MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Are You at Risk Due to the IoT?

Tip of the Week: Are You at Risk Due to the IoT?

The Internet of Things is now a commonality. IoT devices are in our homes, in our offices, and in our pockets. While these devices are incredibly convenient, they also contribute to some major security risks. For today’s tip, we’ll review some of the ways to reduce these risks while still leveraging the IoT.

Does it Need to Be Connected?
The first consideration you need to make is whether or not connecting a particular item will be a big enough benefit to be worth the inherent risks. Depending on the device, an Internet of Things item could be used to spy on you, steal your data, and track your whereabouts. If the device in question directly offers you a helpful, worthwhile utility, it may be worth the risk. If the connected device serves little purpose beyond its novelty, or its purpose could just as easily be managed by a staff member, it is probably best to leave it disconnected.

Are You as Secure as You Could Be?
You should also make sure that the environment that you are using an IoT device in is as secure as possible. Making sure that your firmware is updated will ensure that you have the latest security patches and fixes for the various exploits and vulnerabilities that the IoT may present. If possible, this process should be automated so that your IoT devices, as well as your router, are fully updated.

It may also be a good idea to check if your router supports guest networking. With guest networking, you can keep potentially risky IoT devices off of your main business network, protecting its contents.

Finally, you should always make sure that your passwords are in line with best practices, and that you are not reusing passwords between devices and accounts. Following these guidelines means that even if one of your accounts is comprised, the rest of your accounts are safe behind different credentials.

Are Your Devices Properly Monitored and Managed?
Ultimately, the best way to keep your company safe from IoT issues is to establish rules regarding the use of these devices and monitor their permissions. Extending the consideration of whether or not a device needs to be connected, you need to establish if it even needs to be in the office. After all, a smartwatch can offer some business utility, whereas a smart salt dispenser (which does in fact exist) does not.

Monitoring your network can help you identify if any unapproved devices have made a connection. MERIT Solutions can help. Call (757) 420-5150 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 May 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Internet Hosted Solutions Backup google Productivity Business Management Managed IT Services Mobile Devices VoIP Disaster Recovery Computer Microsoft IT Support communications Outsourced IT Business Continuity Business Windows 10 Cybersecurity Email User Tips Productivity Hardware Innovation IT Services Efficiency Data Backup Cybercrime Mobile Device Management Windows Managed IT Server Small Business Ransomware Apps Mobility Saving Money browser Data Recovery Data Law Enforcement Smartphone Internet of Things Operating System Android Telephone Systems Virtualization Tech Term Save Money Hosted Solution Quick Tips Passwords Cloud Computing BDR Money Phishing Smartphones Data Security VPN Microsoft Office BYOD Automation Password Holiday Information Technology Chrome Communication Office 365 Recovery Network Two-factor Authentication Facebook Government Wireless Collaboration IT Support Google Drive Update Hacking Risk Management Avoiding Downtime Unsupported Software Gadgets Alert Health Miscellaneous Vulnerability Managed Service Provider Computers Work/Life Balance Cost Management Social Wi-Fi upgrade Best Practice Social Media Data Breach App Budget Data Management User Error Politics Data Protection Cleaning USB Save Time Wireless Technology Telephony Workplace Tips Identity Theft Windows 10 Flexibility Shortcut Spam Office tips Applications Social Engineering Private Cloud History Streaming Media Managed IT Services Firewall Proactive IT Application Antivirus search Current Events The Internet of Things Audit Personal Information Employer-Employee Relationship Sports Value Tech Support Saving Time Hacker Solid State Drive Blockchain Gmail Internet Exlporer Office Phone System Redundancy Computer Care Commerce Legal Mobile Security Devices IT solutions Users Encryption iPhone Cortana Patch Management Mobile Computing DDoS Transportation Artificial Intelligence Big Data Fraud Robot Television Wireless Charging Excel Remote Computing Apple End of Support Data Storage SaaS WiFi OneNote Samsung Going Green Content Filtering Project Management Bandwidth Battery HaaS Humor Disaster eWaste Compliance Data Loss Marketing Automobile Google Docs Conferencing Avoid Downtime HBO Computing Webinar Microsoft Word Shadow IT Mobile Monitoring Colocation Hard Drives IT budget Document Management Microsoft Excel Experience Gifts server installation dvd "cannot install required files" Analysis IT solutions Files Administrator Lithium-ion battery stock Professional Services Management Maintenance File Sharing Video Games IT Management App store Windows 10s Access tweet Virtual Reality Travel Financial Technology Relocation Nanotechnology Device Security Identities Scam Storage Music Credit Cards calculator WIndows Server 2008 Hard Disk Drive Twitter Tablets Printing Root Cause Analysis PDF IoT Employer Employee Relationship control Analytics FAQ Identity Spyware Keyboard WSJ Instant Messaging NFL Google Assistant Augmented Reality Text Messaging Business Intelligence Language Touchscreen Computer Accessories Worker Commute Lifestyle Exchange Charger altivista Outlook Data Privacy Mobile Device Distributed Denial of Service Managing Stress Word Computer Forensics Managed IT Service Legislation SBS Books compaq Scalability Hard Drive iOS Edge Hiring/Firing Education Windows Ink Router Virus Laptop Uninterrupted Power Supply Vendor Management Wearable Technology Comparison Evernote hp How To Regulation Chromebook Computer Fan Ciminal Benefits Google Maps Screen Mirroring Proactive Touchpad Specifications domain Networking Sync Smart Tech Reputation Dark Web Unified Threat Management Software as a Service Advertising Meetings Sales remote Cast Websites Emails Training Entertainment Electronic Medical Records Workers Yahoo Adobe Connectivity Upgrades Settings MSP Data storage Point of Sale Retail Server 2008 Data Theft Company Culture Running Cable HIPAA Safety Updates Ali Rowghani Black Market Licensing Content Filter Administration WannaCry Chromecast Consultant intranet Trending Smart Technology Emergency Monitors Remote Monitoring Thank You Worker Congratulations CrashOverride Cache

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...