Skip to content

Saturday April 20, 2024 Salt Lake City, UT

Cyber Security

Inside DPS

Protecting Utah

Internet of Things

Wednesday October 2, 2019

 Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world. 

WHY SHOULD WE CARE? 

• Cars, appliances, wearables, lighting, healthcare, and home security all contain sensing devices that can talk to another machine and trigger other actions. Examples include devices that direct your car to an open spot in a parking lot; mechanisms that control energy use in your home; and tools that track eating, sleeping, and exercise habits.

• New Internet-connected devices provide a level of convenience in our lives, but they require that we share more information than ever.

• The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the Internet, you and your device could potentially be vulnerable to all sorts of risks.

• With more connected “things” entering our homes and our workplaces each day, it is important that everyone knows how to secure their digital lives.

SIMPLE TIPS TO OWN IT. 

• Shake up your password protocol. Change your device’s factory security settings from the default password. This is one of the most important steps to take in the protection of IoT devices. According to NIST guidance, you should consider using the longest password or passphrase permissible. Get creative and create a unique password for your IoT devices. Read the Creating a Password Tip Sheet for more information.

• Keep tabs on your apps. Many connected appliances, toys, and devices are supported by a mobile application. Your mobil edevice could be filled with apps running in the background or using default permissions you never realized you approved— gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.

• Secure your network. Properly secure the wireless network you use to connect Internet-enabled devices. Consider placing these devices on a separate and dedicated network. For more information on how you can secure your network, view the National Security Agency’s Cybersecurity Information page.

• If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems. If you have the option to enable automatic updates to defend against the latest risks, turn it on.


SHARE THIS STORY

More Videos in this Series

Motorcyclist Killed on I-80

June 20, 2020

Fatal Crash: San Juan County on SR-191 at Milepost 78

May 11, 2020

Utah’s New Lane Filtering Law

May 8, 2019

More from the News Room

Panguitch Lake Dam (Updated 4/15/24)

April 2024

Fatal crash, involving a child, west of Helper.

April 2024

Wrong-Way driver causes crash, south of Saint George on I-15

April 2024