Overview

The Internet of Things (IoT) is the network of devices, appliances, vehicles, and other smart objects that collect and share data through the internet. The interconnectedness of these devices—paired with their low levels of security—makes them popular targets for cybercriminals. Setting up a guest network on your Wi-Fi router can isolate smart devices from your computers and smartphones, keeping your sensitive personal information safer. 

Cars that identify hazards in the road, door locks opened by voice command, dishwashers that order their own detergent: A staggering array of smart products tempt consumers today.

By next year, individuals and businesses are likely to use more than 20 billion of them globally, according to the Federal Trade Commission (FTC).

Connected by the Internet of Things (IoT), these devices can provide convenience, peace of mind, and even added safety. But without stringent security measures and good habits in place, they could also make you all too vulnerable to hackers.

What is the Internet of Things? 

The Internet of Things is the network of objects—home and wearable devices, appliances, vehicles, and more—that are outfitted with sensors and software allowing them to connect and share data with other devices and systems through the internet.

Some examples of IoT devices include: 

  • Smart home devices: Thermostats, light bulbs, and security cameras that can be controlled remotely 

  • Wearables: Fitness trackers and smartwatches that monitor your health and activity 

  • Kitchen appliances: Smart refrigerators or coffee makers that simplify meal prep and brewing 

  • Automotive features: Navigation systems or diagnostics that keep you informed about your vehicle 

  • Voice-activated assistants: Devices like Amazon Echo or Google Nest that respond to your commands 

  • Healthcare tools: Devices like blood pressure monitors or glucose meters that track your well-being 

  • Industrial equipment: Tools with sensors that monitor performance and maintenance needs 

These devices usually access the internet through household routers and/or smartphones, completing their tasks with minimal human involvement. A home’s thermostat adjusts the temperature when it senses that no one is home, for example, or a smartwatch charts a wearer’s steps.

In the process, these possessions gather and store enormous amounts of information about their user.

The risks of smart devices

For bad actors, the billions of smart objects connected to the internet represent billions of potential ways to access people’s homes, vehicles, and personal information.

Just as smart device users are targets for cybercriminals, so too are firms in the Internet of Things industry. After all, they store massive amounts of information about a vast number of individuals.

This is particularly true because of the interconnected nature of smart devices. If a hacker can break into a household’s washing machine, they may be also able to access the Wi-Fi network to which it’s connected. From there, they can hop onto other unsecured devices on the network—including your computers and smartphones.  

If a smart object has minimal or no security features built in, it may be easier to hack. Many often lack virus protection, for example, and don’t receive regular security updates. Plus, they often link to a smartphone app—another possible point of illicit entry.

Hackers have also been known to harass people through their smart home systems and remotely control cars. But far more often, cybercriminals breach a smart object in an effort to reach other devices on the same network.

Usually, this isn’t a targeted attempt. Bad actors launch automatic online attacks that scan-test billions of internet-connected devices, looking for weak spots to exploit.

Once they’ve gained access to a network and its devices, cybercriminals can mine sensitive personal information that they may use to commit identity theft and fraud.

How to tighten your smart device security

Basic cybersecurity practices go a long way toward minimizing the risks involved with Internet of Things devices.

However, these need to be applied to your Wi-Fi network, as well as every single smart object that connects to it.   

  • Create a “guest” network on your router for your smart devices. Give the network a unique name and password and turn off access to the main network. If a hacker gets in through your smart washing machine, they may be able to access your TV, but they won’t be able to breach devices such as computers and phones that are connected to the main network. 

  • Protect everything from routers to toasters with unique, strong passwords. Whenever possible, enable two-factor authentication (2FA), as well as encryption and any other security features offered by the device.  

  • Do your research before buying new “things.” Go with high-quality goods from reputable companies. Select products that use strong encryption and offer regular firmware updates. When available, choose those that offer firewalls and that store data on the device itself rather than on the cloud. 

  • Keep your smart objects updated. Enable automatic updates or manually run them for apps and software as soon as they become available. Keep in mind that these devices may need to be replaced every few years to stay compatible with the latest security technology. 

  • Never use public Wi-Fi to access your devices. If you want to check your doorbell camera from the airport, stick to your own mobile data or use a virtual private network (VPN).

  • Turn off features you don’t use. If you have a smart device with a function—such as a camera, voice activation, or even internet connectivity—that you don’t use, turn it off. This closes a door that could be unlocked by hackers. For most smart devices, you can usually disable functions directly through the device’s mobile app. 

If you’re concerned that your smart devices might have exposed your personal information to cybercriminals, we’re here to help. Allstate Identity Protection members can count on our specialists to investigate potential breaches and work toward restoring your security and peace of mind.