Some studies estimated that currently, The Internet now connects a staggering 10 billion devices.
This data means that we are more devices communicating with something or someone through the Internet than living persons in the world. And the number will continue to grow.
More devices connected increases concern about cybersecurity at home and makes it more necessary than ever to carry out audits such as our Digital Home Cybersecurity.
If you see the need to close the door of your house and prevent your computer or mobile from being hacked, why not do the same with your digital thermostat or your connected clock?
A real risk more dangerous than you think
Although it seems science fiction, the hacking of mobile devices and other connected home elements is already a reality.
An example of this is the case of the “My Friend Cayla” doll, which hid a Bluetooth antenna, a speaker, a microphone, and a voice recognition system. Thanks to this, the toy was able to ask the children about their place of residence, age, and other private family information.
The company kept all of this on its servers, which involved a double risk:
- Unauthorized access to these data
- Access a specific doll and talking directly to the children.
All this caused that in some countries the doll was banned.
Also, it would be best if you did not forget about the classic viruses and massive cyberattacks. They have not disappeared. They continue to exist and are increasingly sophisticated. That is why they continue to be one of the aspects that most concern cybersecurity experts.
Let’s talk about the 4 main myths about cybersecurity at home
You may think your home is safe, but you may also believe it based on common myths about home cybersecurity. We list some of them below:
- With a password, my wifi is protected: having a password does not guarantee the protection of your wifi. Unfortunately, many people use the default password, which hackers can easily guess. That is why it is advisable to follow some guidelines:
- Enable WPA2 encryption.
- Establish a new strong password (number, letters, and signs).
- Change the router administrator credentials.
- Update the router firmware.
- Change the default network SSID name.
- Browsing in incognito mode protects my privacy: incognito mode only prevents the browser from recording your movements on the Internet, although your computer, router, and websites that you visit do.
- I am not a potential victim, I am not interested in cybercriminals, and I have nothing to hide: Do you access your bank through the Internet? Do you make purchases online? Do you carry out procedures on your computer? Do you publish your life on social networks? So yes, you are a potential victim. Your data and your daily habits are valuable for hackers. Furthermore, malicious hackers can use your network to mine cryptocurrencies or launch attacks on other devices.
- I already have security software (antivirus) installed: that is a good decision, but it does not guarantee 100% security. It is also essential to install it on mobiles and tablets, pay attention to the router, make updates, and have specific solutions such as our Digital Home Cybersecurity service or our Total Protection Plan.
How to maintain personal cybersecurity?
Here are some tips that may help to increase your home cybersecurity.
- Avoid buying second-hand devices as much as possible, as they may be modified. In addition, you must always go to official or trusted stores.
- As for the device itself, you must modify the credentials and make them more secure, by changing the default password and login names.
- Always install all the updates of the operating system you use, Windows, IOS, Android, or other. These updates usually correct vulnerabilities or security flaws that cybercriminals use to steal data, content, or hijack devices.
- Make automatic backups. Any attack will have less impact on the family if you keep copies of the data stored on your devices.
- Use spy cams covers and antivirus on mobile phones. Malware that allows you to spy on another person through the camera and speaker is more accessible. You no longer have to be a hacker to get them. Someone can buy these programs on the deep web.
- Help your children to configure the privacy of their profiles on social networks,
- Educate your children to:
- not to accept contacts from strangers,
- post sensitive family information,
- open emails from ‘dubious’ senders,
- share their location on networks,
- install apps on their phones that request access to personal and contact data,
- Supervise their digital activity is essential since they are increasingly focusing on the Internet by cybercriminals and sexual predators.
Enjoying all that technology offers you with minimal risk is possible. However, although you do not forget it, 100% security does not exist.
Pingback: Types of Online Threats for Childrens - CyberSecGuide.com