Internet of Things devices are a gift that give us tremendous power over our lives.
They are an array of gadgets and systems created by companies large and small, with divergent ideas and standards of security and privacy.
They entertain us, sustain us, and surround us - whether a smartwatch on a wrist, or a device in a heart.
Let's take a look at some common IoT device red flags, and the prudent evaluation criteria that everyone should undertake so as not to fall victim to gadget gotchas.
From security cameras, to smart assistants and even smartwatches, brand name success breeds low cost commodity.
In the race to capture the impulse buying public, off brand devices claim equivalent functionality and benefits, but rarely can they claim safety and support.
They can flood online sellers, and even if you're not the target of a nation state, you can be a random target left out in the open.
Some IoT products may make your life easier, but they also may be somewhat of a Trojan Horse.
Hidden inside is something far more valuable and risky - Your personal data.
Location, financial details, preferences, even voice recordings and search histories are some of the information captured that can be used against you, OR for the benefit of the product vendor.
We click accept without question, and acknowledge updates without an eyebrow raised, but what lurks in the ocean of vague text.
Of course, that's even before what seems to be the inevitability that someone in that chain is breached, and then your information enters the criminal supply chain.
Products of convenience and electronic connection are certainly the most recognized category of personal IoT, but in an increasingly connected world, we need to recognize the devices that quite literally physically connect us to the internet.
This includes devices focused on digital health and patient care, from pacemakers to health tracking/monitors.
We can start this discussion where we left our last.
The intent for the vast majority is to improve your care, the care of others, and even better prepare us for new and emerging health concerns.
In this category, you really need to understand the potential gap between intention and execution - from how the data is handled, processed and consumed, to how it's secured throughout.
This Cyber News was published on www.securityweek.com. Publication date: Tue, 16 Jan 2024 16:43:05 +0000