TECH TALK
1. Research: Before purchasing any IoT device, find out if the manufacturer has any cybersecurity built-in on the product you are considering. Make sure that you can change the default password (probably the easiest way for hackers
to gain control of a device). Does this product allow for automated updates and/or security patches? Any device which does not have some sort of capability in regards to software updates over time should be considered suspect. Use automatic
updates if they are available, and if they are not, only install updates from known, reputable sites. After you first install this device, make sure to verify that the software is the latest version, and if not, take the time to update it.
ENGINEERED AVIONICS SOLUTIONS
Past
Present Future
Since 1997, Millennium International Avionics has been providing engineered support solutions for more than 3,500 aircraft avionics and cockpit display products. We are focused on providing options for operators that extend the useful life of their equipment and lower overall cost of ownership by mitigating OEM obsolescence.
It’s always good to have options.
avionics411.com • 816-524-7777
2. Use strong passwords: You have read this advice for years, and you must apply it to your home and business IoT devices as well. Do not repeat passwords, use complex uppercase/lowercase and numeric and special characters.
3. Turn off your IoT devices when not in use, or, periodically, if they are always on: The reason for this is that most malware embeds itself in memory and can often be expunged via merely by cycling the power. If a device is not going to be used for a while, it should be turned off. For devices that are in constant use, they should have their power cycled regularly to clear out any potential malware and just to bring them back to an initial operating state.
4. Do not allow for a single point of failure: It only takes one vulnerable IoT device for a hacker to be able to access your entire network, and perhaps even reach other networks (as in when you work remotely). Besides using strong passwords and making sure that your devices and computers have the latest software, most routers will allow you to create segmented networks. Most enterprises make full use of this, but home users should also consider this. Many routers already ask you when you are doing your initial setup to create a guest network, which does not have access to some of your computers and devices (this is a must for any home which allows visitors to use its Wi-Fi connection). Another idea is to create a third network which only contains your IoT devices and/or your smartphones. If you are not techno-savvy, router
24
DOMmagazine.com | july 2020
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52