[et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”3.12″ background_image=”https://www.mdsny.com/wp-content/uploads/2018/08/smarthomeillustrationtablet.jpg” background_position=”center_right” background_blend=”darken” custom_padding=”0px|0px|0px|0px”][et_pb_fullwidth_header title=”How to protect your data inside the ‘Home of the Future'” text_orientation=”center” background_overlay_color=”rgba(0,0,0,0.42)” title_font_color=”#ffffff” _builder_version=”3.12″ title_font=”||||||||” title_text_color=”#ffffff” title_font_size=”37px” background_color=”rgba(255, 255, 255, 0)” background_layout=”light”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.0.65″ custom_padding=”12px|0px|0px|0px”][et_pb_row make_fullwidth=”on” custom_padding=”27px|1px|0px|2px” _builder_version=”3.12″][et_pb_column type=”4_4″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.106″ text_font=”||||||||” text_font_size=”18px”]

With great automation comes great responsibility. You may love your smart thermostat and door lock, but as long as they’re on the open network, they’re targets for all manner of digital attacks. And because the devices are smaller and simpler, they don’t have nearly the protection of your laptop or phone. The result is an unsettling thought: as you add more gadgetry, you’re also adding more ways for hackers to break in.

It’s a persistent vulnerability, and it’s common knowledge in the digital security world. For years, the Defcon conference has hosted an IoT Village entirely devoted to cracking Internet of Things devices. The 2014 event featured a router-hacking contest that turned up 15 major vulnerabilities in a matter of hours. For researchers, finding these flaws is so easy, it’s a sport.

[/et_pb_text][et_pb_image _builder_version=”3.0.74″ animation_style=”slide” animation_direction=”left” animation_duration=”500ms” animation_intensity_slide=”10%”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.0.74″ background_color=”#e8e8e8″ custom_padding=”24px|0px|15px|0px|false|false”][et_pb_row make_fullwidth=”on” custom_padding=”1px|0px|16px|0px|false|false” _builder_version=”3.12″][et_pb_column type=”1_2″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.106″ text_font=”||||||||” text_font_size=”18px”]

It’s not all bad news. Your thermostat doesn’t make a very attractive target to most hackers. (Unlike your phone or computer, there isn’t much monetizable information on it.) The most likely threat is someone trying to enlist it in a Mirai-style botnet — which would be bad, but it would only cost you whatever extra power the device ended up burning.

Still, the net effect of tens of thousands of vulnerable IoT gadgets flooding the market can be significant, and it’s worth it to make sure you’re not part of the problem. The best thing you can do is pay for it: higher-end devices almost always have better security protocols, even if there’s no clear certification to look for just yet. Beyond that, make sure everything you own is getting regular patches — and that you’re installing them. If you want to get really serious, you can get a smart router to isolate all your IoT devices on a separate network, and monitor everything for signs of a compromise. That will put you ahead of 99 percent of consumers, and give you a fighting chance if anyone decides they want to take over your fancy new thermostat.

*This article is by Russell Brandom and was originally published on theverge.com

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.0.65″ parallax=”off” parallax_method=”on”][et_pb_video src=”https://www.youtube.com/watch?v=MkEWujqmeMI&feature=youtu.be” _builder_version=”3.12″][/et_pb_video][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.0.74″ background_color=”#8d8c91″ custom_padding=”4px|0px|20px|0px”][et_pb_row make_fullwidth=”on” custom_padding=”27px|0px|27px|0px|false|false” admin_label=”row” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_cta title=”Pulling the plug doesn’t have to be your only security solution.” button_url=”https://www.mdsny.com/contact/” button_text=”Contact Us” _builder_version=”3.0.65″ header_font=”Droid Sans|on|||” header_font_size=”31px” body_font=”Droid Sans||||” body_font_size=”19px” use_background_color=”off” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_button=”on” button_text_color=”#2d3743″]Don’t become part of a rising statistic — ensure your company is armed against a security hack.
[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]