SHARE
Facebook X Pinterest WhatsApp

11 Ways IoT Affects Security (And What You Can Do)

Sep 24, 2014

11 Ways IoT Affects Security (And What You Can Do)

Regularly Update SoftwareRegularly Update Software

Set all network-connected devices to enable the vendor’s auto-update security features. This reduces the number of security vulnerabilities that can be exploited.

Seek Out New Protection LayersSeek Out New Protection Layers

Sometimes a strong Internet security product might be the only thing that stands between a user and an attack. Although endpoint protection products can’t be applied to smaller IoT devices, they can be installed on machines that store the data.

Periodically revisit Your BYOD PolicyPeriodically revisit Your BYOD Policy

Are you unknowingly allowing potential security threats because of lax rules? Incorporate IoT into your security policy, and revisit the policy every quarter as technology and access points change.

Educate Your EmployeesEducate Your Employees

Prevent a BYOD open rebellion by educating your employees on IT policy updates. Don’t simply explain why changes are being implemented. Instead, encourage employees to come forth with additional ideas for protecting the enterprise.

Use Strong Passwords on IoT-Related WebsitesUse Strong Passwords on IoT-Related Websites

Since senior executives are primary targets for phishing, it’s important that any personal information—even things as simple as exercise and eating habits—are protected with strong passwords.

Don't Connect Through Social MediaDon’t Connect Through Social Media

It’s common for IoT devices to allow users to log-in through existing accounts, such as Facebook. Opt to create your own account for any IoT Websites so that your other sites are secure even if one falls

Never Share Personal InformationNever Share Personal Information

Some IoT sites allow you to publish your exercise or dietary information. Don’t. This helps cybercriminals to craft effective phishing emails. As often as possible, use fake personal information when registering for access to new applications and programs, Websites, or establishing new online accounts

Proactively Monitor ThreatsProactively Monitor Threats

Use data analytics programs to monitor and pinpoint security threats.

Know IoT-Related Privacy PoliciesKnow IoT-Related Privacy Policies

Read the fine print before accepting “yes” when using an IoT-related Website. Are you unknowingly granting access to other areas of your computer or phone?

Don't Auto-Save PasswordsDon’t Auto-Save Passwords

By default, many web browsers ask if you would like to save passwords. Never auto-save passwords to IoT devices. Instead, invest in a password management tool, like LastPass or Roboform, which integrates on all of your devices.

Properly Deactivate DevicesProperly Deactivate Devices

Know how to properly deactivate, wipe clean and recycle an IoT device. Even if a device breaks or malfunctions, the data can still exist. Erase it before giving up control of the device.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.