631-905-9617    Get SUPPORT

Suffolk Computer Consultants, Inc. Blog

Suffolk Computer Consultants, Inc. has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Your IT Guy is Annoyed by Your Smart Lightbulb

Why Your IT Guy is Annoyed by Your Smart Lightbulb

There’s no denying the convenience that so many of technology's essential features and functions can now be managed with a simple command, if not completely automated, thanks to the Internet of Things. With the IoT, everything is augmented by a miniature computer… but these devices are built to be convenient and (for lack of a better term) cheap.

As such, you could potentially have numerous backdoors into your business network.

Why IoT Devices Introduce Vulnerabilities into Your Network

There are three primary reasons that IoT devices are such tantalizing targets:

Most IoT Devices Have Predictable Factory Default Passwords

When was the last time you thought about changing the password on your lightbulb? Never, right?

Devices like these are frequently protected by generic default passwords, with lists of these passwords commonly available online for hackers to reference whenever they encounter a device they can use to access your network.

Most IoT Devices Lack Critical Patches or Updates

When an issue is discovered in a more traditional computing environment, a patch is typically released to resolve it, and full updates also cement these improvements into the infrastructure itself. This process is often neglected in the IoT, so no security-based improvements are made.

Most IoT Devices Will Be Out of Your Control

Shadow IT—or the presence of unapproved technology on a business network—is a big issue, and IoT can easily be a major contributor. Smartphones and smartwatches are everywhere nowadays, and if they’re connected to the work network without the a-okay from IT, you officially have a shadow IT problem that could bring hitchhiking threats.

So, how can you allow your team to use these kinds of devices without putting your business at risk?

Minimizing the Risk of the IoT

You Can Start By Segmenting Your Business’ Network

Most network hardware supports multiple distinct subnetworks. We can help you establish one network for your business hardware, another for your smart devices, and a third for your guests’ use. 

This configuration helps protect your business by isolating your data from any IoT devices you have connecting through your network

You Can Also Emphasize Discretion

Whenever possible, it is important to stick to established brands with a history of providing regular security updates. A great deal isn’t that great if it results in a cybersecurity incident.

You Should Follow a Key Checklist

With any sanctioned IoT device, there are a few safeguards you will want to enact in order to maximize your business’ protection.

  • Always change the default password before connecting the device to the Internet.
  • If enabled, turn Universal Plug and Play (UPnP) off on your router.
  • Unless they are a foundational element of a device’s functionality, disable all microphones and cameras.

We’re Here to Help

We can help you put the IoT to work for you without undermining your overall security or productivity. Beginning with a network audit to identify and remove existing shadow IT, we’ll also help you configure your network to ensure all IoT devices are safely contained in their own environment. Furthermore, we can be there to provide proactive monitoring that prevents threatening behaviors from taking root.

Don’t trade security for convenience. Give us a call at 631-905-9617 to learn more about how to get the best of both worlds.

Let’s Dispute the 3 Most Common Cybersecurity Myth...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Wednesday, March 18 2026

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Newsletter Sign Up