MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Are You at Risk Due to the IoT?

Tip of the Week: Are You at Risk Due to the IoT?

The Internet of Things is now a commonality. IoT devices are in our homes, in our offices, and in our pockets. While these devices are incredibly convenient, they also contribute to some major security risks. For today’s tip, we’ll review some of the ways to reduce these risks while still leveraging the IoT.

Does it Need to Be Connected?
The first consideration you need to make is whether or not connecting a particular item will be a big enough benefit to be worth the inherent risks. Depending on the device, an Internet of Things item could be used to spy on you, steal your data, and track your whereabouts. If the device in question directly offers you a helpful, worthwhile utility, it may be worth the risk. If the connected device serves little purpose beyond its novelty, or its purpose could just as easily be managed by a staff member, it is probably best to leave it disconnected.

Are You as Secure as You Could Be?
You should also make sure that the environment that you are using an IoT device in is as secure as possible. Making sure that your firmware is updated will ensure that you have the latest security patches and fixes for the various exploits and vulnerabilities that the IoT may present. If possible, this process should be automated so that your IoT devices, as well as your router, are fully updated.

It may also be a good idea to check if your router supports guest networking. With guest networking, you can keep potentially risky IoT devices off of your main business network, protecting its contents.

Finally, you should always make sure that your passwords are in line with best practices, and that you are not reusing passwords between devices and accounts. Following these guidelines means that even if one of your accounts is comprised, the rest of your accounts are safe behind different credentials.

Are Your Devices Properly Monitored and Managed?
Ultimately, the best way to keep your company safe from IoT issues is to establish rules regarding the use of these devices and monitor their permissions. Extending the consideration of whether or not a device needs to be connected, you need to establish if it even needs to be in the office. After all, a smartwatch can offer some business utility, whereas a smart salt dispenser (which does in fact exist) does not.

Monitoring your network can help you identify if any unapproved devices have made a connection. MERIT Solutions can help. Call (757) 420-5150 to learn more. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup Business Management google Productivity Managed IT Services Computer Microsoft Disaster Recovery Business Continuity Outsourced IT Business IT Support Mobile Devices User Tips Windows 10 communications VoIP IT Services Email Productivity Hardware Innovation Cybercrime Efficiency Data Backup Windows Mobile Device Management Managed IT Mobility Ransomware Apps Smartphone Cybersecurity Server Save Money Saving Money browser Telephone Systems Small Business Data Recovery Law Enforcement Internet of Things Operating System Hosted Solution Quick Tips Android Virtualization BDR Money Information Technology Chrome Recovery Data Security VPN Passwords Microsoft Office BYOD Data Password Office 365 Holiday Miscellaneous Managed Service Provider Computers Phishing upgrade Social Wireless Social Media Best Practice App Communication Risk Management Budget Unsupported Software Smartphones Data Management Cloud Computing Facebook Government Work/Life Balance IT Support Google Drive Hacking Avoiding Downtime Gadgets Alert Health Windows 10 Personal Information Vulnerability Office tips Applications Private Cloud Social Engineering Politics History Two-factor Authentication Proactive IT Managed IT Services USB Save Time search Data Breach The Internet of Things Identity Theft User Error Flexibility Shortcut Collaboration Wi-Fi Wireless Technology Firewall Application Automation Current Events Workplace Tips Audit Telephony Compliance Robot Television Automobile Spam End of Support Remote Computing Streaming Media Apple Excel Saving Time Cleaning Data Storage WiFi Office Phone System Going Green OneNote Computer Care Blockchain Bandwidth Humor Disaster Legal eWaste Users Encryption Employer-Employee Relationship Data Loss Marketing Artificial Intelligence Network Sports Google Docs Tech Support Cost Management Hacker Solid State Drive Internet Exlporer Gmail Data Protection SaaS Redundancy Update Samsung Antivirus iPhone Content Filtering IT solutions Commerce Battery Mobile Computing HaaS DDoS Transportation Cortana Project Management Patch Management Exchange Text Messaging Point of Sale FAQ HIPAA NFL Distributed Denial of Service Augmented Reality altivista Company Culture Consultant Touchscreen Black Market Lifestyle MSP Business Intelligence Outlook SBS Smart Technology Charger Avoid Downtime Word compaq Value Shadow IT Legislation intranet Managed IT Service Wearable Technology iOS Laptop Document Management Wireless Charging Uninterrupted Power Supply Experience Windows Ink hp Comparison IT budget Regulation Computer Fan domain Touchpad Evernote Video Games Google Maps Maintenance Reputation Advertising Virtual Reality Specifications Screen Mirroring Sync Dark Web remote Scam Networking Music Software as a Service Device Security Meetings Yahoo Emails Data storage Sales Identities Cast Adobe Running Cable Server 2008 Employer Employee Relationship Workers Analytics Chromecast Devices Settings Ali Rowghani Administration Keyboard Instant Messaging Retail Trending Licensing WannaCry Computer Accessories Worker Commute Updates Big Data Spyware Mobile Device Colocation Webinar Hard Drives Managing Stress Conferencing HBO Mobile server installation dvd "cannot install required files" Microsoft Word Files Books Administrator Scalability Microsoft Excel Lithium-ion battery Fraud stock IT solutions Hiring/Firing Education Gifts Router Professional Services Vendor Management Relocation Access How To File Sharing Edge tweet Windows 10s Benefits IT Management Travel Nanotechnology calculator Storage Ciminal Twitter Unified Threat Management WIndows Server 2008 Hard Disk Drive control PDF Credit Cards Tablets Root Cause Analysis Training Entertainment Electronic Medical Records WSJ Upgrades Safety Emergency CrashOverride Worker Cache Monitors Remote Monitoring Thank You Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...