DATA DOCTORS

Here’s how to create a separate network for smart home devices

Dec 28, 2019, 4:35 AM | Updated: 9:36 am
(Pexels Photo)...
(Pexels Photo)
(Pexels Photo)

Q: What’s the best way to create a separate network for my smart home devices like the FBI is recommending?

A: The FBI office in Oregon chimed in on the security issues associated with IoT (Internet of Things) devices that millions are installing around their homes.

Everything from thermostats to lighting systems to doorbells and major appliances are connecting to the Internet and the FBI is warning that these IoT devices could be the gateway that allows cyber thieves to gain access to your router and everything attached to it.

IoT device manufacturer’s track record on security isn’t great, which is why we’ve seen a myriad of vulnerabilities discovered in popular webcams, doorbells and smart TVs just to name a few.

Keeping them on a separate network makes it rather difficult to get to your computers from a compromised IoT device.

Option 1 – Two Completely Separate Networks
The most secure, but least cost effective approach is to actually have two separate Internet connections with each using their own router.

You can either contract with your current ISP for a second connection or opt for a second connection from another ISP if you want a little outage insurance.

Option 2 – One Router, Separate SSIDs
Most current routers have the ability to setup a wireless ‘guest network’, which is separate from the primary network. To activate this option, you’ll need to get into the router’s settings and look for a reference to guest access or guest network.

To access these settings, you’ll have to know the administrative username and password for the router, which can be accessed via a web browser or an app if one is available for your device.

If your router has an option that allows guests to access local network resources, make user to turn it off. In some cases, your device may use the term ‘Isolate’ which accomplishes the same thing, which is to keep anything connected to the guest network to access anything other than the Internet.

There may be additional security options available, such as blocking access to the settings menu from the guest network, so be sure to thoroughly review all of the security settings available.

Option 3 – Two Separate Routers
The most complicated approach is to use a single Internet connection but two separate routers that are properly connected and configured. Connecting them improperly won’t achieve the security goal of isolating your IoT devices and depending upon the two devices
you’re connecting, there are going to be a number of configuration steps required as well.

This isn’t something that I’d recommend you attempt unless you or someone that is helping you is network savvy.

Additional Steps
No matter which approach you take, make sure you change any default passwords on all of your devices, make passwords as long as you can and don’t use the same password on everything.

Make sure you have checked for firmware updates on your router(s) and IoT devices to patch any known vulnerabilites and turn on auto updates when available. If updates aren’t automatic, create a calendar reminder to check for updates at least once a quarter.

Lifetime Windows & Doors

Data Doctors

(Pixabay Photo)...
Ken Colburn, Data Doctors

Protect your printer by keeping the firmware up to date

A variety of common hardware devices such as printers, scanners, cameras, routers, smart home devices, streaming media players and smart TVs offer firmware updates. Make sure your devices' firmware are current.
7 days ago
(Pexels Photo)...
Data Doctors

Here are the realities of paying ransomware thieves

The question of whether you should pay ransomware thieves or not has more to do with whether you have a secured backup to restore from or not. However, paying the ransom doesn’t guarantee every file will be returned intact.
14 days ago
(Photo Illustration by Igor Golovniov/SOPA Images/LightRocket via Getty Images)...
Data Doctors

The Microsoft Office productivity tool used in some ransomware attacks: Macros

Macros in Microsoft Office can be beneficial for some users, but for some, it can create harmful results.
21 days ago
FILE - An iPhone displays the apps for Facebook and Messenger in New Orleans, Aug. 11, 2019. Online...
Data Doctors

Are Facebook Protect emails a scam or legit?

Facebook is now alerting anyone that they deem to be capable of reaching a large audience that they too should update their security settings. Here's the best way to do so.
28 days ago
(Pexels Photo)...
Data Doctors

Be sure you’re in control, and have ownership, of your company website

Just because you’re paying for a domain doesn’t mean you actually own it, so be proactive and make sure you are in complete control of this incredibly important business asset.
1 month ago
(Pexles Photo)...
Data Doctors

Apps that’ll make you pull away from your desktop scanner

Here are a few apps that can help you pull away from your desktop scanner.
1 month ago

Sponsored Articles

...
Arizona Department of Gaming

While March brings upsets and buzzer-beaters, it also needs to bring caution

In March, basketball fans around the country glue themselves in front of a television for almost 11 hours for four consecutive days.
...
Desert Institute for Spine Care

Desert Institute for Spine Care is the place for golfers to fix their back pain

Beautiful golf courses litter the Grand Canyon State. Thousands of golfers call Arizona home.
...
Christina O'Haver, Barrow Neurological Institute

Lifelong golfer returns to game pain free after spine surgery at Barrow

Joe Colello’s love affair with golf began nearly 70 years ago when he stumbled upon a neglected, rusty set of Bobby Jones clubs.
Here’s how to create a separate network for smart home devices