{"id":706,"date":"2020-03-03T10:15:00","date_gmt":"2020-03-03T10:15:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=706"},"modified":"2020-12-03T15:31:51","modified_gmt":"2020-12-03T15:31:51","slug":"10-iot-security-tips-you-can-use-to-secure-your-iot-devices","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/","title":{"rendered":"10 IoT Security Tips You Can Use to Secure Your IoT Devices"},"content":{"rendered":"\n<p>IoT is something of a double-edged sword. While it makes life so much simpler to have a smart home with a smart lock, and a Wi-Fi kettle that boils the water for your morning tea automatically, it comes at a price that may cost you significantly more than what\u2019s on the price tag. In IoT security, there are security trade-offs and, unfortunately, these can do more harm than good, and almost make you miss the days when there was nothing \u201csmart\u201d about your TV! <\/p>\n\n\n\n<p>Let\u2019s take\na look at some examples to drive home the importance of security before we\nwelcome this technology into our homes, our industries, and our everyday lives.\n<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>IoT Security: How Your Connected Devices Leave You\nVulnerable<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/iot-road.jpg\" alt=\"IoT\" class=\"wp-image-15\" width=\"283\" height=\"184\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/iot-road.jpg 900w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/iot-road-300x195.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/iot-road-560x364.jpg 560w\" sizes=\"auto, (max-width: 283px) 100vw, 283px\" \/><\/figure><\/div>\n\n\n\n<p>Hackers can gain a foothold into your network from the most innocuous devices on your network. Nicole Eagan, CEO of Darktrace, a cybersecurity firm, <a href=\"https:\/\/www.bbc.com\/news\/business-43879931\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">recounts an incident<\/a> at an unnamed casino in North America where attackers were able to access the high-roller database of gamblers. They did so by exploiting a low-risk vulnerability in a smart thermometer that was used to monitor the temperature of an aquarium. <\/p>\n\n\n\n<p>But this is\njust one example. Let\u2019s take a look at a few more examples of IoT security\nbreaches before moving on to pointers on IoT device security. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Consumer Smart Devices at Home <\/strong><\/h3>\n\n\n\n<p>If you&#8217;ve read the reports on how security bugs in Alexa and Google Home smart assistants have been exploited to <a href=\"https:\/\/securityintelligence.com\/news\/alexa-and-google-home-exposed-users-to-phishing-attacks-eavesdropping-via-developer-backends\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">phish<\/a> and <a href=\"https:\/\/www.washingtonpost.com\/technology\/2019\/05\/06\/alexa-has-been-eavesdropping-you-this-whole-time\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">eavesdrop on users<\/a>, let&#8217;s just say that you&#8217;re right to be worried. Despite countermeasures from both Amazon and Google every time, they continue to be thwarted using newer techniques. <\/p>\n\n\n\n<p>Apart from this, there\u2019s Samsung\u2019s smart refrigerator, whose display is\ndesigned to be integrated with its user\u2019s Gmail calendar so they can see what\ntheir day looks like before heading out of the house. Except that, however\ngreat that sounds, it is not quite as neat. Even though SSL was deployed to\nsecure the Gmail integration, the fridge itself failed to validate the SSL\/TLS certificate,\nleaving the doorway open to hackers for getting on the same network and\nstealing the login credentials. <\/p>\n\n\n\n<p>To their credit, Samsung fixed the bug in a software update, but it\u2019s quite troubling when credible brands get breached. It sheds light on an almost inescapable fact that, more often than not, functionality takes priority over security, even in companies that should know better. What\u2019s more, in 2015 <a href=\"https:\/\/www.samsung.com\/hk_en\/info\/privacy\/smarttv\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Samsung also warned us<\/a> about how they intended to collect and use our data in their <a href=\"https:\/\/www.hackread.com\/how-to-scan-your-samsung-smart-tvs-for-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">smart TV<\/a> policy: <\/p>\n\n\n\n<p>&nbsp;\u201cPlease\nbe aware that if your spoken words include personal or other sensitive\ninformation, that information will be among the data captured and transmitted\nto a third party through your use of Voice Recognition.