Smart Home Automation


Ten cybersecurity smart home tips from Ben-Gurion University

1 September 2018 Smart Home Automation Information Security

From laptop computers to off-the-shelf devices, the cyber vulnerabilities keep multiplying as homes and offices incorporate more internet-connected devices. According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.

“There’s a wide range of steps consumers can easily take, though some require a bit more focus or technical prowess,” explains Dr Yossi Oren, a senior lecturer in BGU's Department of Software and Information Systems Engineering and head of the Implementation Security and Side-Channel Attacks Lab at Cyber@BGU. “In previous research we found that internet-connected devices such as baby monitors, home security cameras, doorbells, and thermostats were easily hacked by our researchers. Password protection and updated devices are just as important in a smart home as they are on a computer or mobile phone.

BGU’s Hacktober Tips for Product Security

With the goal of making consumers smarter about smart homes, BGU researchers offer a number of tips to keep families and their IoT devices more secure:

1. Never use the same password on multiple websites or online services. Both Apple and Google offer free password managers that can take care of your passwords for you, and even automatically suggest strong passwords that are hard to crack.

2. Turn on ‘two-factor authentication’ to prevent hackers who’ve stolen your password from logging into your Facebook or Google account. Two-factor authentication sends a text message with a login code to your phone to verify it’s you.

3. On the heels of the recent Facebook hack, in addition to changing your password, use the Facebook settings screen to review the list of apps and websites which you granted access to your data. Remove any apps or websites you don’t recognise and trust.

4. Don’t fall prey to clever phishing scams that ask for payment and indicate they have an old password that you recognise. It was likely bought on the dark web.

5. Do cover your computer camera with tape or use a specially made camera cover to prevent prying eyes.

6. Buy IoT devices (cameras, baby monitors, etc.) only from reputable manufacturers and vendors. Change the admin password as soon as you can connect it. Annually check for security updates which you download.

7. Avoid used IoT devices like routers or cameras. They could already have malware installed.

8. Call your Internet service provider and request an updated router. Many are years old and don’t have the latest security updates. Change the Wi-Fi password on your home router.

9. Automatically back up your data - pictures, contacts and documents. If a computer is compromised, it may be easier to just reformat it than to find the malware, and it will allow your devices to function better.

10. Evaluate your family’s cyber health. While you yourself may be relatively cyber safe, make sure others in your family, like an elderly parent or teenager, are taking similar precautions.

“In only an hour or two, most of these steps can be accomplished, saving you significant headaches, serious theft and the loss of privacy or priceless data,” Dr Oren says.





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

The dangers of poor-quality solar cables
Security Services & Risk Management Smart Home Automation
Reports indicate that one in six fires attended by South African firefighters is linked to substandard solar installations, often due to faulty wiring or incompatible components.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...