Archives - Smart Home


Maintain an inventory list of all IoT devices on your network

This is especially critical for large, enterprise-grade organizations that might deploy many IoT devices across their infrastructure. Each and every device, whether it be a sensor or a tablet, is an endpoint that can be compromised by a hacker. In turn, they could lead straight toward more critical areas of your network and jeopardize sensitive […]

Update your new smart TV before logging into any accounts

Smart TVs provide a wonderful array of entertainment, but they’re also an entryway into your home network. In the time that a smart TV has been manufactured, packaged and shipped off to a distributor, there may have already been several security updates released by the developer. To rest assured that your network is safe, download […]

Avoid downloading third-party skills to your Alexa device

Skills – essentially apps – can be downloaded to an Alexa device to teach it new capabilities. Although useful, many of these skills are created by third-party developers, a lot of which don’t have complete privacy policies. In other words, there’s not always a guarantee how that developer will use your data. More importantly, Amazon […]

Use the built-in iOS feature to share Wi-Fi passwords

When you have friends, family or other guests to your home, chances are some of them may want access to your Wi-Fi. Instead of typing in a long password that the other person might see, you can use the Wi-Fi sharing feature in iOS 11 or higher that allows you to grant access to others […]

Disable unused/dormant IoT devices

With so many devices at your disposal, some might go unused for weeks, if not months, at a time. Unused IoT devices, sensors and modulators still pose a threat to your cybersecurity. As long as they remain connected to your network, hackers may still be able to use them in accessing your information. Keep an […]

Connect no more than 50 devices to a single home router

Consumer routers should hold no more than 50 connections. The more devices, the greater the security risk. If one device is compromised, all other devices on the network could be, too. A good rule of thumb is to connect your most used devices — those with the most personal data — to a second home […]