facebook linkedin twitter

Computerware Blog

Don’t Be Dumb About Smart Technology

Don’t Be Dumb About Smart Technology

A few years ago, there was a decision made to make a concerted effort by manufacturers to create their products, but to also create those same products with “smart” technology inside. Basically, because of the rampant innovation of Internet-connected systems, devices, appliances, and knick-knacks of all types we have to ask the question: Are we being dumb for using all these smart devices? 

The Smart Home

Let’s start at home. The modern home features more internet-connected devices than ever. Most of these devices are connected to the Internet wirelessly. Manufacturers have taken to outfitting products with sensors and other smart technology to try and simplify the integration of technology and life. The idea is simple: If people can use their mobile devices and automation to cut down on time, they can get more done without much effort. Have you ever wondered why people need smart washers, refrigerators, or coffee machines? Theoretically, they are designed to make their lives easier.

On the surface, this strategy seems pretty useful. The one major drawback is security. 

A business can use much of the same smart technology that you find in the home, but there is much more to lose if that technology is a security risk. If you get hacked at home, your IoT-fueled appliances may not respond as designed, or at worst your personally identifiable information will be leaked. If this were to happen at a business, however, much, much more is at stake. So the question becomes: Is using smart technology in the workplace, dumb?

IoT In the Workplace

The first (and really only) problem with the deployment of smart technology in the office is the lack of dedicated security a lot of smart devices carry. Moreover, your staff could be bringing in their own smart technology. In a time where every endpoint has to be secured--and when dedicated security for IoT could be looked on as an unnecessary expense--businesses have to weigh the benefits of the presence of this technology.

While there isn’t a complete solution for securing network-connected endpoints through the device, there are some strategies that businesses use to rangle these smart devices. They include:

  • Be sure to account for all of your connected devices and their details - In keeping track of the settings on your IoT devices, the credentials needed to access them, and any firmware updates, you will have the tools needed to maintain the security of these devices.

  • Actively apply patches - Keep track of all software updates and patches. If you are diligent about this, you should have success with your IoT network security strategy.

  • Change the default settings and passwords of your devices - Even if the smart tech you are allowing access to your network comes with comprehensive security, most don’t. By changing the default settings to a configuration that helps promote security, you will mitigate the risk involved by running the device in the first place. 

Like the cloud before it, smart technology is looked on as an insecure technology. Time will tell if it will be welcomed into the modern workplace as Software as a Service and Desktop as a Service platforms have. Call Computerware at (703) 821-8200 today to pick our technicians’ brains about the Internet of Things, IoT security, and which smart devices bring you value.

