The Internet of Things at Home

Related blog posts
Internet of Things (IoT) in the Home
- Entertainment systems including a television, gaming system, speakers and headphones
- Heating and cooling systems such as the a thermostat, ceiling fan, carbon monoxide detector and smoke alarm, and lights
- Home security systems including alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants
- Smart home appliances like a refrigerator, coffee maker, oven, and vacuum
IoT on the Go
- Connected smart cars, buses, trains, and airplanes
- Wearables like a fitness tracker, watch Healthcare devices like heart and blood pressure monitors are converting to smart devices as well. Even your pet can be connected with a tracking collar.
How IoT technology works
Web-enabled smart devices transmit information gathered from their surroundings using embedded sensors, software and processors. Smart devices communicate with one another (machine to machine) or with us through our smartphones. After initial setup, most smart devices work automatically, collecting and sending information.
Why IoT is popular
Because of the automatic nature of the IoT, smart devices have many advantages. Coffee starts brewing when your alarm goes off in the morning. Your child forgets their keys, but you can unlock the door from work. You can remotely monitor your home and your family to keep them and your belongings safe. You can streamline your home's functions to make things run more efficiently. The IoT can change how you organize and schedule, and adding convenience and connection.
What are the risks?
With the automatic flow of information and connection between IoT devices comes a new set of cyber security risks. If you can access all your data remotely, a cybercriminal might be able to as well. The very nature of the IoT is connectivity, but with so many devices on one network, hackers could have multiple access points to your information. That's why security settings can be important. For example, a thermostat connected to your home network that is not properly secured could be a gateway to your identity, money, your address and other devices.
Not only is a breach of information a risk, but also someone taking control of a device and its functions. For example, someone hacking your smart lock system may not steal information, but they may be able to unlock the doors and steal your belongings.
How a cyber attack works
Using malware, hackers can turn devices into remote-controlled "bots”. These “bots” can be used to spread viruses and other malware, and even conduct a distributed denial-of-service (DDoS) against other systems. Once compromised, a device's camera and microphone can also be used by the hacker. In fact, some baby monitors, children's toys, as well as certain insulin pumps and pacemakers have been shown to be hackable. An added concern is that some manufacturers of smart devices reserve the right, in the terms and conditions, to store data and share it.
Protect yourself: #ConnectSmarter with the IoT
As more and more everyday objects become connected IoT devices, there are simple things you can do to protect your privacy and security:
- Change the manufacturer's default user names and use strong passwords for your Wi-Fi network and smart devices. Don't use anything that could be associated with your name, address or phone number.
- Enable a lock-screen password on devices.
- Use up-to-date security software on your home computer and connected devices. Update operating systems of all your devices.
- To limit the damage of a cyber-attack, separate your IoT devices from your main network. Ask your service provider for help to create a ‘guest' network for your IoT devices.
- Understand what personal information is being collected and why it's needed before you buy IoT devices or download apps.
- Turn off geolocation when it isn't needed; if an application can see your location, a hacker could too.
- Set the camera and microphone off when you are not using it.
- Maintain good cyber security practices (e.g. don't open attachments from people you don't know, don't use automatic login, etc.)
Explore this Smart House to see how to #ConnectSmarter with the Internet of Things
Transcript
Intro
Explore this Smart House to #ConnectSmarter with the Internet of Things (IoT)
Smart TV
Risk
Your camera and microphone could be monitored by cyber hackers if not secure
Smart TV
Security tip
Prevent unauthorized recording
• IoT cameras and microphones are sensors that collect information
• Turn off cameras and microphones when not in use
Smart Fridge
Risk
An unsecured smart fridge could put the data on your home network at risk
Smart Fridge
Security tip
Protect sensitive network information
• Keep IoT devices on separate networks
• Ask your service provider to set up a ‘guest’ network
Smart thermostat
Risk
Your smart thermostat’s default username and password can be uncovered, leaving your data and your daily routines unprotected
Smart thermostat
Security tip
Defend your devices
• Change the manufacturer’s default username
• Use complex, unique passwords for each device
Smart alarm system
Risk
A smart alarm system with out-of-date software could result in an unlocked home
Smart alarm system
Security tip
Stay updated to mitigate cyber incidents
• Set device security software and operating systems to auto-update
• Turn on update notifications
Smart home assistant
Risk
An unsecured smart home assistant could expose your credit card information
Smart home assistant
Security tip
Protect your privacy
• Read the privacy terms before you buy
• Understand what personal data is being collected and why
Smart speakers
Risk
A smart speaker may not have adequate security measures to protect your data
Smart speakers
Security tip
Do research before you buy
• Check for security info on the device’s website
• Look for built-in security and privacy measures
Gaming system
Risk
An unsecured gaming system could expose your personal info or your children’s
Gaming system
Security tip
Protect your identity
• In settings, turn off geolocation when not in use
• Create usernames that don’t contain identifying info, like real names, location and birthdate
Learn more about IoT devices and how to #ConnectSmarter at GetCyberSafe.ca
© Her Majesty the Queen in Right of Canada, as represented by the Minister of Public Safety and Emergency Preparedness Canada, 2017
- Date modified: