What Else Can Be Hacked?

What Else Can Be Hacked?

With the explosion of Internet of Things (IoT) devices, the list of things to hack has also exploded. If one takes a moment to consider the potential risks, it can be eye opening and downright scary—just in time for Halloween. Peruse the Internet a bit and you will find real hacking examples that include pacemakers, children’s teddy bears, baby monitors, vehicles, security cameras, and more. In some cases, the devices are being used to execute lateral attacks by using the first IoT as a doorway or gateway to other devices or systems. Here’s just one example, back in 2014, a couple woke up in the middle of the night to discover their baby monitor and security camera system had been hacked and someone was using the devices to scream obscenities in the baby room and watch via the robotic camera. Frightening for sure!

IoT devices can make your personal life and business better, more convenient, more efficient and save money. While these devices are often out of sight and mind, we remind you to do everything in your power to keep your family, your business and yourself safe by securing your IoT devices. Good first steps include changing default passwords, disable Universal Plug and Play, and regularly patching and updating your IoT devices as updates become available.

IoT devices are here to stay. Contact IT Radix today and let us help you use these products safely and securely.

Check out our Dark Web Monitoring services here and learn how to stay safe online!

First published in our October 2020 IT Radix Resource newsletter