How to Save Time and Protect Your Smart Home - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Partner Perspectives
Commentary
1/29/2015
10:35 AM
Alexandra Gheorghe
Alexandra Gheorghe
Partner Perspectives
Connect Directly
Twitter
LinkedIn
Google+
RSS
100%
0%

How to Save Time and Protect Your Smart Home

New technology can help secure the digitized home, from tablets and laptops to smart appliances and thermostats.

Do you hate spending your spare time scouring user manuals and configuring security settings across multiple devices whenever you get a new one? Most probably. But do you fantasize about having a highly digitized home, with all the luxury, convenience, and comfort that it can bring? Hold that thought.

Sixteen percent of computer users complain about the difficulty of setting up an AV solution on their PCs, according to Bitdefender Labs data. Assuming an average user has at least three personal smart devices that each requires its own level of security, then that’s a lot of work, time and energy. And things aren’t getting easier; we’re constantly adding new Internet-connected devices to our homes.

The fact is, we are already living in digitized environments. A console, a Chromecast dongle connected to a smart TV, and a connected smoke detector are already part of our increasingly intelligent homes.

All these devices need unified threat protection, but a traditional security solution doesn’t help. By nature, Internet of Things devices are diverse in terms of operating systems, protocols, and networking technologies, and they don’t always interoperate. Unfortunately, startups with great product ideas and the best intentions have little experience or resources to invest in the security of their new devices.

Threats are also diverse and challenging, ranging from broad dangers to device-specific vulnerabilities. Yet malicious links remain the most common vector of infection, regardless of the platform they’re accessed through. Malicious URLs lead to phishing scams, ransomware, annoying spam, and other dangers that can compromise a user’s entire network.

That’s where new technology steps in. For example, Bitdefender BOX is a hardware device for all Internet-connected devices, including tablets, smartphones, laptops, desktop computers, smart appliances, and smart thermostats. BOX scans home networks with Bitdefender’s anti-malware technology to identify and block connections to malicious URLs, malware downloads, and suspicious packets that can lead to threats such as phishing, spam, and malware infections. Bitdefender BOX also detects and installs missing security software patches required by operating systems and locates the device if necessary.

In addition, when a device leaves a user’s home network, a private line can be enabled to continue protecting the device on the go. BOX also keeps devices safe from man-in-the-middle and other attacks when connected to unsecure networks such as public Wi-Fi hotspots.

Still weighing the thought of the cozy digitized home against the hassle of securing it? Don’t take any chances.

Alexandra fulfills the Security Specialist role for Bitdefender, performing writing duties such as security news for Bitdefender's security blog, as well as marketing and PR materials. She started writing about online security at the dawn of the decade - after 3-years in ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
Reflections on Tech in 2019
James M. Connolly, Editorial Director, InformationWeek and Network Computing,  12/9/2019
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll