Secure Your Home: Set Up IoT Devices on a Separate Network

2023-12-12
关注



Illustration: © IoT For All



Setting up IoT devices on a separate network can add an extra layer of security between these vulnerable devices and more sensitive tech like phones and laptops. IoT tools are often at a high risk of hacking, but users can still use them safely by isolating them on a secure secondary network. Creating one is usually free and only takes a few steps.

Why Set up IoT Devices on a Separate Network?

When setting up IoT devices for the first time, people might simply connect them to their main network like all their other tech. However, this might not be a good idea. Connecting them to a separate network can improve cybersecurity and doesn’t even require a new router.

IoT devices tend to be more vulnerable to hacking than more interactive products like phones or home computers. There are a few reasons for this. First, they often have weak built-in security features.

For instance, it’s common for these items to have reused, easy-to-guess default passwords. Many people don’t know how to change them, leaving their products vulnerable.

Additionally, IoT devices have minimal processing power but high connectivity. This means it’s more challenging to run security software on them. However, they can usually communicate with many other devices on a network. As a result, hackers have few protections to break through, and a hacked IoT tool can get them access to many others.

Setting up IoT devices on a separate network can protect against hacking. Even if a vulnerable item is hacked, the attacker won’t be able to access other devices since they are not on the same network.

And just because your devices haven’t been hacked yet, that doesn’t mean you won’t experience an attack down the road. Experts project the cybercrime industry will grow to $10.5 trillion in the next few years — it’s better to take precautions now than to lose your data in a cyberattack in the future.

Luckily, it’s fairly easy to set up a separate system on a router.

1. Segment the Network

Before connecting IoT devices to a separate network, users must create a new one on their router. This should not require purchasing a new internet plan or buying another router.

Most standard home internet routers can support at least one additional network on the same device. Technically, they both use the same internet connection but are separated from one another. This is a process known as network segmentation. Most people have encountered this when using a guest network at a store or restaurant.

People can create their own guest networks on their home router and use them for IoT devices. There are a few ways to segment them depending on the router, so individuals should check the user manual or contact their internet provider if they need help. Users can typically create a guest network on the router itself in their internet provider’s mobile app, or through their browser.

People segmenting a brand-new network may need a new Wi-Fi password to get started. Usually, this is printed on a label on the back of the router or underneath it. Individuals who can’t find the password anywhere should contact their internet providers. Changing the default password once they get into the new network is also a good idea.

After creating the new network, people should give it a unique name so they avoid confusing it with the primary network. They can simply call it “Guest Network” or any other title they want.

2. Secure the IoT Network

The next step is securing the new network. A typical guest network is supposed to have less security than the main network, but that’s not the case when it’s used for IoT devices. Users should create a unique, complex password for the secondary network and ensure it’s different from the main one.

Users should avoid reusing passwords from websites, email addresses, or other devices. One of the leading cybersecurity threats today is phishing, which hackers often use to steal personal information, including passwords. If someone reuses a password for their IoT network and it’s compromised in a breach or phishing attack, their whole system could become vulnerable.

3. Connect the IoT Devices

People can connect their IoT devices after setting up and securing the secondary network. If any of them are already connected to the primary network, they should disconnect them by removing the device from their router.

When connecting or reconnecting IoT devices, people should locate the guest or renamed secondary network from the list of available Wi-Fi networks. They should double-check that it’s visible on the router or internet provider’s mobile app if it is not appearing as an available network. Once they find it, they can enter the password like normal and connect within a few seconds.

4. Update Default Passwords

Users should remove default passwords after connecting their IoT devices to the new secondary network. Device manufacturers often use the same set of standard passwords across large groups of products. As a result, they are weak and easy to guess.

Updating those passwords should be one of the first steps when setting up an IoT device. Each one should have a unique, randomized password. People can use a free password generator tool to create as many as they need. They should save them but be careful not to write them down on paper or put them in a text document. The safest solution is to use a password manager tool, many of which are free.

5. Activate Network Monitoring (Optional)

People who want to add an extra layer of security to their IoT devices can activate some basic network monitoring tools. Most modern routers provide an alert when they detect a new device. They will know if someone connects to their network.

Setting up this feature varies from one router to another, so people may need to contact their internet provider for instructions. However, network alerts are often accessible through ISPs’ mobile apps, where users can also view all the devices on their network.

Keeping IoT Devices Secure

Setting up IoT devices on a separate network can help protect against cyberattacks. These items are more vulnerable to hacking than other types. Isolating them on their own network can prevent hackers from accessing sensitive data on phones, tablets, laptops, and PCs. The easiest way to separate IoT devices is by creating a guest network on a home router, which only takes a few steps.



参考译文


  • en
您觉得本篇内容如何
评分

相关产品

EN 650 & EN 650.3 观察窗

EN 650.3 version is for use with fluids containing alcohol.

Acromag 966EN 温度信号调节器

这些模块为多达6个输入通道提供了一个独立的以太网接口。多量程输入接收来自各种传感器和设备的信号。高分辨率,低噪音,A/D转换器提供高精度和可靠性。三路隔离进一步提高了系统性能。,两种以太网协议可用。选择Ethernet Modbus TCP\/IP或Ethernet\/IP。,i2o功能仅在6通道以太网Modbus TCP\/IP模块上可用。,功能

雷克兰 EN15F 其他

品牌;雷克兰 型号; EN15F 功能;防化学 名称;防化手套

Honeywell USA CSLA2EN 电流传感器

CSLA系列感应模拟电流传感器集成了SS490系列线性霍尔效应传感器集成电路。该传感元件组装在印刷电路板安装外壳中。这种住房有四种配置。正常安装是用0.375英寸4-40螺钉和方螺母(没有提供)插入外壳或6-20自攻螺钉。所述传感器、磁通收集器和壳体的组合包括所述支架组件。这些传感器是比例测量的。

TMP Pro Distribution C012EN RF 音频麦克风

C012E射频从上到下由实心黄铜制成,非常适合于要求音质的极端环境,具有非常坚固的外壳。内置的幻像电源模块具有完全的射频保护,以防止在800 Mhz-1.2 Ghz频段工作的GSM设备的干扰。极性模式:心形频率响应:50赫兹-18千赫灵敏度:-47dB+\/-3dB@1千赫

ValueTronics DLRO200-EN 毫欧表

"The DLRO200-EN ducter ohmmeter is a dlro from Megger."

评论

您需要登录才可以回复|注册

提交评论

iotforall

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

A Guide to eSIM and Cellular IoT

提取码
复制提取码
点击跳转至百度网盘