Securing the smart home

Real-world testing of smart home devices, apps and ecosystems

securing the smarthome
Stephen Sauer

Editor’s Note: First in a series of articles on the best ways to deploy and secure smart home technology

Last fall, we saw the rise of the weaponized smart device as the Mirai botnet compromised webcams and other Internet-connected things. Then in February, VIZIO agreed to pay a $2.2 million fine to the FTC for collecting the viewing histories of 11 million smart TV users without their knowledge or consent.

Suddenly, the smart home isn’t smart enough, or maybe it’s too smart for its own good. IT managers and power users have been put on notice to literally put their own houses in order. It is time to apply some enterprise security concepts to the home network.

To help assist you, we are starting this series of articles on the secure connected home and how to pick the best products for you and your family. Our goal is to make sure that your TV or thermostat doesn’t end up as part of some Russian botnet.

Each article will examine one aspect of the secure connected home so you can build out your network with some confidence, or at least know what the issues are and what choices you will need to make in supporting your family’s IT portfolio of smart things.

To continue reading this article register now

7 hot cybersecurity trends (and 2 going cold)