4 ways to outsmart your smart device

November 18, 2020

Learn how to keep personal (and work) information secure near smart devices.

Think about your home and how many smart devices you have – security cameras, televisions, refrigerators, doorbells, virtual assistants and vacuums that connect to the internet. These are an attractive, easy target for hackers and, if compromised, could record and share sensitive data.

The stakes are higher than ever to secure these devices, especially if you’re now working from home more often due to the pandemic. Whether it’s work or personal data, this presents the potential for sensitive and confidential information to be compromised or stolen.

No matter the smart device or how many you have in your home, it might be worth taking these precautions to keep your information safe.

 

How to keep sensitive data secure around smart devices

  1. Do not display work or other sensitive information on or near these devices: To keep your data safe, never display sensitive information on or near your smart TV, cover any unused camera, and keep your devices updated with the latest security patches and fixes.  Smart televisions are not designed with security in mind, therefore it is important to be aware of the settings which may allow conversations to be heard. They may have poor security and have the capability to track and listen to conversations from built-in cameras and microphones. Companies often track user preferences and sell your data to advertisers. Under settings, you can disable voice recognition, but you should also be wary of hackers listening and watching you. 
  2. Limit conversations near these devices: If left on throughout the workday, it may be possible that these devices can record your daily conversations and save them, making that information vulnerable to hackers. Be sure to limit conversations near devices when they’re plugged in. When speaking of confidential or sensitive information be sure to step away from smart devices. 
  3. Keep your Wi-Fi network secure: Help prevent your home from being vulnerable to hackers by changing your router’s default password and keeping the firmware updated to eliminate known cybersecurity vulnerabilities. 
  4. Enable two-factor authentication: If available, it is strongly recommended that you enable two-factor authentication (confirming your identity twice) or set up a fingerprint scan.

 

For more information on protecting yourself from cyberthreats, visit these resources.

Related content

How to keep your assets safe

What is a CLO?

Insource or outsource? 10 considerations

Proactive ways to fight vendor fraud

5 Ways to protect your government agency from payment fraud

How to improve your business network security

The latest on cybersecurity: Mobile fraud and privacy concerns

Cybersecurity – Protecting client data through industry best practices

Fraud prevention checklist

Post-pandemic fraud prevention lessons for local governments

Fight the battle against payments fraud

Third-party vendor risk: protecting your company against cyber threats

Cybercrisis management: Are you ready to respond?

White Castle optimizes payment transactions

Webinar: Approaching international payment strategies in today’s unpredictable markets.

Increase working capital with Commercial Card Optimization

The future of financial leadership: More strategy, fewer spreadsheets

The surprising truth about corporate cards

Understanding and preparing for the new payment experience

Automate accounts payable to optimize revenue and payments

How to improve digital payments security for your health system

How to avoid student loan scams

How to prevent fraud

Keep your finances safe and secure: Essential tips for preventing check fraud

How to spot an online scam

What is financial fraud?

Authenticating cardholder data reduce e-commerce fraud

Mobile banking tips for smarter and safer online banking

Why Know Your Customer (KYC) — for organizations

5 winning strategies for managing liquidity in volatile times

Protecting elderly parents’ finances: 6 steps to follow when managing their money

Why a mobile banking app is a ‘must have’ for your next vacation

Money muling 101: Recognizing and avoiding this increasingly common scam

Is online banking safe?

How-to guide: What to do if your identity is stolen

8 tips and tricks for creating and remembering your PIN

Recognize. React. Report. Caregivers can help protect against financial exploitation

Recognize. React. Report. Don't fall victim to financial exploitation

5 tips for seniors to stay a step ahead of schemers

Learn to spot and protect yourself from common student scams

The password: Enhancing security and usability

BEC: Recognize a scam

Hospitals face cybersecurity risks in surprising new ways

Cryptocurrency custody 6 frequently asked questions

4 ways to outsmart your smart device

30-day adulting challenge: Financial wellness tasks to complete in a month

Webinar: How to stay safe from cyberfraud

Webinar: CRE Digital Transformation – Balancing Digitization with cybersecurity risk

Hospitals face cybersecurity risks in surprising new ways

Webinar: CRE Digital Transformation – Balancing Digitization with cybersecurity risk

How you can prevent identity theft

What you need to know about identity theft

Authenticating cardholder data reduce e-commerce fraud

Disclosures

Start of disclosure content

Loan approval is subject to credit approval and program guidelines. Not all loan programs are available in all states for all loan amounts. Interest rates and program terms are subject to change without notice. Mortgage, home equity and credit products are offered by U.S. Bank National Association. Deposit products are offered by U.S. Bank National Association. Member FDIC.