Get all your news in one place.
100’s of premium titles.
One app.
Start reading
Bangkok Post
Bangkok Post
Business

ISOC offers tips to shield gadgets from cyber-attacks

Using all those fancy features on a brand-new iPhone may not be the smartest thing to do from a cybersecurity standpoint, says advocacy group Internet Society (ISOC).

In the wake of cyber-attacks that have assailed everyone from individuals to large corporations, there are a number of simple steps that users can take to live more secure lives.

Every password on every device should be updated from the default, and any device that has an unchangeable default password shouldn't be used at all, according to ISOC.

Permissions need to be as minimal as possible while still allowing devices to function.

Consumers must play a more active role in verifying the hardware and software that enters their devices.

"Everything that goes on your network, as well as any associated back-end or cloud services that work with it, needs to be carefully researched before it's put into production," ISOC said.

For those users with IoT (Internet of Things) devices at home, it's imperative to set up a separate firewall under careful monitoring specifically for these devices. This helps keep potentially insecure devices away from core networks and resources.

Users can rarely if ever control all incoming traffic to their IoT devices. In those cases, it's important to make sure there aren't open software ports that a cybercriminal could use to control them.

Encryption is another essential component of a robust IoT protection strategy.

"Look for ways to get your IoT devices to send and receive their data using encryption," ISOC said.

Cybersecurity conversations often centre on software, but hardware can also be an important vulnerability point for devices, serving as a Trojan horse that can spread malicious software throughout networks.

"Look for physical compromise -- anything with a hardware 'factory reset' switch, open port or default password is vulnerable," ISOC said. "Gizmos that connect automatically to open WiFi networks are a bad idea."

Oftentimes additional functions provide additional ways for cyberthreats to thrive, so users should be proactive in deactivating features when not in use.

A smart TV used for display only, for example, does not need to be connected to a microphone or to the internet.

For both software and hardware, updating frequently gives users a leg up in the cybersecurity race.

"Make sure they're getting patches," ISOC said. "Don't use equipment that can't get updates. Don't use products that are no longer supported by their manufacturers or that can no longer be secured."

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.