How to Secure Your Smart Home Devices Against External Threats

2022-11-06 07:01:23
关注

How to Secure Your Smart Home Devices Against External Threats
Illustration: © IoT For All

In 2022, IoT devices have become very common in the typical American household. From the Nest thermostat to the smart refrigerator and Ring appliances, network devices around the home are coming in all forms, all with the insatiable desire to be connected to the series of tubes we call the Internet. These devices can expose home networks, especially if they only have the standard, already-tired, and shoddy defenses against a myriad of existential threats and harms that most folks would be none the wiser about. Let’s take a look at how to secure your smart home devices and protect your home network against external threats.

'The internet can be a scary place, and it’s vital to protect yourself and your family by protecting your IoT devices.' -5QClick To Tweet

3 Ways to Safeguard Your Home

#1: Change the Defaults & Enable Two-Factor Authentication

A few years ago, there were quite a few articles about hackers taking control of baby monitors via Wi-Fi networks to spy on unsuspecting families. While this doesn’t explain all the hacking cases for each baby monitor, we can reasonably ascertain that some default settings were either left by developers or users did not check them, which allowed the hackers a way in.

This may sound exceedingly simple and to some IT folks like a “no-brainer,” but going back through and verifying the configurations of the devices around a smart home to ensure no default passwords and usernames remain will go a long way. Most devices have an administrative console that requires its use for first-time setup, and, to cover our tracks, it may be prudent to go back and make a few fine-tuning adjustments. Ensuring the device is connected to the proper network and that the MAC address is properly recorded so you can find it later on is ideal. While tinkering around in settings, ensure automatic updates are enabled. Developers will often do over-the-air updates to these devices to apply their security hotfixes. All this information would be found in that device’s settings, and you may need to consult the manufacturer’s manual to find specific menus.

#2: Separate Devices Into Networks

Sometimes we need our space, and IoT devices are no different. On the first day of setting up a new device network, VLANs and firewall settings are usually relegated to the “do it later pile.” It is a great idea to go ahead and set that up right now.

There are many ways to accomplish this task; one of the more prevalent ones would be using OpenWRT and its amazing support forum for this. Before you undertake this item, ensure your device is compatible with OpenWRT. Otherwise, you may be stuck using the proprietary software to try and accomplish this goal. But, fear not! If you read all those forum posts and do not really want to expend extra effort setting up a virtual one, installing a second physical router is another solution, and, with some minor tweaks, it can accomplish the same thing.

#3: Set Up a Pi-Hole

After completing the above steps, setting up your DNS server directly to your router(s) would be a great in-place solution to provide additional security. Setting up a Raspberry Pi gives you the chance to purchase (yet another) shiny new gadget and justifies itself simultaneously! The name Pi-hole itself is just an amalgamation of Raspberry Pi and Black Hole, which you’d be setting up, in theory.

Essentially, this would reject domains before they reach your devices, and it comes with the bonus of being a built-in ad blocker. The Pi-hole can keep those pesky IoT devices from phoning home and block connections from unauthorized outside domains and IPs. You can purchase a Raspberry Pi from Amazon or your local tech enthusiast store, and with the Pi-hole documentation, it is a relatively simple process to undertake. Once it’s running, you’ll have more control over your network traffic and more logs than you’ll know what to do with! With that information, you can see what your IoT devices are talking to and if those domains can be trusted.

A Secure Smart Home

With these three steps, you can have a more secure smart home with all the IoT devices you could ever want. The internet can be a scary place, and it’s vital to protect yourself and your family by protecting your devices. Use the suggestions above to make sure you are securing your home!

