Skip to main content

The Internet of Things: Cybercrime and the Connected Household

The rapidly expanding internet of things (IoT) now encompasses billions of connected machines like smart home technology, wearables and connected cars with over 40 billion connected IoT devices by 2030.

This growth has fueled a corresponding expansion of vulnerabilities. Extra caution is needed to avoid exposing your sensitive personal information to cybercriminals.  

IoT cyber safety measures

Additional safety protocols 

  • Make sure all IoT devices are running on a “guest” network. This network should be on a separate subnetwork (VLAN) from the highly secured “main” network you use to access any online accounts that contain sensitive information. 
  • Turn off Universal Plug and Play (UPnP). This technology is designed for convenience. It allows devices and applications to communicate with each other without additional configuration by bypassing security controls. It is a common way for attackers to exploit your network. 
  • Pay close attention to the data security and privacy policies of IoT manufacturers. Many IoT devices depend on cloud services or Bluetooth connections to function fully. This makes it possible for sensitive data to sync to these services without your knowledge. 
  • Know what data is collected. Recognize how that data can be used for nefarious purposes and try to minimize data collected where possible. For example, data streams from smart robotic vacuums can give attackers a detailed layout of your home. Settings on a smart thermostat can give insight into your schedule, and an internet camera can be used to view your feed in real-time. 
  • Set up device monitoring or logging.  Then, review them for unusual behavior. Some smart home systems and apps offer notifications for unauthorized access attempts or device malfunctions, which can alert users to possible security issues.