2023.01.27
Expert tips – how to protect your home from hackers
The benefits of digitalization are many – comfort, sustainability and time efficiency are some of the factors that can increase thanks to smart and connected products. However, digitalization has a downside and the risk of cyberattacks increases for both homes and public spaces.
While connected products bring an increased sense of security and control to our homes, they also pose a risk of unauthorized access to our privacy. That's why security experts are now advising both manufacturers and consumers to take advantage of connected homes responsibly. This also applies to those of you who don't think you have anything to hide or those of you who don't think a hacker is interested in your particular smart product.
– All connected products are at risk of being hacked. This is not primarily because hackers are curious or want to eavesdrop on your home, but instead use your products as objects in other attacks. It is relatively common for hacked surveillance cameras, for example, to be used to send data traffic in targeted overload attacks against servers at, for example, authorities or companies, says Johan Silhammer, security consultant in information security at Omegapoint.
One thing you may not think about when you download an application to your mobile phone to control a connected product is that the mobile phone and the product communicate via the internet. Even if so-called secure protocols are used in this communication, it is difficult for the consumer to monitor and influence security.
– Open networks, like the internet, are a risk regardless. The connected product can be hacked and controlled by an unauthorized person. The consequences can vary depending on the product, the access the hacker has and their motives, but just the thought of someone unknown having control over our boiler, stove, music player or surveillance camera can feel very uncomfortable, Johan Silhammer continues.
In order for consumers to be able to handle a connected product safely, they need to be provided with clear and sufficient information. In addition to installation assistance, accompanying safety tips for self-installation and operation of the connected product can also be of great benefit.
– Security needs to become part of our and our consumers' everyday lives, so let's help each other keep our connected homes safe, concludes Johan Silhammer.
OmegaPoint's safety tips to share with our consumers
Replace default password
Firstly, many gadgets come with default passwords that are often very simple and not at all secure. One of the first things a hacker will try is whether it is possible to get in with the default password. These passwords are often admin passwords with high privileges and should be changed before the gadget is connected to the Internet.
Use long and unique passwords
A simple tip is to change to a strong password, which is difficult to guess. Strong passwords should preferably be random and long with several different types of characters. If it is difficult to memorize strong passwords, the consumer can be recommended to use a Password Manager (digital “safe”) or simply write them down on a piece of paper that is stored safely.
Install according to instructions
Misconfiguration during installation of connected devices can lead to major security holes. It should be ensured that all installations are carried out according to a predetermined and verified instruction. The functionality and security of the solution should not solely depend on the skill of the installer. If good documentation is missing, ask for help.
Have automatic updates
Another tip for consumers is to make sure that the latest security updates released by the manufacturer are installed, preferably automatically if possible. This way, identified security holes are patched and any security flaws are addressed.
Set up a separate network
Something that may be a little more difficult for consumers to do, but is still recommended, is to place the connected devices on a separate network. If an attack were to occur against one or more of these devices, it would at least be isolated from the rest of the network and would not be able to spread to other connected (and often more important) devices in the home, such as computers.

