IoT: How to secure your smart home against attacks

Smart Home IoT graphic

As more smart devices enter the market, consumers must be wary of IoT hacking. With homes becoming smarter and more connected, how do we decrease the threat?

So you’ve flung open the front door and welcomed the Internet of Things into your home. Alexa is perched atop your kitchen counter, your washing machine is linked to an app on your smartphone which also controls your surveillance and your thermostat beams data to some unknown server in some unknown location. Congratulations, you have a smart home.

It’s undeniable that the potential for absolute interconnectivity between all of your IoT devices is a good thing. They’re more efficient, they learn from each other and they work in perfect harmony: well, most of the time. Your daily tasks are made easier because of it but unfortunately, your security might not be.

Nowadays, many traditional household objects are connected through IoT
Nowadays, many traditional household objects are connected through IoT

As IoT ecosystems become more prominent in our homes, so too does the chance of hacking. The existence of multiple entry points and flimsy security could leave you open to attacks. As we move towards a more connected world, where reports suggest that spending on IoT will total $745 billion this year, many of the once-analogue devices we have in our homes are now part of that growing digital network. Some of those devices, with their inferior security systems, almost hang up a sign inviting hackers in.

How do attacks on our IoT devices work?

Just last year, McAfee exposed a vital flaw in Belkin’s Wemo switch. It may sound trivial, hacking a smart plug. You might think that the worst thing that the hackers could do is switch off your television. However, the smart plug’s connection to a WiFi network allows for device hopping. That innocuous-looking smart plug in your wall then becomes a gateway to your doors, your surveillance, and then your computer.

McAfee’s hack illustrated that by carrying out relatively simple attacks they were able to access a Smart TV on the same network, in just a few steps.



“Using the Wemo as a middleman, the attacker can power the TV on and off, install or uninstall applications, and access arbitrary online content. Smart TVs are just one example of using the Wemo to attack another device,” the report claims.

It goes on to say that once the attacker has gained a foothold, “any machine connected to the network is at risk.”

The security in some of these smart devices is often overlooked, as they are mostly used for simple automation. But if that smart plug is installed in a business office, where the records of millions of customers are present, then the threat of entry is even more serious. 

Recently, “hacktivists” breached the databases of an IoT management company, Orvibo. They managed to gain entry to 2 billion logs containing everything from user passwords and email addresses to precise geolocations and scheduling information.

Hackers recently breached IoT company Orvibo, gaining access to millions of users' details
Hackers recently breached IoT company Orvibo, gaining access to millions of users’ details

What can we do to eliminate the threat on our IoT networks?

There are three simple steps we can all take to ensure that our vulnerabilities are mitigated or removed entirely. 

Research: With governments now eager to step in and regulate IoT security, there is hope that the security of future devices’ will be labelled. For now, however, one of the first things to do when shopping for a smart device is to make sure you choose the safest on the market. Eliminate the threat of attack at source by picking one with no safety flaws, good reviews, and various levels of security. A quick search will soon tell you what you need to know about the device you plan to buy.

Update: Keep your device up-to-date and install any firmware or hardware patches to continuously improve your devices. If any security flaws are found, any company worth their salt will quickly patch the issue, removing the threat as soon as possible. 

Secure: To add extra levels of security to your IoT network, use complex passwords, change default usernames and enable multi-factor authentication (MFA). Also, creating a separate network for your IoT devices, especially in a business environment, will keep things even more secure. Using tried and trusted device access management systems and comprehensive security systems will also greatly diminish any problems you might face at the hands of hackers. 

Luke Conrad

Technology & Marketing Enthusiast

Why a data strategy underpins a successful AI strategy

Jim Liddle • 05th September 2024

AI and machine learning offer exciting innovation capabilities for businesses, from next-level predictive analytics to human-like conversational interfaces for functions such as customer service. But despite these tools’ undeniable potential many enterprises today are unprepared to fully leverage AI’s capabilities because they lack a prioritised data strategy. Bringing siloed and far-flung unstructured data repositories into...

Overcoming Inventory Challenges with Subscription Management Tools

Bluefort • 30th August 2024

Retailers face complex inventory management, especially with subscription models, which add extra challenges. This article explores these complexities, highlighting the pitfalls of manual processes and their costly inefficiencies. It also discusses how automation can simplify these challenges, turning them into opportunities for customer satisfaction and business growth.

The Power of the Subscription Model

Bluefort • 30th August 2024

The subscription model offers businesses a powerful strategy for sustainable growth by providing predictable revenue, fostering customer loyalty, and enabling flexibility to adapt to market changes. Companies like Adobe, Dollar Shave Club, and Porsche have demonstrated the success of this approach across various industries. By embracing subscriptions, businesses can build stronger customer relationships, increase Customer...

Streamlining Retail Administration with Subscription Management Solutions

Bluefort • 26th August 2024

Retailers encounter a distinctive set of challenges, operating in an intensely competitive industry where customer demand can fluctuate daily. In such an environment, stakeholders seek stability, and subscription-based models provide a solution by generating steady revenue and reducing administrative complexities. This article explores the most significant retail administrative challenges and demonstrates how a subscription management...

Streamlining Retail Administration with Subscription Management Solutions

Bluefort • 26th August 2024

Retailers encounter a distinctive set of challenges, operating in an intensely competitive industry where customer demand can fluctuate daily. In such an environment, stakeholders seek stability, and subscription-based models provide a solution by generating steady revenue and reducing administrative complexities. This article explores the most significant retail administrative challenges and demonstrates how a subscription management...

The CTO: From backroom to boardroom

Rohan Patel • 26th August 2024

Over the past decade, the tech industry has transformed at an astonishing rate, often leaving both consumers and businesses struggling to keep pace. At the forefront of this digital revolution is the Chief Technology Officer (CTO), whose responsibilities have evolved far beyond keeping up with tech trends. The role of the CTO has changed dramatically,...

The CTO: From backroom to boardroom

Rohan Patel • 26th August 2024

Over the past decade, the tech industry has transformed at an astonishing rate, often leaving both consumers and businesses struggling to keep pace. At the forefront of this digital revolution is the Chief Technology Officer (CTO), whose responsibilities have evolved far beyond keeping up with tech trends. The role of the CTO has changed dramatically,...
The Digital Transformation Expo is coming to London on October 2-3. Register now!