Home » cyber security » The Hackable Smart Home: Protect Yourself
image

The Hackable Smart Home: Protect Yourself

Technologies that keep us connected continue to play an increasingly important role in our lives. For many of us, smartphone apps and social media platforms have become a mainstay for us, both at work and at home. Outside of the office, we connect with coworkers hundreds of miles away via email, instant messaging and video conferencing applications such as Skype. And now, thanks to the growing influence of the “internet of things” (IoT), we’re even using networking technology to control the physical environment of our homes.

Tech companies are introducing IoT devices that let users control virtually every aspect of their homes online. Unlocking doors, setting the temperature, preheating an oven or tracking what’s in the fridge — these tasks and more can be easily managed from your mobile device.

Considering the convenience and control this offers, it’s no wonder that smart homes are becoming more commonplace.

But there’s a serious downside to consider: While IoT devices can make our lives easier, they can have the opposite effect once a malicious hacker gets involved. A number of cyber security experts have taken to studying products on the IoT market, and they have found plenty of reason to proceed with caution.

In May of this year, researchers from the University of Michigan and Microsoft discovered flaws in a IoT smart home platform that would allow hackers to unlock a homeowner’s doors, set off fire alarms and otherwise compromise home security using the a vulnerability in the platform’s OAuth protocol. Further, in a separate research undertaking, experts at TrapX Security demonstrated how a Nest smart thermostat device could be used as an entry point into the target’s home.

These are merely two recent examples showing significant vulnerabilities in smart home devices.

Given the risks involved with smart homes, consumers interested in this realm of technology might be best advised not to connect all devices to a single platform, as hackers might be able to find a point of entry to such a system and compromise multiple devices.

Also, as businesses find advantages from incorporating IoT devices inside their offices, it will be important to consider the placement of these items within networks and how to manage them securely without increasing risks to critical resources. Beyond monitoring and reporting, IoT likely will require organizations to make secure network development efforts and revise existing policies.

Ultimately, the new network of connected physical objects offers plenty of possibilities for individuals and companies alike — but it offers openings for the bad guys, too.

For information on how Lunarline can help secure your business as you venture into the internet of things, check out our offerings online at Lunarline.com or contact us today.

About Spence Witten

Spence has somehow survived ten years at start-ups and small businesses without suffering a (major) nervous breakdown. As Lunarline's Director of Federal Sales, Spence actually loves working on proposals. If there were any doubt, this is proof that he is in fact certifiably insane. While his title says "Sales" Lunarline doesn't let him off that easy. We make him do real work, too. Luckily he's a recognized subject matter expert in security policy and loves helping clients navigate their way around tricky security compliance standards. He's also been known to lead a software development initiative or two, though that pretty much always ends poorly for everyone involved. He can be reached at spence.witten@lunarline.com.