Smart Devices - Are you smarter than your smart devices?

Laptops, computers, thermostats, tablets, cellular phones, televisions, GPS, Google Home, Amazon Echo, Smart Helmets. These devices come in the form of adult devices, adult toys, home appliances, and children’s toys. These are devices that have “automated content recognition (“ACR”)” features. They listen, they monitor and they communicate.

We have smart devices that are able to talk to other devices all because of the invention of the internet. This is through the sophistication of smart voice or virtual assistants.

By the first quarter of 2017 an estimated 15M smart devices will be used by consumers. This voice interaction has come about since 2014.

National Cyber Security Alliance introduces catch phrases such as:

Stop – Think – Connect
Internet to Things
Internet to Me

On Feb. 28, families around the nation woke up to find out that CloudPets toys had been hacked and more than 800,000 user accounts and 2 million voice recordings – mostly of children and family members – were exposed in a major data breach.
11 Million Vizio Smart TV was purchased by consumers last year.

Now it is time to learn how to navigate through your continuously connected life!

Every day we are connected to the internet in ways we have not even begun to realize. These connections affect our personal and business interests and privacy. Someone always has access and is or will use the information received and data stored. While these smart devices may make our life easier, and more fun, they decrease our safety 100%.

Research the process for keeping your smart devices secure before you purchase them, make sure that you know how your data is being used on newly connected devices and take extra measures (like assigning new passwords) to safeguard your devices.

Understand what information your devices collect and how it’s managed, used, and by whom, and stored.

Fortify your online accounts by enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time code through an app on your mobile device. Your usernames and passwords are not enough to protect key accounts like email, banking and social media. Do not overlook your internet routers, which control access to your smart devices.

Learn how to secure your smart devices. Use a strong password to protect the device, keep it up to date and name it in a way that won’t let people know it’s in your house.

Check the cybersecurity history of devices before purchasing to see if there have been any previous security or privacy issues and if they have been resolved. Research on the internet, do not take the word of the sales clerk.

Uninstall or removed unwanted and unused software and apps from your smart devices. As long as they are there, they are vulnerable and continue to store and share personal information and data. Android devices require you to give permission to let them have access to other features on your device before installation. Apple devices do not.

As more and more consumers are shopping with mobile apps, fraudsters are following the money. There are fake phone apps popping up that impersonate well-known retailers in order to steal your personal information. Their names are similar to well-known brands, and their descriptions promise enticing deals or features.

But these fraudulent apps can take your credit card or bank information. Some fake apps may even install malware onto your phone and demand money from you to unlock it.

Some known “talking” devices:

iPhone – Siri
Amazon – Echo
Amazon – Echo Dot
Amazon Tap
Alexa
Google Home
Cubic Robotic
Ivee
Ubi
Homey
Earity
Navdy
Petcell – GPS Tracker for animals
Cayla – Children’s Toy
i-Que – Children’s Toy

Preventions:

Turn off the voice recognition feature when you are not using it.

Turn off your WIFI when you are not using it

Turn off your computer, laptop, tablet, etc. when you are not using it.

No comments:

Post a Comment