Tweet

Share

Share

Email

  • Consumer IoT
  • Consumer Products
  • Cybersecurity
  • Device Testing
  • Internet of Things

  • Consumer IoT
  • Consumer Products
  • Cybersecurity
  • Device Testing
  • Internet of Things

参考译文
如何保护你的智能家居设备免受外部威胁
插图:© IoT For All 在2022年,物联网(IoT)设备在美国普通家庭中已经非常普遍。从Nest恒温器到智能冰箱,再到Ring系列设备,围绕家庭的网络设备正以各种形式出现,它们都渴望连接到我们称之为“互联网”的网络管道中。如果这些设备只具备标准的、陈旧的、拙劣的安全防护,就很容易暴露出家庭网络,而这些设备正面临着各种存在性威胁与损害,大多数人对此毫不知情。让我们看看如何保护智能家庭设备,并防范来自外部的威胁。“互联网可能是个危险的地方,保护好自己的物联网设备,就是保护你和家人。” -5Q点击推特 3种方法保护你的家庭 **#1:更改默认设置,并启用双因素认证** 几年前,有不少关于黑客通过Wi-Fi网络控制婴儿监视器,进而监视无辜家庭的报道。虽然这并不能解释每起婴儿监视器的攻击案例,但我们可以合理地推断,一些默认设置要么被开发者留下,要么用户没有检查,这就给黑客留下了可乘之机。这听起来可能非常简单,对某些IT人员来说简直是“常识”,但回过头来检查智能家居中的各种设备设置,确保没有默认的密码和用户名,会大大提升安全性。大多数设备都有一个用于首次设置的管理控制台,为了不留后患,不妨回头做些微调。确保设备连接到正确的网络,并正确记录MAC地址,这样以后找起来就方便了。设置过程中,确保启用了自动更新。开发人员通常会通过空中下载更新来为这些设备提供安全补丁。所有这些信息都可以在设备的设置中找到,你可能需要查阅制造商的说明书来找到具体菜单。 **#2:将设备分组到不同网络中** 有时候我们都需要一些个人空间,物联网设备也不例外。在建立一个新的设备网络的那天,VLAN和防火墙设置往往被归为“以后再做”的项目。现在就设置这些内容是个不错的主意。实现这个任务的方法有很多,其中一种比较常见的方式是使用OpenWRT及其出色的论坛支持。在开始这一项之前,确保你的设备与OpenWRT兼容,否则你可能不得不依赖厂商的专用软件来实现目标。不过,不用担心!如果你读完那些论坛帖子后不想多花精力设置虚拟网络,安装一个第二台实体路由器也是一个解决方案,经过一些微调,它可以完成同样的任务。 **#3:安装Pi-Hole** 完成上述步骤后,将你的DNS服务器直接设置到路由器上,将是一个出色的就地解决方案,以提供额外的安全保障。设置一个树莓派(Raspberry Pi)不仅能让你购买(又一个)闪闪发光的新设备,而且还能为你的家庭网络增添价值!Pi-hole这个名字本身就是“树莓派”和“黑洞”的组合,你将在理论上设置这样一个黑洞。基本上,它会在请求到达你的设备之前就拒绝某些域名,而且它还有一个额外的好处——内置广告拦截功能。Pi-hole可以防止那些烦人的物联网设备“回拨”联系外部服务器,并阻止未经授权的外部域名和IP连接。你可以在亚马逊或本地科技爱好者商店购买树莓派,配合Pi-hole的文档,整个设置过程相对简单。一旦它运行起来,你将对网络流量拥有更多控制权,并拥有大量日志供你分析!有了这些信息,你可以清楚地知道你的物联网设备在与哪些域名通信,以及这些域名是否可信。 **更加安全的智能家居** 通过以上三个步骤,你可以拥有一个更加安全的智能家居,尽情享受你想要的各种物联网设备。互联网可能是个危险的地方,保护好自己的物联网设备,就是保护你和家人。利用上述建议,确保你已经保护好自己的家庭!TweetShareShareEmail 消费物联网消费产品网络安全设备测试物联网 消费物联网消费产品网络安全设备测试物联网
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告

iotforall

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

云鹿智能门完成两轮近亿元融资!

提取码
复制提取码
点击跳转至百度网盘