Durante la limpieza de primavera, no olvides la seguridad del hogar inteligente.

During springtime, people take time to dive in with their New Year’s resolution of cleaning and organizing their homes and getting rid of the old. But do you remember to clean your cyber life, too?

Contenido

  • Change your passwords
  • Enable two-factor authentication
  • Check for software updates
  • Upgrade your devices
  • Consolidate your devices

Just as you clear out old clutter from your home, you should periodically check on your smart devices to make sure everything is in tip-top shape. This includes updating software, hardware, and managing your security. Here are five different things you should do right now to spring clean your smart home.

Change your passwords

SMART AND USEFUL HACKS FOR YOUR HOME || Brilliant Cleaning Tips For Your House by 123 GO! The first thing you should do is change your passwords and look into a password manager. Changing your passwords periodically is an easy safety measure that ensures you’re not using old and easily-guessable passwords. Many programs and services will automatically remind you to change your passwords, especially if it’s related to work.

If you’re bad at keeping track of passwords or coming up with strong ones, look into a password manager. Programs like 1Password or Dashlanewill keep a list of all your passwords, suggest new secure ones for you, and help you change them all within one source vault. You only have to remember the primary password to get into your vault. It’s much easier to remember one password than 50, since every password should all be unique and challenging to guess. Some services like Chrome and iCloud have built-in password managers that you can use.

A quick rule about making a password on your own is to use numbers, symbols, capitals, and make it a random sequence of words — but a longer password is always better than a complex password. Combining length and complexity will result in a much stronger password.

Enable two-factor authentication

Another source of security is to enable two-factor authentication (2FA.) 2FA creates a second layer of hard encryption to get your data. You don’t need to know all the encryption details; you usually just need a phone number or a second device to get into your data. For example, say you want to sign in to a service. That service will call you or send a random code to your phone, or display the code on a secondary device. You place that code into your sign-in device within a specific time limit to sign in.

Ensuring that you’re the only one signing into your devices keeps your security high. You can then choose to trust specific devices, allowing you to log in without using 2FA every time.

You should also periodically look at the list of trusted devices to ensure nothing old or unused is on there — or worse, that an unknown device has made its way on the list.

Check for software updates

It’s best to enable automatic updates, but you should definitely take a day to check all of your devices and operating systems to make sure everything is up to date. Besides introducing new features and quality of life changes, companies use software updates to increase the security features of their devices.

You’re going to want to make sure all devices in the ecosystem are also up to date. If one cloud-based device is vulnerable, it can create a hole in the entire ecosystem. Remember that individual devices need to be checked. For example, if you have multiple smart speakers, check that each speaker is running the latest version of the software.

Upgrade your devices

If you have the means, upgrade your old devices. Planned obsolescence isn’t a confirmed tech manufacturer policy, but companies do eventually stop supporting devices. When devices reach their end of life, they no longer receive those security software updates and are prone to newer means of security hacking.

You don’t need to always have the latest and greatest device, but technology is highly susceptible if it’s no longer supported but still connects to the internet. End of life generally happens after five years, and tech can improve significantly in that time.

Upgrading your devices is particularly important in light of the recent Wyze news that the original version of the camera suffered from a security vulnerability for three years, but only the subsequent versions were patched.

Consolidate your devices

Lastly, try consolidating your devices into one ecosystem or brand. While this may seem counterintuitive, it generally makes devices easier to manage. Having all devices under Google Assistant, Apple HomeKit, or Amazon’s Alexa presents one place to look over your smart home. This can be used as a quick stop to organize and check to make sure devices haven’t been desynced from your home and gone rogue.

Siguiendo estos cinco pasos, se asegurará de que su hogar inteligente esté tan protegido como puede ser generalmente. Por supuesto, puede avanzar usando VPNS, Teclas de hardware y otras medidas de seguridad, pero una vez que sigue estos conceptos básicos, tendrá mucho más espacio para respirar. Ninguna medida de seguridad es perfecta, pero después de algunas prácticas básicas reducirá su riesgo por un gran margen.

Comentarios

Entradas populares