\u201d <\/p>\n\n\n\n<p>Thank God for Apple, though, right? Let\u2019s hold onto that thought a moment. In February 2019, a severe bug was discovered in Apple\u2019s FaceTime app that <a href=\"https:\/\/www.macworld.co.uk\/news\/iphone\/facetime-bug-hack-3691275\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">allowed attackers access to someone\u2019s iPhone camera and microphone<\/a> <em>before<\/em> they accepted or rejected an incoming call.<\/p>\n\n\n\n<p>With attackers finding ingenious ways to evade security controls to\nsteal data, cause damage, or merely be disruptive, it is reasonable to err on\nthe side of safety. Nevertheless, if you still fancy a smart home, umm&#8230; good\nluck? <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>IoT Devices Are Used in Large Botnets Like Mirai<\/strong><\/h3>\n\n\n\n<p>Mirai is an IoT-centric malware that infects devices with weak\ncredentials, turning them into a network of remotely controlled zombies or\nbots. Although the original creators of Mirai have been caught, they previously\nreleased the malware\u2019s source code (possibly to confuse and distract\nauthorities), and now it has several mutations. <\/p>\n\n\n\n<p>Botnets have been used to launch several DDoS attacks with the attack on\nRutgers University and the one on Dyn (the company that provides domain name\nservices to the likes of Netflix, Twitter, etc.).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Implantable Medical Devices<\/strong><\/h3>\n\n\n\n<p>In\ntechnology, nothing is sacred or spared from the clutches of cybercriminals.\nThis includes medical devices. <\/p>\n\n\n\n<p>At a Black Hat conference in 2018, Billy Rios of WhiteScope and Jonathan Butts of QED Secure Solutions demonstrated how <a href=\"https:\/\/www.wired.com\/story\/pacemaker-hack-malware-black-hat\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">medical implants<\/a>, which are intended to save patients\u2019 lives, can be controlled remotely by hackers and manipulated to cause unwarranted harm. The two security researchers demonstrated how they could disable an insulin pump and take control of the system of <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/03\/25\/medtronic-cardiac-implants-can-be-hacked-fda-issues-alert\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">pacemaker devices manufactured by Medtronic<\/a>. In response, <a href=\"https:\/\/www.medtronic.com\/us-en\/healthcare-professionals\/products\/product-performance\/carelink-urgent-medical-device-correction.html\">Medtronic<\/a> had initially brushed off the reported vulnerabilities as \u201clow risk\u201d bugs, failing to acknowledge the seriousness of the situation. They refused to resolve the issue even 570 days after the researches first submitted their findings!<\/p>\n\n\n\n<p>We can spend hours speculating over how a network of remotely controlled IoT devices can be used to <a href=\"https:\/\/www.wired.com\/story\/water-heaters-power-grid-hack-blackout\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">bring down power grids<\/a> (or SCADA systems used in water distribution stations, to control gas pipelines, etc.) or squirm uncomfortably at the idea of <a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/stranger-hacks-baby-monitor-tells-child-i-love-you-n1090046\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"baby monitors (opens in a new tab)\">baby monitors<\/a> being hacked. But what remains certain is that IoT is here to stay. As such, manufacturers need to be more mindful of the security risks (advanced persistent threats [APTs] being most dangerous) involved if we are to avoid an unbridled crisis. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Are the Biggest IoT\nSecurity Risks?<\/h2>\n\n\n\n<p>While we may not have much say in the matter, we can, to some extent, limit its control on our lives by taking some safety measures to secure our devices. The <a href=\"https:\/\/sectigostore.com\/blog\/what-is-owasp-your-guide-to-the-open-web-application-security-project\/\">Open Web Application Security Project (OWASP)<\/a> Foundation is a global non-profit group that creates awareness regarding security risks in domains like web application security, mobile security, etc. so that individuals and organizations can make informed decisions. <\/p>\n\n\n\n<p>The table below lists the <a href=\"https:\/\/owasp.org\/www-project-internet-of-things\/\">OWASP Top 10 <\/a><a href=\"https:\/\/owasp.org\/www-project-internet-of-things\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"I (opens in a new tab)\">I<\/a><a href=\"https:\/\/owasp.org\/www-project-internet-of-things\/\">oT vulnerabilities<\/a> found in smart devices in 2014 and 2018:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><tbody><tr><td><strong>Top Ten<\/strong>   <\/td><td>\n  <strong>2014 IoT Top Ten<\/strong>\n  <\/td><td>\n  <strong>2018 