Internet Of Things (IOT), are generally simple or single purpose devices/computers with connectivity to the internet.
Why should we care?
- These devices are INSIDE your network.
- These devices are generally low cost and therefore to continually develop updates/security patches for them reduces ROI for the company selling/making them.
- Insecure/unpatched devices inside your network are a threat/potential entrance to the rest of your network (and valuable data/resources)
Consider this: Does your ring doorbell really need to be on the same network as your production machine you use to work remotely from home? How about the Amazon dash buttons for ordering more laundry soap, your smart TV, Withings scale or the myriad of other devices connecting to the internet these days? No of course not. There is no reason for these devices to see any of your other equipment or even one another for that matter.
What can we do? Knowing which devices use the WAN (internet) verses ones only needing LAN (Local) access & their expected functions is a good first step in getting everything where it belongs. After categorizing and separating your equipment, setup and use a guest network (turn on device isolation) for all of the IOT/at risk devices.
Other things to help mitigate the danger:
– Patch your IOT devices (assuming they support it)
– Register your devices so updates/notifications about security flaws can get to you
– Make sure your router/modem/access points have the latest firmware/patches
– Audit your networks (private & guest) and the devices on them
– Test to be sure network isolation is working
Don’t have a guest network, not sure how to set one up, or just don’t want to bother with it? No problem, drop me a line here, give me a ring (903) 686 0200, or book an appointment online here and I will sort it out for you.
Recap: The only surefire way to be 100% safe online is to NOT be online.
Not being a realistic option, we can strive to minimize the threat vector with a little bit of effort, equipment, & some know how. The little things add up (both ways)
Here’s to safe computing,