{"id":5502,"date":"2018-08-28T09:45:03","date_gmt":"2018-08-28T14:45:03","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=5502"},"modified":"2018-09-13T12:58:54","modified_gmt":"2018-09-13T17:58:54","slug":"the-connected-home-how-secure-are-all-these-gadgets","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/the-connected-home-how-secure-are-all-these-gadgets\/","title":{"rendered":"The Connected Home \u2013 How Secure Are All These Gadgets?"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\"><strong>by Des Nnochiri<\/strong><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Connected or smart homes are becoming more commonplace as people use computer networks to control different aspects of their in-house technology. But how secure are these networks?<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Everything Online<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A connected home allows occupiers to remotely control and monitor their in-house technology via their smartphones and tablets and its uses can range from the relatively simple or frivolous to more complex, important tasks.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/graphicstock-unrecognizable-casual-man-working-from-home-using-smart-phone-and-smart-watch-standing-in-living-room_bdfu_rrgb.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-5506 size-medium\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/graphicstock-unrecognizable-casual-man-working-from-home-using-smart-phone-and-smart-watch-standing-in-living-room_bdfu_rrgb-300x179.jpg\" alt=\"\" width=\"300\" height=\"179\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/graphicstock-unrecognizable-casual-man-working-from-home-using-smart-phone-and-smart-watch-standing-in-living-room_bdfu_rrgb-300x179.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/graphicstock-unrecognizable-casual-man-working-from-home-using-smart-phone-and-smart-watch-standing-in-living-room_bdfu_rrgb.jpg 325w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Smart homes use this connectivity to control lighting and heating systems, allowing the user to manipulate the lighting or temperature levels of their property or turn them on and off. For example, if someone with a smart heating system wanted to ensure that they were going to be returning to a warm house after a holiday, they can switch it on and set the temperature when on the final leg of their journey.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Smart security systems allow doors to be opened or <a href=\"http:\/\/uk.pcmag.com\/surveillance-cameras\/77460\/guide\/the-best-smart-locks-of-2018\" rel=\"nofollow\" target=\"_blank\">locked<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> again when necessary, to admit or prohibit access, even when not at home and allow users to remotely operate and monitor their CCTV network. Smart <a href=\"https:\/\/www.lifewire.com\/best-smart-doorbell-cameras-4145064\" rel=\"nofollow\" target=\"_blank\">doorbells<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> allow people to see who\u2019s standing on the doorstep and, through an intercom system, give the impression of someone being at home when the house is empty. There are also smart <a href=\"https:\/\/www.safewise.com\/resources\/carbon-monoxide-detectors-guide\" rel=\"nofollow\" target=\"_blank\">fire-prevention systems<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> which can monitor carbon monoxide levels and alert the homeowner if thresholds are exceeded.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Connected <a href=\"https:\/\/www.sonos.com\/en-gb\/home\" rel=\"nofollow\" target=\"_blank\">home entertainment<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> systems allow the user to control music and other media, playing content in some rooms while keeping others peaceful. Holidaying homeowners can remotely control their <a href=\"https:\/\/www.postscapes.com\/smart-irrigation-controllers\/\" rel=\"nofollow\" target=\"_blank\">water sprinklers<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> to ensure their gardens remain lush. And smart <a href=\"https:\/\/www.theaustralian.com.au\/life\/personal-technology\/samsungs-smart-fridge-keeps-track-of-your-food-stocks\/news-story\/ecd0463d9578dc5a1eabac4813067541\" rel=\"nofollow\" target=\"_blank\">refrigerators<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> can monitor their contents, warning when products are going out of date and even suggesting recipes.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Could a Criminal Infiltrate My Connected Home?<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Like any network, a smart home is only as secure as its weakest link. So, while it may not seem like a big issue if the app which controls your bedside lamp is hacked, it could provide a back door from which your door locking system can be compromised.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Unfortunately, as the connected home market has grown, the security behind many of the apps used has not been at the top of developers\u2019 list of priorities as they have rushed to gain a foothold in a growing market. Many of these apps have <a href=\"https:\/\/www.itchronicles.com\/iot\/iot-device-security-risk\/\" rel=\"nofollow\" target=\"_blank\">proven simple<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> to break into, requiring only a rudimentary knowledge of hacking.<\/span><\/p>\n<figure id=\"attachment_5509\" aria-describedby=\"caption-attachment-5509\" style=\"width: 325px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/576390-smart-home.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5509\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/576390-smart-home-300x169.jpg\" alt=\"\" width=\"325\" height=\"183\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/576390-smart-home-300x169.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/576390-smart-home.jpg 694w\" sizes=\"auto, (max-width: 325px) 100vw, 325px\"><\/a><figcaption id=\"caption-attachment-5509\" class=\"wp-caption-text\">(Image source: medium.com)<\/figcaption><\/figure>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">While overtly shutting down systems is likely to raise the suspicions of a homeowner, criminals with the right technological knowledge can combine cyber-crime with old-fashioned burglary by accessing a connected home system and carrying out surveillance on their intended target \u2013 checking when doors are likely to be unlocked or to gain knowledge of the occupants\u2019 routine.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">It\u2019s not just physical crime such as burglary which the hacking of a connected home could enable. Psychological crimes such as stalking and intimidation could be carried out or escalated by acts such as turning on a light or flicking a lock open and closed. The obsessive nature of the people who perpetuate these types of crimes, combined with unfettered access to a home security system, could easily set them on a path to more direct action.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">How Can We Make Our Connected Homes More Secure?<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">There are steps you can take to improve the <a href=\"https:\/\/fieldguide.gizmodo.com\/how-to-build-a-smart-home-thats-actually-secure-1822942112\" rel=\"nofollow\" target=\"_blank\">security<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> of your connected home.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Change from default passwords \u2013 use complex, lengthy passwords.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Keep the serial numbers of your router secret and never publish it. Change the password on your router as well.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Know the capabilities of your devices and disable any features you feel could be a threat and\/or you are unlikely to use.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Install trustworthy security software.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Ensure all apps and software are updated with the latest security patches.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Remember, if a person is set on the idea of burglarizing your property, they will likely find a way of doing it, whether via a complex hack of your connected devices or taking advantage of a window left ajar. Security devices such as smart doorbells and CCTV networks are more likely to deter crime than to facilitate it, and your average home invader isn\u2019t likely to be sophisticated enough to see them as an opportunity and will instead seek a softer target elsewhere.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">As smart technology becomes ever more ubiquitous, the developers who succeed will be the ones who take their security responsibilities seriously. Those who don\u2019t will likely see their products fail to gain a market hold as more secure products attract ever more savvy consumers.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Des Nnochiri \u00a0 Connected or smart homes are becoming more commonplace as people use computer networks to control different aspects of their in-house technology. But how secure are these networks? Everything Online A connected home allows occupiers to remotely control and monitor their in-house technology via their smartphones and tablets and its uses can [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":5505,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57,42,6],"tags":[113,111,59,29,112,37],"class_list":["post-5502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-monitoring","category-security","category-tech","tag-break-in","tag-connected-home","tag-monitoring","tag-security","tag-security-risk","tag-smart-home"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=5502"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5502\/revisions"}],"predecessor-version":[{"id":5769,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5502\/revisions\/5769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/5505"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=5502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=5502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=5502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}