IoT Top Ten<\/strong>\n  <\/td><\/tr><tr><td><strong>1<\/strong>   <\/td><td>\n  Insecure Web Interface\n  <\/td><td>\n  Weak, Guessable, or Hardcoded Passwords\n  <\/td><\/tr><tr><td><strong>2<\/strong>   <\/td><td>\n  Insufficient Authentication\/Authorization\n  <\/td><td>\n  Insecure Network Services\n  <\/td><\/tr><tr><td>   <strong>3<\/strong>   <\/td><td>\n  Insecure Network Services\n  <\/td><td>\n  Insecure Ecosystem Interfaces\n  <\/td><\/tr><tr><td>   <strong>4<\/strong>   <\/td><td>\n  Lack of Transport Encryption\/Integrity Verification\n  <\/td><td>\n  Lack of Secure Update Mechanism\n  <\/td><\/tr><tr><td>   <strong>5<\/strong>   <\/td><td>\n  Privacy Concerns\n  <\/td><td>\n  Use of Insecure or Outdated Components (NEW)\n  <\/td><\/tr><tr><td>   <strong>6<\/strong>   <\/td><td>\n  Insecure Cloud Interface\n  <\/td><td>\n  Insufficient Privacy Protection\n  <\/td><\/tr><tr><td>   <strong>7<\/strong>   <\/td><td>\n  Insecure Mobile Interface\n  <\/td><td>\n  Insecure Data Transfer and Storage\n  <\/td><\/tr><tr><td>  <strong>8<\/strong>   <\/td><td>\n  Insufficient Security Configurability\n  <\/td><td>\n  Lack of Device Management\n  <\/td><\/tr><tr><td>   <strong>9<\/strong>   <\/td><td>\n  Insecure Software\/Firmware\n  <\/td><td>\n  Insecure Default Settings (NEW)\n  <\/td><\/tr><tr><td>   <strong>10<\/strong>   <\/td><td>\n  Poor Physical Security\n  <\/td><td>\n  Lack of Physical Hardening\n  <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Table\n1:\nOWASP IoT Top 10 \u2014 2014 vs 2018<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Top 10 Tips for IoT Security for Your Organization<\/strong><\/h2>\n\n\n\n<p>If your smart device comes equipped with unchangeable credentials or any type of <a href=\"https:\/\/sectigostore.com\/blog\/the-difference-between-authentication-and-authorization-explained-in-detail-by-a-security-expert\/\">authentication\/authorization mechanism<\/a>, do yourself a huge favor and don\u2019t buy it! As you can see from the <a href=\"https:\/\/owasp.org\/www-project-internet-of-things\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">OWASP Top 10 Internet of Things 2018<\/a> list of vulnerabilities, several concerns such as insecure ecosystems (web interface, cloud interface, etc.), data security, and physical security have retained their top 10 positions from the previous 2014 list. This gives us an inkling of the direction and speed at which IoT device security is moving. It also raises pertinent questions on the efficacy and adoption rate of IoT security solutions. <\/p>\n\n\n\n<p>However, because\nIoT is becoming such an integral part of our everyday lives, and we must do our\nbest to safeguard our connected devices, our data, and our networks. Here are a\nfew of the ways you can do that:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Know Your Network and The Connected Devices on It<\/strong><\/h3>\n\n\n\n<p>When your\ndevices connect to the internet, these connections leave your entire network\nvulnerable and open to attackers if the devices aren\u2019t adequately secured. With\nmore and more devices being equipped with web interfaces, it\u2019s easy to lose\ntrack of which of your devices are accessible over the wire. To stay secure, it\u2019s\nessential to know your network \u2014 the devices on it and the type of information\nthey\u2019re susceptible to disclosing (especially if their corresponding apps come\nwith social sharing features). <\/p>\n\n\n\n<p>Cybercriminals\nuse information such as your location, your personal details, etc. to keep tabs\non you \u2014 which can translate into real-world dangers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Assess the IoT Devices on Your Network<\/strong><\/h3>\n\n\n\n<p>Once you\nknow which devices are connected to your network, audit your devices to\nunderstand their security posture. Internet of things security can be implemented\nby installing security patches and updates from manufacturers\u2019 website in a\ntimely manner, check for newer models with stronger security features, etc.\nAdditionally, before making a purchase, read up to understand how much of a\npriority, security is, for that brand. Ask yourself: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Do\nany of its products have reported security bugs that have resulted in breaches?\n<\/li><li>Does\nthe company address cybersecurity needs while pitching products to potential\ncustomers? <\/li><li>How\nare security controls implemented in their smart solutions? <\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Implement\nStrong Passwords to Protect All of Your Devices and Accounts<\/strong><\/h3>\n\n\n\n<p>Use strong,\nunique passwords that can\u2019t be easily guessed to secure all your accounts and\ndevices. Get rid of default passwords or common passwords like \u201cadmin\u201d or\n\u201cpassword123.