How to Save Time and Protect Your Smart Home - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Partner Perspectives
Commentary
1/29/2015
10:35 AM
Alexandra Gheorghe
Alexandra Gheorghe
Partner Perspectives
Connect Directly
Twitter
LinkedIn
Google+
RSS
100%
0%

How to Save Time and Protect Your Smart Home

New technology can help secure the digitized home, from tablets and laptops to smart appliances and thermostats.

Do you hate spending your spare time scouring user manuals and configuring security settings across multiple devices whenever you get a new one? Most probably. But do you fantasize about having a highly digitized home, with all the luxury, convenience, and comfort that it can bring? Hold that thought.

Sixteen percent of computer users complain about the difficulty of setting up an AV solution on their PCs, according to Bitdefender Labs data. Assuming an average user has at least three personal smart devices that each requires its own level of security, then that’s a lot of work, time and energy. And things aren’t getting easier; we’re constantly adding new Internet-connected devices to our homes.

The fact is, we are already living in digitized environments. A console, a Chromecast dongle connected to a smart TV, and a connected smoke detector are already part of our increasingly intelligent homes.

All these devices need unified threat protection, but a traditional security solution doesn’t help. By nature, Internet of Things devices are diverse in terms of operating systems, protocols, and networking technologies, and they don’t always interoperate. Unfortunately, startups with great product ideas and the best intentions have little experience or resources to invest in the security of their new devices.

Threats are also diverse and challenging, ranging from broad dangers to device-specific vulnerabilities. Yet malicious links remain the most common vector of infection, regardless of the platform they’re accessed through. Malicious URLs lead to phishing scams, ransomware, annoying spam, and other dangers that can compromise a user’s entire network.

That’s where new technology steps in. For example, Bitdefender BOX is a hardware device for all Internet-connected devices, including tablets, smartphones, laptops, desktop computers, smart appliances, and smart thermostats. BOX scans home networks with Bitdefender’s anti-malware technology to identify and block connections to malicious URLs, malware downloads, and suspicious packets that can lead to threats such as phishing, spam, and malware infections. Bitdefender BOX also detects and installs missing security software patches required by operating systems and locates the device if necessary.

In addition, when a device leaves a user’s home network, a private line can be enabled to continue protecting the device on the go. BOX also keeps devices safe from man-in-the-middle and other attacks when connected to unsecure networks such as public Wi-Fi hotspots.

Still weighing the thought of the cozy digitized home against the hassle of securing it? Don’t take any chances.

Alexandra fulfills the Security Specialist role for Bitdefender, performing writing duties such as security news for Bitdefender's security blog, as well as marketing and PR materials. She started writing about online security at the dawn of the decade - after 3-years in ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2018 State of the Cloud
2018 State of the Cloud
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Slideshows
9 Steps Toward Ethical AI
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/15/2019
Commentary
How to Assess Digital Transformation Efforts
Lisa Morgan, Freelance Writer,  5/14/2019
Commentary
Is AutoML the Answer to the Data Science Skills Shortage?
Guest Commentary, Guest Commentary,  5/10/2019
Register for InformationWeek Newsletters
Video
Current Issue
A New World of IT Management in 2019
This IT Trend Report highlights how several years of developments in technology and business strategies have led to a subsequent wave of changes in the role of an IT organization, how CIOs and other IT leaders approach management, in addition to the jobs of many IT professionals up and down the org chart.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll