How to secure IoT device properly
Many of us do not care much about IoT device security. The biggest IoT-related security issue so far - the Dyn botnet attack - has "knocked out" all sites including Twitter, Amazon and Spotify.
However, it hardly received much attention because the news channels that day were busy with the 2016 US presidential election. Instead of worrying about serious impacts on a large scale. Thus, the typical reaction is' Twitter collapsed? OK, I will stop using it. '
Such attitudes towards IoT security are still very popular. The most obvious solution to overcome any IoT vulnerabilities is to shut down problematic devices. However, such an indifferent approach will not last forever. It's important to be proactive and follow the tips below to be absolutely sure your IoT device is safe.
How to secure IoT devices?
- 1. Know the vulnerability on the device
- 2. Safe configuration
- 3. 'Sealing' the router or Internet ports
- 4. Ensure the Hardware Secure Module (HSM) in the device
1. Know the vulnerability on the device
The device may have weak entry points and intruders will use these weaknesses to have network access. Obviously, appreciating the threat can help users prevent defenses in their network. For example, if you have a smart door lock using WiFi, tech-savvy thieves can track when you get home. Smart speakers often record private conversations in the background.
Moreover, consumer devices such as refrigerators and TVs often operate from applications that cannot resist attacks aimed at a vulnerability on the system. Smart cars also have systems to store information about brakes, tire pressure and fuel level.
After knowing exactly where the intruder is capable of attacking, just follow the next steps below to remove those threats.
2. Safe configuration
We are all excited and excited to start using a device right after opening the package. Please take 5 minutes to ensure a suitable configuration and a lot of trouble will then be removed. Many devices come with default passwords, such as 1234 or 0000, or even without a password. Changing the default password with numbers and special characters is always a habit recommended by security experts.
Many consumer IoT devices face another vulnerability: The password sent from the device to the cloud is not encrypted. If a router is compromised, this can make those devices vulnerable to tampering, hijacking DNS and brute force attacks. Therefore, the next step plays a very important role to solve these problems.
3. 'Sealing' the router or Internet ports
The weakest point of an IoT network is a router or Internet gateway, which facilitates 'communication' between devices. Readers can check online at F-Secure page to see if their router has any problems in the future. All routers require firmware updates. So if you own an old router, work with the ISP to get a new one right away. Then, do the following:
- Update MAC addresses: Currently, all routers 'communicate' with other Internet devices through MAC addresses (random numbers such as 34: 45: 12: 22: 18). As the number of in-house IoT devices increases, users will want to change them into a memorable name, such as 'Fridge', 'TV1', 'Doorlock' and 'Doorbell'.
- Invest in smart home network security system: Users will be able to monitor all network-enabled devices in the home network. Solutions like Avira Safethings allow users to monitor all their connected devices from a control panel. Nest Secure and Wink Lookout from Google are some other alternatives.
4. Ensure the Hardware Secure Module (HSM) in the device
Obviously, to ensure security, people must deploy the best hardware for the network. Hardware Security Modules (HSM) are the latest technology used by IoT device manufacturers to add an additional layer of security. It is done using a method called 'Key Injections', in which each silicon chip is provided with a unique identifier. This will protect the device from duplication, tampering and other hardware attacks. Google provides HSM services on its cloud network.
Many people are complacent that their network can resist any penetration. They are not very interested in the security of IoT devices. If you also think your smart devices are not easily attacked by hackers, think again. Whether you like it or not, smart devices still exist and will be everywhere. The attack of IoT devices will only be a problem sooner or later. Importantly, everyone needs to really care about the security of IoT devices.
What is your approach to IoT security? Leave comments in the comment section below!
See more:
- 6 things to know about IoT security
- 5 good habits help improve online security
- How to use Tor browser safely
You should read it
- Instructions for accessing anonymous Web on iPhone browser
- How to fix 'Your Wi-Fi Network Isn't Secure' error on Windows
- What is USEC DataSafe ultra-secure USB produced by Vietnamese engineers?
- How to Configure a Router
- How to protect folders with Secure Folder?
- What is Secure Erase?
- Secure Android smartphone in a professional way
- Secure folders with Secure Folders software
May be interested
- How to Copy Music to a Portable Storage Deviceyou can use a usb portable storage device to quickly copy music from one computer to another. this is a convenient way to share music with friends or listen to music on a usb-enabled audio device, or simply create a backup. if the usb drive is not working properly, you will need to reformat it.
- Instructions for cleaning the television properlyproper cleaning of your tv will increase the life of your device and enhance your experience when using the tv.
- What is USEC DataSafe ultra-secure USB produced by Vietnamese engineers?usec datasafe ultra-secure usb storage device will ensure data theft or data encryption.
- How to protect folders with Secure Folder?in the process of using the computer, you will have important folders and files that need to be kept secret, avoiding the curiosity of others when they use the device. therefore, the solution here is to use security software. there are many different but popular, easy-to-use security software, including subisoft secure folder. with it, you can lock, hide or encrypt the entire folder.
- Top 3 ways to properly hold a mouse to protect your wristholding the mouse properly is very important when you work for a long time. tipsmake will introduce 3 ways to hold the mouse properly to avoid wrist injury.
- What is Secure Erase?secure erase is the name given to a group of commands available from the firmware on hard drives based on sata and pata. the secure erase commands are used as a data sanitization method to completely overwrite all data on the hard drive.
- How to print Cad drawings properlyhow to print cad drawings properly. on auto cad software there are also many features related to printing support for users. but to set up fine print from cad software, you need to go through many different stages. in some of these articles, software tips will guide you on how to print cad drawings properly.
- How to power off iPhone properlythere are many ways to turn off iphone properly not everyone knows. invite you to see how to turn off the iphone properly and simply presented in the article below!
- How to Fix Error 3194 on iOSwhen you experience error 3194 in itunes, you are not properly connecting to apple's firmware signature verification server. this typically happens because you've jailbroken your device in the past and have changed the way itunes connects...
- Secure Android smartphone in a professional waymobile devices are quite popular and are increasingly storing important information and data, even sensitive, but many users are still quite indifferent to the security of this device.