\u201d Make use of a password manager, if needed, to keep track of all\nyour passwords. &nbsp;Ensure that you and your\nemployees don\u2019t use the same passwords across multiple accounts and be sure to change\nthem periodically. <\/p>\n\n\n\n<p>These steps\nhelp to prevent all of your accounts from getting compromised even when one of\nthem exposes any sensitive account information. Apart from password expiration\ndates, be sure to also set a limit on the number of wrong password attempts and\nimplement an account lockout policy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Use a Separate Network for Your Smart Devices<\/strong><\/h3>\n\n\n\n<p>Utilizing a\nseparate network than your home or business network for your smart devices is\nperhaps one of the most strategic approaches to IoT security. With network\nsegmentation, even if attackers find a way into your smart devices, they can\u2019t\naccess your business data or sniff on that bank transfer you did from your\npersonal laptop.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Reconfigure Your Default Device Settings<\/strong><\/h3>\n\n\n\n<p>More often\nthan not, a lot of our smart devices are shipped with insecure default settings.\nTo make matters worse, sometimes, you can\u2019t modify these device configurations!\nWeak default credentials, intrusive features and permissions, open ports, etc.\nneed to be assessed and reconfigured based on your requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Install Firewalls and Other Reputable IoT Security\nSolutions to Identify Vulnerabilities<\/strong><\/h3>\n\n\n\n<p>Install firewalls to block unauthorized traffic over the wire and run intrusion detection systems\/intrusion prevention systems (IDS\/IPS) to monitor and analyze network traffic. You can also use automated vulnerability scanners to uncover security weaknesses within your network infrastructure. Use a port scanner to identify open ports and review the network services that are running. Establish whether these ports are absolutely needed and examine the services running on them for known vulnerabilities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>7. Use Strong Encryption and Avoid Connecting Over\nInsecure Networks<\/strong><\/h3>\n\n\n\n<p>If you decide to check up on your smart devices remotely, never do so using public Wi-Fi networks or ones that don\u2019t implement reliable encryption protocols. Ensure your own network setup does not run on outdated standards like WEP or WPA \u2014 instead, use WPA2. Insecure internet connections can leave your data and devices exposed to attackers. Though WPA2 itself is found to be vulnerable to <a href=\"https:\/\/www.blackhat.com\/docs\/eu-17\/materials\/eu-17-Vanhoef-Key-Reinstallation-Attacks-Breaking-The-WPA2-Protocol-wp.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">key reinstallation attacks<\/a>, or KRACK, and WPA3 is susceptible to <a href=\"https:\/\/wpa3.mathyvanhoef.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Dragonblood<\/a> attacks, installing updates and patches is the only way to move forward, accepting a minimum level of risk. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>8. Disconnect Devices and Features When They\u2019re Not in\nUse <\/strong><\/h3>\n\n\n\n<p>Review the\napp permissions and read the privacy policy of these apps to understand how\nthey intend to use the information you share. Disable features such as remote\naccess, voice control, etc. unless you\u2019re using them in order to implement more\ntenacious internet of things security checks. You can always enable them if and\nwhen the need arises. When you\u2019re not using your devices, consider\ndisconnecting them from the network altogether.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>9. Turn off Universal Plug and Play (UPnP)<\/strong><\/h3>\n\n\n\n<p>While universal\nplug and play is designed to network devices seamlessly without the hassles of\nconfiguration, it also makes these very same devices discoverable to hackers\nfrom outside your local network more easily due to vulnerabilities in the UPnP\nprotocol. UPnP comes enabled by default on several routers, so check your\nsettings and ensure it\u2019s disabled unless you\u2019re willing to compromise your\nsecurity for the sake of convenience. