IoT: How to secure your smart home against attacks

Smart Home IoT graphic

As more smart devices enter the market, consumers must be wary of IoT hacking. With homes becoming smarter and more connected, how do we decrease the threat?

So you’ve flung open the front door and welcomed the Internet of Things into your home. Alexa is perched atop your kitchen counter, your washing machine is linked to an app on your smartphone which also controls your surveillance and your thermostat beams data to some unknown server in some unknown location. Congratulations, you have a smart home.

It’s undeniable that the potential for absolute interconnectivity between all of your IoT devices is a good thing. They’re more efficient, they learn from each other and they work in perfect harmony: well, most of the time. Your daily tasks are made easier because of it but unfortunately, your security might not be.

Nowadays, many traditional household objects are connected through IoT
Nowadays, many traditional household objects are connected through IoT

As IoT ecosystems become more prominent in our homes, so too does the chance of hacking. The existence of multiple entry points and flimsy security could leave you open to attacks. As we move towards a more connected world, where reports suggest that spending on IoT will total $745 billion this year, many of the once-analogue devices we have in our homes are now part of that growing digital network. Some of those devices, with their inferior security systems, almost hang up a sign inviting hackers in.

How do attacks on our IoT devices work?

Just last year, McAfee exposed a vital flaw in Belkin’s Wemo switch. It may sound trivial, hacking a smart plug. You might think that the worst thing that the hackers could do is switch off your television. However, the smart plug’s connection to a WiFi network allows for device hopping. That innocuous-looking smart plug in your wall then becomes a gateway to your doors, your surveillance, and then your computer.

McAfee’s hack illustrated that by carrying out relatively simple attacks they were able to access a Smart TV on the same network, in just a few steps.



“Using the Wemo as a middleman, the attacker can power the TV on and off, install or uninstall applications, and access arbitrary online content. Smart TVs are just one example of using the Wemo to attack another device,” the report claims.

It goes on to say that once the attacker has gained a foothold, “any machine connected to the network is at risk.”

The security in some of these smart devices is often overlooked, as they are mostly used for simple automation. But if that smart plug is installed in a business office, where the records of millions of customers are present, then the threat of entry is even more serious. 

Recently, “hacktivists” breached the databases of an IoT management company, Orvibo. They managed to gain entry to 2 billion logs containing everything from user passwords and email addresses to precise geolocations and scheduling information.

Hackers recently breached IoT company Orvibo, gaining access to millions of users' details
Hackers recently breached IoT company Orvibo, gaining access to millions of users’ details

What can we do to eliminate the threat on our IoT networks?

There are three simple steps we can all take to ensure that our vulnerabilities are mitigated or removed entirely. 

Research: With governments now eager to step in and regulate IoT security, there is hope that the security of future devices’ will be labelled. For now, however, one of the first things to do when shopping for a smart device is to make sure you choose the safest on the market. Eliminate the threat of attack at source by picking one with no safety flaws, good reviews, and various levels of security. A quick search will soon tell you what you need to know about the device you plan to buy.

Update: Keep your device up-to-date and install any firmware or hardware patches to continuously improve your devices. If any security flaws are found, any company worth their salt will quickly patch the issue, removing the threat as soon as possible. 

Secure: To add extra levels of security to your IoT network, use complex passwords, change default usernames and enable multi-factor authentication (MFA). Also, creating a separate network for your IoT devices, especially in a business environment, will keep things even more secure. Using tried and trusted device access management systems and comprehensive security systems will also greatly diminish any problems you might face at the hands of hackers. 

iot, IoT, IoT: How to secure your smart home against attacks

Ben Ashman

Ben is a multimedia journalist with a keen passion for technology, literature and art. When he isn't writing you can find him wandering around London's museums and galleries.

Personalization is the beating heart of successful hybrid cloud

Amber Donovan-Stevens • 27th November 2021

In the post-millennial era of real world cloud deployment, the modern digitally distributed nature of businesses requires a range of infrastructure options to allow each customer to leverage a mix of cloud technologies to best suit their unique needs while optimizing the associated costs. How can we enable this kind of flexibility in the face...

The Best Ten Rated Cloud Security Management Options For Business

Erin Laurenson • 24th November 2021

Cloud Security programs that can carry out safety procedures and address or flag potential high-risk elements are now critical, allowing businesses to function normally without fearing a potential breach. To help you find the best Cloud management and security system for your business, we’ve done the research and found the top systems presently available on...

How the cloud can drive organizational sustainability goals

Amber Donovan-Stevens • 24th October 2021

Mark Hughes, RVP of UK & Ireland, Epicor, explores cloud computing’s implications for organisational sustainability practices and introduces the key findings of Epicor’s survey of technology decision-makers in the US and the UK.xplains how cloud technology can spearhead an organizations sustainability initiatives.