Skip To Content

Securing the things you connect to the internet

Connected or “smart” devices are fun and convenient — but they can gather and transmit sensitive information about your life and family. Here are steps you can take to maintain household security.

 

AS HOME AUTOMATION ENTHUSIASTS RUSH to connect digital devices — a video doorbell, a wireless home security kit, a set of Wi-Fi lightbulbs — they are helping build a new ecosystem of convenience, safety and efficiency. That ecosystem is the Internet of Things (IoT), the burgeoning global network of connected smart devices. By 2032, the IoT may comprise more than 34 billion internet-connected objects.1

 

For consumers, these devices already have elevated household conveniences and services to futuristic heights. Think sensor-based home-monitoring and communications systems, energy-efficient automated appliances, always-on virtual assistants and self-driving automobiles.

 

Each device connected to a network, however, is also an endpoint that criminals can exploit. And research shows they are doing just that: One 2022 study found that IoT devices were the most common targets of external attacks.2

 

But the problems are not just a function of cyber criminals and insecure devices. Many consumers don’t prioritize device security due to a lack of understanding of how risky an insecure device can truly be, and unwittingly open themselves to compromise.

 

For instance, smartphone users often grant broad access to their device’s location services, camera, microphone, contacts and calendar — without knowing whether these permissions are legitimate and how the data they generate will be secured. By providing this access, users may unintentionally open access to additional data on the device, including sensitive information like system credentials, credit card numbers and contact information for colleagues, clients, friends and family.

 

Common household IoT devices. 1. Internet router 2. Home computer 3. Connected thermostat or climate control 4. Security system 5. Mobile devices 6. Wearables 7. Entertainment devices

Common household IoT devices. 1. Internet router 2. Home computer 3. Connected thermostat or climate control 4. Security system 5. Mobile devices 6. Wearables 7. Entertainment devices

Simple ways to protect your home and its devices

Smart security begins with an assessment of the devices that constitute your personal or family digital footprint. It’s a good idea to make a list of IoT devices in use, how they connect to the internet and what data they generate and share. All this will help you determine potential cyber security vulnerabilities

 

Some devices, like Wi-Fi videocams and car navigation systems, have been subject to highly publicized hacks. But the full spectrum of potential vulnerabilities doesn’t always make the news.

 

Smart devices may collect data about your personal life, dwelling, habits or financial accounts, helping refine their performance and making them easier to use. But if the devices remain in public access mode, all this information may end up on the internet, where advertisers can harvest it to expand your consumer profile. This often results in an increase in unwanted pop-up ads as you browse the internet.

 

Cyber criminals also use personal information to launch social engineering campaigns, in which they use information gathered about individuals to craft communications that look legitimate but are actually scams.

 

The risks associated with revealing personal information online demonstrate why it’s important to review any device’s security capabilities. Find out what data is collected, how it is protected and what sharing lists are selected. Explore the product’s security and privacy settings to find out what data-generating features can — and should — be switched off. Also review the IoT device’s privacy settings to make sure you are not unintentionally sending device information to unintended locations, such as your social media accounts.

 

If you’re purchasing more robust equipment like wireless routers and tablets, find out if the latest security features are included. It is also important to know whether those standards can be updated as the technology evolves. The best security can provide powerful encryption and protection against attacks designed to compromise user credentials.

 

9 best practices to help secure your IoT devices

These tips may help you safeguard your IoT devices and data while also limiting your digital footprint:

 

  1. Purchase IoT devices that offer ongoing security patches and long-term manufacturer support.
  2. Create and maintain an inventory of home IoT devices and applications.
  3. Review and manage the data that will be shared by each active IoT device.
  4. Consider maintaining IoT devices on a separate network from your computers, tablets and phones.
  5. Regularly update all device software. If available, turn on automatic updates and notifications for configuration changes.
  6. Use your router’s network configuration tool to see what devices are attached and disconnect unknown or suspicious devices or connection.
  7. Create strong passwords for devices and customize user and object names. Do not use default passwords. Enable multifactor authentication.
  8. Create a Wi-Fi guest network.
  9. Enable encryption on your router.

Stay connected, stay protected

 

To help keep your Merrill account information safe and secure, make sure your contact information is up to date and set up security and account alerts so we can stay in touch. Remember, if we need to reach out to you, we’ll NEVER ask for personal or financial information or an access code through email, text or unsolicited calls. Visit our security center for tips on how to recognize potential scams and learn more about how to keep your accounts safe.

1 Transforma Insights, “Global IoT connections to hit 34.4 billion in 2032,” May 25, 2023.

2 Verizon, “2023 Mobile Security Index,” November 2023.

 

Neither Bank of America nor its affiliates provide information security or information technology (IT) consulting services. This material is provided "as is,“ with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this material, and without warranty of any kind, express or implied, including, but not limited to warranties of performance, quality and fitness for a particular purpose. This material should be regarded as general information on information security and IT considerations and is not intended to provide specific information security or IT advice nor is it any substitute for your own independent investigations. If you have questions regarding your particular IT system or information security concerns, please contact your IT or information security advisor.

X

You need to answer some questions first

Then we can provide you with relevant answers.

Get started