Tip of the Week: Personalizing Your Windows 10 Des...
Properly Assigning Access Control Measures Doesn’t...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 04, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Backup Productivity Business Managed Service Provider Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Collaboration Innovation VoIP IT Support IT Support Data Backup Quick Tips Smartphones Network communications Mobile Devices Business Continuity Microsoft Office Disaster Recovery Gadgets Data Recovery Social Media Cybersecurity Android Upgrade Server Communication Mobile Office Virtualization Phishing Smartphone Mobile Device Management Miscellaneous Holiday Ransomware Vendor Management Outsourced IT Users Windows Tech Term Mobile Device Windows 10 Managed IT Services Passwords Apps Operating System Facebook Unified Threat Management Internet of Things Remote Monitoring Automation BDR Apple Analytics Managed IT services Mobile Computing BYOD Data Management Remote Computing WiFi Windows 10 Marketing Training Artificial Intelligence History Cloud Computing The Internet of Things Business Technology Browser Save Money Firewall App Alert Help Desk Encryption Big data Spam Office 365 Budget Information Technology Two-factor Authentication Bandwidth Office Health Managed Service IT Consultant Hard Drives Content Filtering Maintenance Access Control Printer Going Green Gmail VPN Windows 7 Managed IT Government Bring Your Own Device Cybercrime Antivirus Hiring/Firing Healthcare Best Practice Lithium-ion Battery Computers Saving Time Tech Support Virus Recovery Employer-Employee Relationship Retail Wireless Technology Search Cost Management Windows 8 Information Outlook Document Management iPhone Computing Humor Customer Service IBM It Management Data Security Travel Augmented Reality Education Blockchain Update Data Loss Phone System Remote Work Hacking Covid-19 Networking Project Management Money Wi-Fi Vendor Computer Repair Running Cable Proactive IT SaaS Law Enforcement Wireless Intranet Applications Customer Relationship Management Twitter Storage Website Compliance Solid State Drive File Sharing Data storage PowerPoint Patch Management Hard Drive Voice over Internet Protocol Flexibility Conferencing Risk Management Mobility Current Events Administration Value Password Data Breach Legal Save Time Downtime Hacker Avoiding Downtime Regulations Paperless Office Private Cloud Cooperation Fax Server Comparison Tablet Company Culture Vulnerabilities Sports Telephony User Disaster Software as a Service Hosted Solution Machine Learning End of Support Social Networking Virtual Desktop Excel Robot Telephone Systems Social Securty DDoS Black Market Cryptocurrency Google Maps Scam Word Laptop Net Neutrality Monitoring Business Growth Cortana Business Intelligence Social Engineering Digital Payment Router Digital Meetings Management Websites YouTube Start Menu Tech Terms Lifestyle Download USB Telephone Presentation Trending Unified Communications Settings Mobile Technology Processor Mouse Pain Points Specifications Safety Uninterrupted Power Supply Microchip Taxes Smart Devices Programming Vulnerability Statistics Distributed Denial of Service Network Congestion Video Conferencing Bitcoin Documents Solutions IT service Public Cloud Licensing Entertainment Professional Services Data Protection Teamwork Heating/Cooling Distribution Streaming Media Identity Theft Integration Gaming Console Bluetooth Downloads Notifications Text Messaging Webcam Cost Politics Managed Services Provider Google Docs Redundancy Virtual Reality eWaste Memory Emails Experience Co-managed IT Chrome Automobile User Error Cleaning Evernote How To Monitors Chromebook Managed Services Office Tips Virtual Assistant Computing Infrastructure Hack Employee/Employer Relationship Managed IT Service Inbound Marketing Computer Accessories How To Multi-factor Authentication Processors Society Adminstration Pirating Information Data Warehousing Migration Cabling Connected Devices Business Owner Remote Workers Cyber security Displays Leadership Web Server Wireless Headphones IT Bookmark Books Workers Network Management IP Address Virtual Private Network Google Play Telephone Service Micrsooft Emergency Hard Drive Disposal LinkedIn Administrator Equifax Fleet Tracking Employer/Employee Relationships Access Supercomputer Application Development Managing Costs Drones Microsoft Excel Device security MSP Human Resources FinTech Microsoft 365 Computer Care Best Practives Browsers Google Drive Windows Server 2008 Archive Desktop Worker Finance Data Storage Medical IT Trend Micro Skype Nanotechnology Social Network Mobile Payment Reading Business Cards Samsung Service Level Agreement Procurement Security Cameras Threats Microserver Startup Asset Tracking User Tip Proactive Maintenance Permissions Language Spyware Point of Contact Unified Threat Management Employer Employee Relationship Backup and Disaster Recovery Digital Signature Navigation Virtual Machine G Suite Username Organization Upselling Electricity Printing Data Analysis Employees Music Video Surveillance Gamification PCI DSS eCommerce switches Writing Get More Done Hacks Physical Security Screen Reader Customer Resource management Communitications cache Television Printer Server Relocation Piracy Tablets Upload Supply Chain Management GDPR Managing Risk Upgrades Saving ZTime Turn Key Banking Botnet Smart Tech Printers SQL Server Analytic Fiber-Optic Database Internet Service Provider Tech Hypervisor Recycling Sync HTML PDF LiFi WannaCry Trojan Telephone System Keyboard IT Assessment Fileless Malware Hybrid Cloud Time Management Debate Freedom of Information Organize Mobile Security Regulations Compliance Holidays Harddrive Corporate Profile Product Reviews CCTV Best Available GPS Work/Life Balance Assessment SharePoint Read Reliable Computing Software License Trends Domains Remote Working Modem Strategy Deep Learning Business Metrics Computer Malfunction Multi-Factor Security Proxy Server Azure Fraud Tactics Public Speaking Term External Harddrive Tip of the week In Internet of Things Devices Electronic Medical Records Transportation Visible Light Communication Google Calendar Shortcut Electronic Health Records Directions Display Touchscreen News Device Management UTM Content Financial Data Recording Optimization IT consulting VoIP 3D Consultation Ebay Webinar Content Management Scalability IT Plan Enterprise Resource Planning Troubleshooting SSID Thin CLient Knowledge Business Managemenet Motion Sickness Legislation Error Entrepreneur Memes Dark Web Free Resource Messenger email scam Tracking Addiction HIPAA Managing IT Services Processing CIO Smart Phones Accountants A.I. Environment Health IT Advertising Flash Technology Tips Rental Service Competition Surveillance Wasting Time Staffing Google Wallet Fake News online Currency Electronic Payment Telework Logistics Virtual Machines Windows XP Audit Personal Information Productuvuty Financial Managing Stress Regulation CrashOverride 3D Printing Capital