TVs and smart devices

Smart devices, which make up the Internet of Things Internet of ThingsThe Internet of Things (IoT) refers to physical devices (also called “smart” or “connected” devices) that connect to each other via the internet. They collect and exchange information with one another and with us. Smart devices can be remotely controlled and monitored, or work automatically, through a variety of software, cameras and sensors. , make our lives more convenient by programming our home to sync with our schedules. But like any other internet-connected device, they can also give potential cyber criminals access to our information.

Make your smart home smarter

Smart devices, like smart TVs and smart speakers, connect to each other via the internet. You can control and monitor them remotely, or they can work automatically through a variety of software SoftwareA computer program that provides instructions which enable the computer hardware to work. System software, such as Windows, Linux or MacOS, operate the machine itself, and applications software, such as spreadsheet or word processing programs, provide specific functionality. , cameras and sensors.

There are many types of smart devices and the list is growing every day.


Risks to you

Hacking

Hacking HackingHacking is a term used to describe actions taken by someone to gain unauthorized access to a device. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities. is any action taken to get unauthorized access to a device or account.

Some smart devices might not have the security features to let you choose your own strong password PasswordCombination of letters and numbers you select to secure an account or device. , leaving you vulnerable to hacking.

Privacy

Smart devices can capture and transmit so much private information about us, our daily routines, our fitness and our health habits, and our personal banking and payment information. It’s important to understand how smart device Smart deviceWeb-enabled smart devices transmit information gathered from their surroundings using embedded sensors, software and processors. Smart devices communicate with one another (machine to machine) or with us through our smartphones. After initial setup, most smart devices work automatically, collecting and sending information. manufacturers are using this information and if they are selling it to advertisers and other third parties.

Protect your privacy at home

"two hands giving thumbs  up, passwords and update circles"

Don’t settle for defaults

Change the manufacturer's default DefaultA setting automatically chosen by a program or computer that remains until the user specifies another setting. usernames and use strong passwords for your Wi-Fi Wi-FiWi-Fi refers to a set of wireless communication protocols that can transmit traffic to Wi-Fi enabled devices within a local area. A Wi-Fi enabled device such as a laptop or tablet can connect to the internet when within range of a wireless network connected to the internet. An area covered by one or more Wi-Fi access points is commonly called a hotspot. network NetworkSeveral computers that are connected to one another. and smart devices. Don't use anything that could be associated with your name, address, or phone number.

"a cursor arrow selecting one of two boxes of arrows"

Keep your devices updated

Use up-to-date security software Security softwareIdentifies and protects against threats or vulnerabilities that may compromise your computer or your personal information; includes anti-virus and anti-spyware software and firewalls. on your home computer and connected devices. Turn automatic updates on when available or update UpdateUpdates to software and devices add new features, fix bugs, and often contain new security features to protect against attacks. your connected devices as soon as you’re prompted. Learn more about updates.

"four Wi-Fi symbols"

Use a separate network

To limit the damage of a cyber attack Cyber attackThe use of electronic means to interrupt, manipulate, destroy, or gain unauthorized access to a computer system, network, or device. , separate your smart devices from your main network. Ask your service provider for help to create a ‘guest' network for your connected devices.

"a person holding a laptop with Wi-Fi and new contact notifications"

Stick to what you need

Features like Bluetooth BluetoothAn industry standard for short-range wireless connections between devices like mobile phones, headsets, computers and PDAs. , geolocation, cameras, and microphones can and should be turned off when you’re not using them so they can’t be accessed by a potential hacker. If you only use a smart device occasionally, turn it off or disconnect it from the internet when you’re not using it.


Resources

How to secure your smart devices against cyber threats this summer

How to secure your smart devices against cyber threats this summer

Gearing up for another summer at home with your smart devices? Here’s how you can secure them against cyber threats.

New device checklist

New device checklist

Before you start using it, take these steps to customize it and keep it cyber safe.

Video: Life Happens Online - Families and businesses

Video: Life Happens Online - Families and businesses

Your favourite sitcom, Device Appreciation Time, got a spin-off called Life Happens Online and it’s more 2000s than ever! In this final episode, Ted tries to work while his kids are in virtual school. And ordering surprises online.

Blogs

Blogs

Read up on the latest cyber threats and tips for keeping yourself, your family and your business cyber safe.

Resources

Resources

Visual learner? Check these out for tips and tricks to keep yourself, your family and your business secure from cyber threats.

Become a champion

Become a champion

Become a Get Cyber Safe champion to help improve internet security for yourself, your organization, and all Canadians.

Date modified: