Connected objects are increasingly becoming the daily life of the big digital consumers.
In fact, it is difficult or impossible today to go to an establishment, a public space without meeting a user of connected objects. To say that its expansion is real. However, the dangers are also. Indeed, who talks about connected objects is about computers and the Internet and of course about hacking.
This article will also interest you: Connected objects in business where vulnerabilities where you don't expect war
The explosion of the connected objects market has also attracted hackers who each time try to find loopholes to take advantage of them. In return, objects that do not meet the standard security criteria are real pitfalls for users. However, their diversity does not make it easier for the IT security specialist. Some of the most commonly used connected objects include smartwatches, voice assistants, refrigerators, smart light bulbs, thermostats, fitness trackers and home security devices. Today we see more gadgets added. From televisions to game consoles to household robots, almost everything has started to become connected. But behind all this technology development, there is a real danger that persists. Indeed, "These objects can allow hackers to shamelessly access our routers, giving these predators a significant possibility of access to our home networks. Franck DeCloquement, an expert in economic intelligence, explained.
Beth Anne Steele, an agent in the Portland office of the U.S. Federal Police (FBI) urges any user of connected objects at home or in business to be vigilant and to ensure every use, that it is objects meet exactly the configurations required to protect their personal data and any aspects of privacy in the face of potential computer danger. Because it believes that the majority of these objects are able to provide hackers with enough information to fuel their illegal activities. It is understandable when cybersecurity firm Avast explains this in its February 2019 report entitled "Smart Home Security Report 2019": "59.7% of routers have weak credentials or certain vulnerabilities and 59.1% of users worldwide have never logged on to their router, or never updated its firmware." More than 56 million devices worldwide were inspected and 16 million domestic networks to reach this conclusion.
The most recurrent advice to the subject, and it is necessary to separate The network used for connected objects in the network used for purposes professional or a little more sensitive.« Your refrigerator and laptop should not be on the same network (…) Keep your most private sensitive data on a system separate from your other IoT devices. recommends the U.S. federal office. He later added: "A bad cyber actor may not be able to directly access your locked computer, but it is possible that your unsecured TV can give it an easy way to hide, via a backdoor digital door, via your router. ».
In addition, the password issue remains. As usual it will be recommended to be very careful about the wording of passwords. On top of that it should not be communicated from right to left as is customary to prevent.Since the majority of users of connected objects still use the default passwords, this does pose a security breach for users, jeopardizing not only their privacy, but also their personal data, which can have financial consequences. This is surely why some states have required connected object manufacturers to require users to change their passwords from the first use.
Now access an unlimited number of passwords: