smart device – iDefend https://www.idefendhome.com Ultimate Protection for Your Digital Life Wed, 11 Sep 2024 17:30:19 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.idefendhome.com/wp-content/uploads/cropped-idefend-favicon-32x32.png smart device – iDefend https://www.idefendhome.com 32 32 Smart Assistants are Getting a Little Too Smart https://www.idefendhome.com/blog/onlineprivacy/smartassistantsgettingtoosmart/ Wed, 11 Sep 2024 17:29:25 +0000 https://www.idefendhome.com/?p=7205 While extremely convenient, smart assistants like Alexa, Siri, and Google may be listening in, learning from, and sometimes even sharing our private conversations. Are these devices getting a bit too smart for their own good? Is it worth the risk of having one? We’ll help you decide.

The post Smart Assistants are Getting a Little Too Smart first appeared on iDefend.

]]>
pexels-jonathanborba-14309815
While extremely convenient, smart assistants like Alexa, Siri, and Google may be listening in, learning from, and sometimes even sharing our private conversations. Are these devices getting a bit too smart for their own good? Is it worth the risk of having one? We’ll help you decide.

In this article

Technology has come a long way, and these days is continually trending toward greater levels of convenience backed by greater levels of automation. By taking user input out of the equation as much as possible, large tech companies appeal to wider and wider audiences.

When it comes to a user’s personal privacy, that’s often an afterthought (if these companies even think of it at all), or an easily-filled pothole on the smooth road to convenience. In the case of smart listening devices, is it worth sacrificing your freedom and privacy for a slice of easy street?

What are Smart Assistants?

Digital assistants can be traced back to the PDAs of the late 90’s and early 00’s. There are likely many older and more experienced folks who would still recognize the name “Palm Pilot”. While many of these devices undoubtedly paved the way for modern smartphones, they are hardly related to the privacy-encroaching tendencies of the plastic rectangles we sport in our pockets today.

Smart listening technology interprets a user’s words into commands for the device to execute. Simply put, saying something as simple as “Set a three minute timer” will immediately start a countdown clock, and after an “Add spring rolls to my shopping cart”, you’ll find yourself ready to check out and cook dinner.

Examples of smart assistants

Yes, most likely your smartphone contains this smart listening technology. You may have never really utilized it, but even something as simple as text-to-speech is taking advantage of this tech. 

In recent years, this same technology has birthed a multitude of smart devices, each with the capability to listen and interpret your commands. The most common of these are what are sometimes called “Smart Assistants”. Popular brands of these devices include: Amazon Alexa, Google Home, Apple’s HomePod, and even something like Microsoft Copilot falls into the mix.

What are the Risks?

See if you’ve ever noticed something like this happen: you’re having a conversation with a friend about some obscure topic. Let’s say kayaks. The only other thing in range of hearing you is your phone. Later, when you’re browsing online, you start seeing ads for kayaks. You’ve never googled “kayaks for sale” or anything like that, and yet here you are suddenly seeing ads for them.

This is a prime example of how the tech on your phone was listening without your consent and influencing what ads were then served to you.

If this alarms you, just wait until you hear about all the things Alexas and their ilk get up to.

Data collection

One of the primary concerns with these devices is how they are constantly harvesting data on their users. Of course, they will claim that none of this makes it past them to advertisers or data miners, but do you really want to trust big tech companies on something like that? 

Another common phrase you’ll see is something akin to “Help us develop new features” or “Improve your user experience”. While you may see some of those benefits, it’s always going to be at your own expense. By agreeing to similar terms you are effectively signing away your privacy and allowing them free reign of your personal life.

What would you do if you got a knock on your door one day and outside is a man or woman with a camera, tape recorder, and notepad. They’ll ask if they can quietly sit in the corner of your family room or perched on your kitchen counter. All they ask is to allow you to take as many pictures, notes, and recordings as they please. “You won’t even notice I’m there,” they promise.

That’s almost exactly what you’re agreeing to by bringing a smart assistant into your home.

Security

Besides the privacy aspect, these devices will have to be hooked up to your wifi network in order to broadcast. This means that if the device was ever hacked or compromised, a cybercriminal now has access to the rest of your home.

On the flip side of that, say one of your other devices gets compromised. A savvy hacker may then be able to take control of your smart speaker, allowing them to harvest and sell everything it hears you say.

Scams

Yes, there are scams linked to using these devices. This one is perhaps one of the most devious of all in that it doesn’t really have anything to do with the actual security or integrity of the device itself. This one relies on scammers setting up fake support websites, phone numbers, and help desks.

Then, when you ask your device to look up a customer support line for your issue, the scammers have ranked their results high enough that it takes those as gospel and spits the info back at you.

A lot of users don’t think twice about the search results their digital assistant brings them, and will happily click on the first option.

How Can I Make My Device Safer?

So, let’s assume you’ve read everything to this point and you still want a smart assistant. Are you just going to have to toss your privacy to the wind?

Luckily, there are some things you can do.

1. Adjust the device’s settings

Each of these smart assistants will have settings (typically accessible via a mobile app) that allow you to disable certain features, limit what kinds of things it can harvest, and even set active hours or schedules.

It’s always worth taking a few minutes to poke around in the device’s settings before you’re ready to actually use it.

2. Secure the network

Depending on how you want the device to interact with your household, you should consider putting it on its own network, or at least segregating it from your more important devices such as personal computers. In this way, even if a hack occurs, you’ll have an extra layer of protection.

3. Unplug it

For physical devices, this is the best thing you can do. As long as the device is unplugged, there’s no way it can listen to you. Sometimes, you may want to just unplug it if you’d rather it not overhear something, or simply to give yourself a break. 

Just be sure to plug it back in when you’re ready to use it!

iDefend Can Help You With Your Smart Devices

Fortunately, iDefend members enjoy access to an expert support team who are always happy to help you lock down your home. With a simple phone call, they’ll be able to assess and develop an action plan to help you get your digital security and privacy up to snuff.

Learn more and get protected today! Try iDefend risk free and save 30%.

The post Smart Assistants are Getting a Little Too Smart first appeared on iDefend.

]]>
Your Guide to Smart Home Cybersecurity https://www.idefendhome.com/blog/devicesecurity/smarthomecybersecurityguide/ Mon, 05 Apr 2021 02:59:28 +0000 https://www.idefendhome.com/?p=5805 If you're like millions of other people, you've got at least one or two smart home devices laying around. Did you know these devices pose real security risks? What can you do to secure them?

The post Your Guide to Smart Home Cybersecurity first appeared on iDefend.

]]>
026
If you're like millions of other people, you've got at least one or two smart home devices laying around. Did you know these devices pose real security risks? What can you do to secure them?

In this article

The advancement of technology in the past decade has been unprecedented. Our original expectations a smart home would provide where met in some ways and exceeded in others. We can now listen to a song by simply asking for it to be played, monitor our children and property, yet also have smart refrigerators.

With all these grand advancements has come with new threats and challenges with your cyber security. Is your smart device listening in and recording what you say? Have your security cameras been compromised allowing someone to observe your family without your knowledge? These possibilities have been the reality for some, but we will discuss what you can do to better protect yourself from this same fate.

How criminals hack smart homes

There are a few particular ways that thieves can sneak their way into your system such as joining onto your WiFi or finding an exploit through an app’s security on your phone. Smart home devices can unintentionally contain sensitive personal information such as credit card data, date of birth. A hacker can even hijack your device without you realizing, since it will appear to continue functioning normally but be quietly eavesdropping on you from behind the scenes.

Another way your personal information can become unintentionally accessible is through a corporate data breach. Hackers infiltrate a company, steal all their customers’ information, and either use it themselves or expose it on the dark web, selling it to the highest bidder.

Massive data breaches can compromise your credit card information, social security number, and whatever else they can get their hands on. With what was stolen they could simply start opening new credit cards, take out loans under your name, or impersonate you in a number of other sinister ways.

How to secure your WiFi

Whether you realize it or not, your home WiFi might be granting more access to your data than you prefer. By taking a few steps to secure it, you can strengthen this flaw in your security.

  1. Protect your private WiFi. Setting up a guest WiFi on a separate network can better protect your information. At times, though rare, friends or family could use the opportunity of being on your WiFi to compromise data. Creating a separate, guest, network prevents this.
  2. Ensure that your WiFi router has a strong password. A router’s default name often contains product information that a knowledgeable hacker can use to identify and exploit any known vulnerabilities that particular model might have. If your WiFi doesn’t contain a password, then you are allowing any and everyone who is within the routers strength to have direct, free access.
  3. Change your WiFi network’s default name. The default name can include insights that you don’t want to be made public, and a knowledgeable hacker can take what little information is displayed and capitalize on it.
  4. Switch your router to a WPA2 (or better) encryption. Other encryptions may not be as strong, allowing for others to break in easier. This is because your WPA2 network provides an unique encryption key for each wireless client that connects to it. To set this up you can go into your network setting, and you’ll see the option which lists the different kinds of connections. (WPA2, TKIP, WPA, or AES) There you can select which connection, and save that setting. You will need to confirm your network password as well, but once it is saved, your new connection will be active.

 

Understand that if you change your network connection type, or password, then all who are connected to the network will need the new password to get connected to the network again.

Device and app settings

You can control the amount of information that is shared between your smart devices. For example, on your bluetooth device app settings, you can go in and turn off certain data sharing information. One important feature to disable is to disable remote access authorization unless in use. This will create a much smaller window for attacks on your devices which further prevents them to be compromised.

For each smart device that is connected through your phone or WiFi, be sure to check your phone’s settings for the device. You will be able to see all the different options you can switch on or off. Be mindful of what is allowed to be “on” as these settings can be where your private information is more at risk.

Update your smart devices

Another important note is to always be mindful of keeping your devices up to date. Updates can carry vital protection on new security measures. If you’re running older software, cyber criminals can exploit the holes the older software contains into the app and device itself.

When prompted by your phone or device, always update it. If for whatever reason updates are turned off, usually you can manually check for updates and start them yourself; they take only a couple of minutes, but can make a world of difference.

How to enjoy greater peace of mind

Risks with your smart devices and WiFi exist, but the more precautions you take the better you can enjoy them with sound peace of mind. The cyber world is ever-changing as cyber criminals continually evolve to find new ways to exploit your information. Smart devices can be complicated, but managing them properly can create an all around improved experience.

iDefend’s device security support includes unlimited technical support and assistance configuring and managing your smart home. Let us know if we can help and give you the peace of mind you deserve.

The post Your Guide to Smart Home Cybersecurity first appeared on iDefend.

]]>