The Internet of Things at Home

Related blog posts

Internet of Things (IoT) in the Home

IoT on the Go

How IoT technology works

Web-enabled smart devices transmit information gathered from their surroundings using embedded sensors, software and processors. Smart devices communicate with one another (machine to machine) or with us through our smartphones. After initial setup, most smart devices work automatically, collecting and sending information.

Why IoT is popular

Because of the automatic nature of the IoT, smart devices have many advantages. Coffee starts brewing when your alarm goes off in the morning. Your child forgets their keys, but you can unlock the door from work. You can remotely monitor your home and your family to keep them and your belongings safe. You can streamline your home's functions to make things run more efficiently. The IoT can change how you organize and schedule, and adding convenience and connection.

What are the risks?

With the automatic flow of information and connection between IoT devices comes a new set of cyber security risks. If you can access all your data remotely, a cybercriminal might be able to as well. The very nature of the IoT is connectivity, but with so many devices on one network, hackers could have multiple access points to your information. That's why security settings can be important. For example, a thermostat connected to your home network that is not properly secured could be a gateway to your identity, money, your address and other devices.

Not only is a breach of information a risk, but also someone taking control of a device and its functions. For example, someone hacking your smart lock system may not steal information, but they may be able to unlock the doors and steal your belongings.

How a cyber attack works

Using malware, hackers can turn devices into remote-controlled "bots”. These “bots” can be used to spread viruses and other malware, and even conduct a distributed denial-of-service (DDoS) against other systems. Once compromised, a device's camera and microphone can also be used by the hacker. In fact, some baby monitors, children's toys, as well as certain insulin pumps and pacemakers have been shown to be hackable. An added concern is that some manufacturers of smart devices reserve the right, in the terms and conditions, to store data and share it.

Protect yourself: #ConnectSmarter with the IoT

As more and more everyday objects become connected IoT devices, there are simple things you can do to protect your privacy and security:

Explore this Smart House to see how to #ConnectSmarter with the Internet of Things

MP4 Format (HD)

Transcript

Intro

Explore this Smart House to #ConnectSmarter with the Internet of Things (IoT)

Smart TV
Risk
Your camera and microphone could be monitored by cyber hackers if not secure

Smart TV
Security tip
Prevent unauthorized recording
• IoT cameras and microphones are sensors that collect information
• Turn off cameras and microphones when not in use

Smart Fridge
Risk
An unsecured smart fridge could put the data on your home network at risk

Smart Fridge
Security tip
Protect sensitive network information
• Keep IoT devices on separate networks
• Ask your service provider to set up a ‘guest’ network

Smart thermostat
Risk
Your smart thermostat’s default username and password can be uncovered, leaving your data and your daily routines unprotected

Smart thermostat
Security tip
Defend your devices
• Change the manufacturer’s default username
• Use complex, unique passwords for each device

Smart alarm system
Risk
A smart alarm system with out-of-date software could result in an unlocked home

Smart alarm system
Security tip
Stay updated to mitigate cyber incidents
• Set device security software and operating systems to auto-update
• Turn on update notifications

Smart home assistant
Risk
An unsecured smart home assistant could expose your credit card information

Smart home assistant
Security tip
Protect your privacy
• Read the privacy terms before you buy
• Understand what personal data is being collected and why

Smart speakers
Risk
A smart speaker may not have adequate security measures to protect your data

Smart speakers
Security tip
Do research before you buy
• Check for security info on the device’s website
• Look for built-in security and privacy measures

Gaming system
Risk
An unsecured gaming system could expose your personal info or your children’s

Gaming system
Security tip
Protect your identity
• In settings, turn off geolocation when not in use
• Create usernames that don’t contain identifying info, like real names, location and birthdate

Learn more about IoT devices and how to #ConnectSmarter at GetCyberSafe.ca

© Her Majesty the Queen in Right of Canada, as represented by the Minister of Public Safety and Emergency Preparedness Canada, 2017

Date modified: