Bluetooth technology can make your life easier by letting you to wirelessly connect your devices. But if you’re not careful, a cyber criminal can easily join the party.


Don’t let the Bluetooth bite

Wired devices are quickly becoming a thing of the past. More and more phones, laptops, and tablets are ditching the wires and encouraging the use of wireless Bluetooth devices like printers, headphones, and keyboards.

Since many of your devices carry sensitive data, you'll want to take extra care when connecting with Bluetooth, particularly in public places. If hackers can detect your Bluetooth, it's also possible for them to hack your device.

Risks to you


Hacking is any action taken to get unauthorized access to a device or account.

When you turn on your Bluetooth, your device becomes discoverable to other Bluetooth enabled devices within range. This can make your device vulnerable to malicious users who are trying to gain access to your information. To help protect your device and your data, always turn Bluetooth off when you’re not using it.


Malware is malicious software designed to infiltrate your device.

Malware, like viruses, can spread through Bluetooth connections. Viruses can have a harmful effect on your device by allowing your data to be stolen.

Lock up your linked devices

"a large Bluetooth symbol with a large red X in the centre, and notifications with eyes"

Turn Bluetooth off

Two devices using Bluetooth have to "see" each other before they can connect. Unless you need to use it, always set your device’s Bluetooth to hidden or undiscoverable mode so hackers or strangers can't connect to your device, especially in crowded or public areas.

"dialogue boxes with eyes looking at each other, with update circles"

Don’t connect with strangers

You should never use Bluetooth to connect to unknown, untrusted, or suspicious sources and you should never accept files from these devices.

"a person holding a tablet with dialogue bubbles surrounding him"

Unpair your devices

If one of your Bluetooth devices is lost or stolen, make sure to delete it from your list of paired devices right away on all your other Bluetooth devices. Since they are all connected, one lost device can provide access to the rest.


How to secure your smart devices against cyber threats this summer

How to secure your smart devices against cyber threats this summer

Gearing up for another summer at home with your smart devices? Here’s how you can secure them against cyber threats.



Read up on the latest cyber threats and tips for keeping yourself, your family and your business cyber safe.



Visual learner? Check these out for tips and tricks to keep yourself, your family and your business secure from cyber threats.

Become a champion

Become a champion

Become a Get Cyber Safe champion to help improve internet security for yourself, your organization, and all Canadians.

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: