Our homes are becoming smarter and, as cool as that is, what’s even cooler are people who are as smart as their smart homes.

The last thing we want is a cyber criminal being able to unlock our smart locks or take a peek through our smart cameras.

With that said, here is a Smart Home Cyber Hygiene checklist.

BEFORE YOU DO ANYTHING

Be sure you actually need to connect.

The best and easiest way to protect yourself from the dangers brought on by the digitally-connected age is to not connect if you don’t need to. Does your refrigerator really need to be able to send you text messages? Does your toaster need to be able to take a selfie?

Research before you buy.

Keeping your smart home secure starts with what you buy. It’s a good idea to stick to well-known, established brands with a strong track record in hardware as much as possible. Look for devices that make it easy to update software, change default passwords, or disable unnecessary features.

Consider professional installation.

If things seems too complicated, get some help and let the pros make sure your smart devices are installed with security in mind.

DURING THE SET UP

Register with the manufacturer.

This will allow you to get all the new software updates. Also, make sure to check what permissions have been granted during the set up – don’t allow access to anything that isn’t necessary.

Set up a guest network.

Make sure to give the guests in your home the ability to log onto a separate network that doesn’t tie into your IoT devices.

Safeguard your devices.

Make sure you change your default username and password (this is good advice for anything). Also, turn off other manufacturer settings that don’t benefit you, such as remote access, which could be used by cybercriminals to access your system.

Two-Factor authentication.

If your smart-device apps offer two-factor authentication, make sure to take advantage of it. This gives you an added layer of authentication on top of your password, like a code sent to your phone. Two-factor authentication makes things harder on the criminal.

ONGOING THINGS TO CONSIDER

Update! 

Good advice for any technology is to make sure that your device software is always up to date.

Know what you have connected.

The best way to have a secure mindset with smart devices is to know what devices you have actually connected to your home network. If you don’t know, simply turn off your Wi-Fi and see what stops working.

Consider an upgrade.

Is it time to upgrade anything you already have for a more secure device?

Watch out for outages.

A hardware outage may result in an unsecured state for your device. Make sure you check on them after you notice an outage.

Avoid public Wi-Fi networks.

Public Wi-Fi is super vulnerable to attacks. Never manage your smart devices from a public Wi-Fi connection. Use your data, a secure VPN, or wait until you come home.

WHEN MOVING ON

  • Factory reset devices before getting rid of them.
  • When you decide to discard, sell, or give away your smart device.
  • Make sure you take the necessary precautions to remove all your data.
  • Don’t let the next person get their hands on your data, and don’t give them the ability to communicate with other devices on your network.

Danny Pehar


With more than 20 years experience in the cybersecurity industry, Danny Pehar has become one of its foremost experts.

As a member of the Forbes Technology Council, Danny is also a monthly cybersecurity content contributor to the renowned business magazine. His media portfolio also includes regular television appearances that have built him an engaged broadcast audience and social media following.

As the architect of the Cybercrime Equation, Danny works closely with the Toronto Police Cyber task force as well as the FBI cyber task force. He also sits on the board of directors of InfoSecTO.

As a bestselling author and professional keynote speaker, Danny uses his own Executive Security Storytelling formula to successfully educate organizations on the ever-relevant world of cybersecurity. He has spoken to audiences and industries throughout North America and Europe.

Whether providing cybersecurity awareness training to CEOs of Fortune 500 companies, new employees or even elementary school students, Danny draws on his experience as a comedian and motivational speaker. Combining this background with his extensive cybersecurity knowledge and obsession, Danny promises to entertain, empower and educate for a truly awesome experience!

Other Articles

The Importance Of Cyber Insurance

I’ve been in the cybersecurity industry for pretty much my entire adult life; it’s the only career I’ve ever had. And yet one of my favorite…

Why Cybersecurity Is So Complicated

When you think of problems people had with cell phones back in the 80s, whether you experienced them firsthand or you’ve seen clips from movies, you…

Top Takeaways from ESG’s White Paper on Multicloud Storage Environments - Person using a tablet

Top Takeaways from ESG’s White Paper on Multicloud Storage Environments

Research shows that when an organization has taken the necessary steps to reach Storage Maturity, they have a competitive advantage due to their…

A New Opportunity for Cyber Attacks

There's a cybersecurity threat so troublesome that not even some of the best cybersecurity technology can stop it. It's called psychology, and it's…

An important message to our customers & suppliers

At Mid-Range, the health of our employees, customers, partners and suppliers is our top priority. As we face the COVID-19 crisis, we would like to…

7 Cybersecurity Tips

For today’s enterprise, the question is not whether you will be attacked. It’s when, by what, and how badly your company’s reputation or finances…

Cybersecurity Professionals

The Cybercrime Equation

Learn the best ways to keep your systems and your data safe from ransomware attacks, with advice from Danny Pehar, Bestselling Cybersecurity Author…

Man working on laptop at office

Job Opp: I.T. Solution and Services Architect

This position works within the team responsible to provide I.T. Managed Services to our x86-based customer systems, in accordance with service…

Employees Working together at office

Job Opp: Account Executive

This position works within the team responsible to provide I.T. Managed Services to our x86-based customer systems, in accordance with service…

Abstract blue nodes depicting big data

The Three “V”s of Big Data

Before you create your first draft of the schema or the architecture you must put into perspective this part of the problem you are being asked to…