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>10. Keep Your Devices Safe by Implementing Physical\nSecurity<\/strong><\/h3>\n\n\n\n<p>Try not to\nlose your phones, especially if it\u2019s loaded with apps that control your IoT\ndevices! In case you do, in addition to having PIN\/password\/biometric\nprotection on your device, make sure you have the ability to wipe your phone\nremotely. Set up <a href=\"https:\/\/sectigostore.com\/blog\/what-is-an-incremental-backup\/\">automatic backups<\/a> or selectively back up any device data you\nmight need<\/p>\n\n\n\n<p>Furthermore,\nlimit your smart devices\u2019 accessibility. For instance, does your refrigerator\nrequire a USB port? Give access to a minimum number of ports and consider\nhaving no web access (only local access) where feasible. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>IoT\nSecurity Analysis Tools <\/strong><\/h2>\n\n\n\n<p>Apart from\nthe IoT security solutions discussed earlier, there are a few other tools that\ncan be used to have better visibility and control over your network. Wireshark\nand tcpdump (a command-line utility) are two open-source tools you can use to\nmonitor and analyze the network traffic. Wireshark is more user-friendly since\nit comes with a GUI and has various sorting and filtering options. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.shodan.io\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Shodan<\/a>, <a href=\"https:\/\/censys.io\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Censys<\/a>, <a href=\"https:\/\/www.thingful.net\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Thingful<\/a>, and <a href=\"https:\/\/www.zoomeye.org\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ZoomEye<\/a> are tools you can use (like search engines) for IoT devices. ZoomEye is perhaps the easiest one to figure out for new users since the search query is automatically generated when you click on filters.<\/p>\n\n\n\n<p><a href=\"https:\/\/gitlab.com\/bytesweep\/bytesweep\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ByteSweep<\/a>, a free security analysis platform for device manufacturers, is another tool that testers can use to run checks before any product is shipped. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>IoT Security in Summary<\/strong><\/h2>\n\n\n\n<p>Regardless\nof the risks, it\u2019s a no brainer that IoT technologies have tremendous\npotential. The connectivity of IoT has demonstrated usefulness for solving\nproblems all kinds of settings and tasks such as assisted living, environment\nmonitoring, health monitoring, etc. The problem arises when companies rush to\nadopt the most \u201cin thing\u201d and, in a hurry to come out at the top, they either\nmiss to consider potential security risks altogether or don\u2019t take it seriously\nenough. <\/p>\n\n\n\n<p>More\nconsistent and sincere efforts towards developing safe and secure products,\nincreasing awareness among customers, and conducting rigorous testing before\nreleasing devices can, to a large extent, address many of the concerns that\ncurrently are more a result of neglect than a lack of skill.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IoT is something of a double-edged sword. While it makes life so much simpler to have a smart home with a smart lock, and a Wi-Fi kettle that boils the&#8230;<\/p>\n","protected":false},"author":9,"featured_media":709,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[43,44],"class_list":["post-706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-iot-security","tag-tips","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 IoT Security Tips You Can Use to Secure Your IoT Devices - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"IoT technology makes life more convenient but also brings additional security complications. Here are some IoT security tips you can use at work &amp; at home.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 IoT Security Tips You Can Use to Secure Your IoT Devices - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"IoT technology makes life more convenient but also brings additional security complications. Here are some IoT security tips you can use at work &amp; at home.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-03T10:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-03T15:31:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/iot-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lumena Mukherjee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lumena Mukherjee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/\"},\"author\":{\"name\":\"Lumena Mukherjee\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\"},\"headline\":\"10 IoT Security Tips You Can Use to Secure Your IoT Devices\",\"datePublished\":\"2020-03-03T10:15:00+00:00\",\"dateModified\":\"2020-12-03T15:31:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/\"},\"wordCount\":2361,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/iot-security.jpg\",\"keywords\":[\"IoT Security\",\"Tips\"],\"articleSection\":[\"IoT\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/\",\"name\":\"10 IoT Security Tips You Can Use to Secure Your IoT Devices - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/iot-security.jpg\",\"datePublished\":\"2020-03-03T10:15:00+00:00\",\"dateModified\":\"2020-12-03T15:31:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\"},\"description\":\"IoT technology makes life more convenient but also brings additional security complications. Here are some IoT security tips you can use at work & at home.