Image

"In the pursuit of convenience, we have to sacrifice privacy..." – Alex Cranz, GizmodoBut for voice-controlled devices or a central hub to take action on your voice command, it must be listening. Yes, it is always listening and sending that captured data back to its controlling server, which is something to think about the next time you are talking about confidential information (like reading your credit card number and security code over the phone for a purchase). I’m not advocating to not utilize Alexa, Google, or Siri voice command services. We just need to treat them like another person in the room hanging on your every word. Perhaps you want to call in that payment information from a private location instead of your living room. Additionally, make sure to treat smart devices like any other computer or computer networking device by immediately changing the default username and password upon installing it and then check for any firmware updates to patch known vulnerabilities. Patch all programs or apps used to run your smart devices using automatic updates when possible. Lastly, before purchasing the latest and greatest new connected device, consider how you will use the functionality gained by its connection. Will you use it at all? For me, I purchased a robot vacuum but decided that having it run on a schedule vs. from an app on my smartphone was my best option. Want to know more? Check out this recorded webinar “Securing Smart Devices: Cybersecurity in the Age of the Internet of Things.”