classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Ten cybersecurity smart home tips from Ben-Gurion University
September 2018, Cyber Security

From laptop computers to off-the-shelf devices, the cyber vulnerabilities keep multiplying as homes and offices incorporate more internet-connected devices. According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.

“There’s a wide range of steps consumers can easily take, though some require a bit more focus or technical prowess,” explains Dr Yossi Oren, a senior lecturer in BGU's Department of Software and Information Systems Engineering and head of the Implementation Security and Side-Channel Attacks Lab at Cyber@BGU. “In previous research we found that internet-connected devices such as baby monitors, home security cameras, doorbells, and thermostats were easily hacked by our researchers. Password protection and updated devices are just as important in a smart home as they are on a computer or mobile phone.

BGU’s Hacktober Tips for Product Security

With the goal of making consumers smarter about smart homes, BGU researchers offer a number of tips to keep families and their IoT devices more secure:

1. Never use the same password on multiple websites or online services. Both Apple and Google offer free password managers that can take care of your passwords for you, and even automatically suggest strong passwords that are hard to crack.

2. Turn on ‘two-factor authentication’ to prevent hackers who’ve stolen your password from logging into your Facebook or Google account. Two-factor authentication sends a text message with a login code to your phone to verify it’s you.

3. On the heels of the recent Facebook hack, in addition to changing your password, use the Facebook settings screen to review the list of apps and websites which you granted access to your data. Remove any apps or websites you don’t recognise and trust.

4. Don’t fall prey to clever phishing scams that ask for payment and indicate they have an old password that you recognise. It was likely bought on the dark web.

5. Do cover your computer camera with tape or use a specially made camera cover to prevent prying eyes.

6. Buy IoT devices (cameras, baby monitors, etc.) only from reputable manufacturers and vendors. Change the admin password as soon as you can connect it. Annually check for security updates which you download.

7. Avoid used IoT devices like routers or cameras. They could already have malware installed.

8. Call your Internet service provider and request an updated router. Many are years old and don’t have the latest security updates. Change the Wi-Fi password on your home router.

9. Automatically back up your data - pictures, contacts and documents. If a computer is compromised, it may be easier to just reformat it than to find the malware, and it will allow your devices to function better.

10. Evaluate your family’s cyber health. While you yourself may be relatively cyber safe, make sure others in your family, like an elderly parent or teenager, are taking similar precautions.

“In only an hour or two, most of these steps can be accomplished, saving you significant headaches, serious theft and the loss of privacy or priceless data,” Dr Oren says.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • 2019 cybersecurity crystal ball
    February 2019, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
    Craig Rosewarne, MD of Wolfpack Information Risk says the cyber landscape will be more volatile and dangerous in 2019, are we ready?
  • 50% of companies can’t detect IoT breaches
    February 2019, This Week's Editor's Pick, Cyber Security, IT infrastructure
    Only around half (48%) of businesses can detect if any of their IoT devices suffer a breach. This comes despite an increased focus on IoT security.
  • Data security sits at the heart of democracy
    February 2019, Cyber Security, Security Services & Risk Management
    A succession of high-profile government data breaches both locally and abroad has cast a stark light on the importance of effective public sector cybersecurity policies and protections.
  • Corporate fraud and insider threats
    February 2019, Cyber Security, Security Services & Risk Management
    Insider fraud and theft can often be more damaging to a company than risks from outside.
  • Corporate privacy in a selfie age
    February 2019, Cyber Security, Security Services & Risk Management
    Doros Hadjizenonos, regional sales director at Fortinet in South Africa looks at how CISOs can maintain corporate privacy even as employees adopt emerging technologies.
  • SME cybersecurity: high risk
    February 2019, Cyber Security, IT infrastructure
    Small and medium-sized businesses are becoming more attractive targets for cyber criminals – both direct and also as a starting point for larger attacks across a supply chain.
  • Kaspersky unveils new partner programme
    February 2019, Kaspersky Lab, News, Cyber Security
    Specialised, enabling and profitable: Kaspersky Lab unveils new programme to empower its partners and improve services to clients.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Using tomorrow’s tools to solve ­today’s security problems
    November 2018, Access Control & Identity Management, Cyber Security, Integrated Solutions
    It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions.
  • NEC XON talks Industry 4.0 and disruption
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Conferences & Events, Training & Education
    NEC XON held its seventh annual summit at Sun City in October this year in which it focused on the Fourth Industrial Revolution (IR4) and how it would disrupt the status quo.
  • Our dependence on cyber-connectivity
    November 2018, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security, Government and Parastatal (Industry)
    The health, safety, security, economic well-being of citizens, effective functioning of government and perhaps even the survival of the industrialised world relies heavily upon interconnected critical systems.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.