their networks are secure, take advantage of security services from their ISPs, and lock down their routers. Once they invest in smart appliances, they should remember to check regularly for patches and updates to keep these appliances and devices secure.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
The role of safe storage in mitigating burglary and fire risk
Smart Home Automation Fire & Safety
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...
Cyber attack surface expanding
Asset Management Information Security Logistics (Industry)
Despite the increasing number of attacks, analysis of Allianz Commercial cyber claims shows that severity is down by 50% and large-claim frequency by 30% in H1 2025, driven by larger companies’ enhanced detection and response capabilities.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.