The Industry’s Only SaaS-Delivered Enterprise DLP

Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.

No-Compromise Data Protection is:

  • Cloud-Delivered
  • Cross Platform
  • Flexible Controls

Digital Guardian's Blog

Smart Devices: How To Secure Your Connected Family

by Chris Brook on Wednesday October 3, 2018

Contact Us
Free Demo

To kickoff National Cyber Security Awareness Month (NCSAM) and help families protect their smart homes against cyber threats, we created an infographic around IoT devices, vulnerabilities, and how to best secure them.

These days the internet of things has become so ubiquitous it’s rare to encounter a device that doesn’t connect to the internet. From doorbells to microwaves, nearly everything is connected. Smart devices aren't without their own set of inherent risks however. They can come with easy to guess, out of the box passwords, be notoriously difficult to patch, and lack encryption. 2016's Mirai attack, which harnessed insecure IoT devices to bring down the internet across much of the U.S. east coast, helped illustrate the potential consequence of not taking IoT security seriously. The theme for the first week of NCSAM this year is "Make Your Home a Haven for Online Safety." When it comes to mitigating these risks, it's essential to help educate the entire household around using internet-connected devices responsibly and securely. There are ways to help safeguard your connected devices and in turn, protect the sensitive personal and family data they process every day.

To learn more about the risks associated with internet of things devices and how to address them, check out our infographic below!

Smart Devices: How To Secure Your Connected Family

Add this infographic to your website for free!

Small Version

Large Version

Tags: Infographics

Recommended Resources

  • Why Data Classification is Foundational
  • How to Classify Your Data
  • Selling Data Classification to the Business
  • The Five Stages of Threat Hunting
  • A Proactive Approach to Threat Hunting
  • Expert Tips

Chris Brook

Chris Brook is the editor of Data Insider. He is a technology journalist with a decade of experience writing about information security, hackers, and privacy. Chris has attended many infosec conferences and has interviewed hackers and security researchers. Prior to joining Digital Guardian he helped launch Threatpost, an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.