Using all those fancy features on a brand-new iPhone may not be the smartest thing to do from a cybersecurity standpoint, says advocacy group Internet Society (ISOC).
In the wake of cyber-attacks that have assailed everyone from individuals to large corporations, there are a number of simple steps that users can take to live more secure lives.
Every password on every device should be updated from the default, and any device that has an unchangeable default password shouldn't be used at all, according to ISOC.
Permissions need to be as minimal as possible while still allowing devices to function.
Consumers must play a more active role in verifying the hardware and software that enters their devices.
"Everything that goes on your network, as well as any associated back-end or cloud services that work with it, needs to be carefully researched before it's put into production," ISOC said.
For those users with IoT (Internet of Things) devices at home, it's imperative to set up a separate firewall under careful monitoring specifically for these devices. This helps keep potentially insecure devices away from core networks and resources.
Users can rarely if ever control all incoming traffic to their IoT devices. In those cases, it's important to make sure there aren't open software ports that a cybercriminal could use to control them.
Encryption is another essential component of a robust IoT protection strategy.
"Look for ways to get your IoT devices to send and receive their data using encryption," ISOC said.
Cybersecurity conversations often centre on software, but hardware can also be an important vulnerability point for devices, serving as a Trojan horse that can spread malicious software throughout networks.
"Look for physical compromise -- anything with a hardware 'factory reset' switch, open port or default password is vulnerable," ISOC said. "Gizmos that connect automatically to open WiFi networks are a bad idea."
Oftentimes additional functions provide additional ways for cyberthreats to thrive, so users should be proactive in deactivating features when not in use.
A smart TV used for display only, for example, does not need to be connected to a microphone or to the internet.
For both software and hardware, updating frequently gives users a leg up in the cybersecurity race.
"Make sure they're getting patches," ISOC said. "Don't use equipment that can't get updates. Don't use products that are no longer supported by their manufacturers or that can no longer be secured."