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/iot-security.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/iot-security.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Graphic representing IoT security in terms of connected devices around the world\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 IoT Security Tips You Can Use to Secure Your IoT Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\",\"name\":\"Lumena Mukherjee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"caption\":\"Lumena Mukherjee\"},\"description\":\"Lumena is a cybersecurity consultant, tech writer, and regular columnist for InfoSec Insights. She is currently pursuing her masters in cybersecurity and has a passion for helping companies implement better security programs to protect their customers' data.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 IoT Security Tips You Can Use to Secure Your IoT Devices - InfoSec Insights","description":"IoT technology makes life more convenient but also brings additional security complications. Here are some IoT security tips you can use at work & at home.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/","og_locale":"en_US","og_type":"article","og_title":"10 IoT Security Tips You Can Use to Secure Your IoT Devices - InfoSec Insights","og_description":"IoT technology makes life more convenient but also brings additional security complications. Here are some IoT security tips you can use at work & at home.","og_url":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/","og_site_name":"InfoSec Insights","article_published_time":"2020-03-03T10:15:00+00:00","article_modified_time":"2020-12-03T15:31:51+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/iot-security.jpg","type":"image\/jpeg"}],"author":"Lumena Mukherjee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lumena Mukherjee","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/"},"author":{"name":"Lumena Mukherjee","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f"},"headline":"10 IoT Security Tips You Can Use to Secure Your IoT Devices","datePublished":"2020-03-03T10:15:00+00:00","dateModified":"2020-12-03T15:31:51+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/"},"wordCount":2361,"commentCount":0,"image":{"@id":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/iot-security.jpg","keywords":["IoT Security","Tips"],"articleSection":["IoT"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/","url":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/","name":"10 IoT Security Tips You Can Use to Secure Your IoT Devices - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/iot-security.jpg","datePublished":"2020-03-03T10:15:00+00:00","dateModified":"2020-12-03T15:31:51+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f"},"description":"IoT technology makes life more convenient but also brings additional security complications. Here are some IoT security tips you can use at work & at home.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/iot-security.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/iot-security.jpg","width":1600,"height":1000,"caption":"Graphic representing IoT security in terms of connected devices around the world"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/10-iot-security-tips-you-can-use-to-secure-your-iot-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"10 IoT Security Tips You Can Use to Secure Your IoT Devices"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f","name":"Lumena Mukherjee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","caption":"Lumena Mukherjee"},"description":"Lumena is a cybersecurity consultant, tech writer, and regular columnist for InfoSec Insights. She is currently pursuing her masters in cybersecurity and has a passion for helping companies implement better security programs to protect their customers' data."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=706"}],"version-history":[{"count":3,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/706\/revisions"}],"predecessor-version":[{"id":1843,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/706\/revisions\/1843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/709"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}