Why Securing IoT Devices is Important (and 14 Tips to Follow)

New gadgets that seek to make your home and office smarter and more efficient hit the market seemingly daily, but did you know it’s on you to learn how to secure them?

Your internet-connected devices — smart TVs, conference room systems, security cameras, smart locks, gaming consoles, smart thermostats — make life more convenient, but these devices can also make your network more vulnerable, specifically in your office security, opening you up to attackers and threats. If your office is like most, you have “smart” connected devices, and it’s important to have a defense plan for securing them.

In many cases, employees bring in their own smart devices without your knowledge.  Unfortunately, the typical non-technical person has no idea this may be a security risk.  

Bottom line: If you have smart devices at your office, you’ve opened a new door to attacks, and they need consideration and protection.

14 Tips to Securing Smart Devices in Your Office:

  1. Shut down unnecessary services on the devices
  2. Setup the smart devices on an isolated wireless or wired network
  3. Restrict access to any internal networks from these devices
  4. Restrict your “internal” wifi network to only IT authorized devices to avoid rogue smart devices
  5. Implement an advanced wireless system that allows device tagging and automated isolation policies
  6. Change the default password on the device
  7. Update the software whenever available
  8. Put IT in charge of smart devices (i.e: purchasing and managing)
  9. Have a complete inventory of all smart devices (and check the log to see who/what else may be logging in)
  10. Ensure your network firewall is updated and provides next-gen protection
  11. Train employees on the danger of unauthorized and unmanaged smart devices
  12. Unplug smart devices that aren’t in use
  13. Implement a Unified Endpoint Management (UEM) system to detect and monitor smart devices
  14. Factory reset devices before disposing of them

Why are smart devices often targeted by hackers? 

There are several avenues in which a hacker can target a smart device. First and foremost, many smart device manufacturers don’t ship devices with the latest security updates and don’t have secure operating systems deployed. This means a smart device needs to be updated by you during, or after, installation. Also, many smart devices don’t auto-update, leaving them with old network protocols enabled.

Smart device traffic can be relatively easy to identify coming out of a network, making it easy for an attacker to identify your site as a potential target using these devices. In combination with weak and publicly-known passwords set on devices when shipped, smart devices are easy targets. 

Some smart devices require specific ports to be opened in a firewall to allow them to work, and opening unnecessary ports in a firewall can open your entire network to access through that port. There is limited capability when it comes to monitoring these devices with advanced security monitoring services that are designed for Windows servers, Linux servers, or common business networking equipment.

What are some of the most vulnerable connected devices?

  • Video-based devices are often targeted
  • Thermostats - Because they are really common and often not managed by IT
  • Shop-floor IoT devices installed by non-IT shop-floor employees

Why does it matter? I don’t have anything to hide…

Any smart device connected to your office Wi-Fi, approved by IT or otherwise, can present a risk to your network. Your company’s next major security risk may come from a device as seemingly innocent as a connected coffee machine.

Security risks from IoT devices are a hot topic of discussion within the cybersecurity community. The digital age has made us accustomed to the power and convenience of having our data decentralized, and of having all our devices work in conjunction with each other. With the perfect combination of characters, the digital and physical world can be easily usurped. 

Even if you implement these 14 tips or consider yourself a security expert, new developments happen every day. To minimize your security risk, it’s imperative you stay current on cybersecurity news and regularly revisit security protocols. 


InsITe helps businesses and manufacturing companies get the most out of current and emerging technologies with a customized IT approach to maximize growth, efficiency, insights, and productivity. InsITe is not a typical IT company selling products for short-term, short-sighted fixes. We invest in long-term solutions for a company’s growth by taking the time to learn its products, process, and business goals before bringing tech into the conversation. In this way, we become much like our Clients’ very own internal IT department with familiar faces who understand the business. 

If you have any questions about this post please leave a comment. We read and respond to all comments. Or better yet, give us a call and ask to talk directly to our Founder and CEO Mike Schipper 616-383-9000. 

Back to Blog