A Cloud of My Own is a simple to install device that stops hackers from monitoring, compromising and controlling devices inside of your home. Such compromises allow outsiders to listen and watch what happens in your home, as well as control your environment.
- U.S. broadband households now have an average of 9.1 connected devices,” said Brad Russell, Research Director, Connected Home, Parks (1)
- IoT devices will outnumber the world’s population this year (2017) for the first time (2)
- Unmanaged Firewalls used in homes provide minimal security for iot / home automation and smart home devices.
- Intrusion Detection Systems(IDS) and Intrusion Protection Systems (IPS) are rarely deployed in a non-enterprise environment.
|Types of Devices||Some Risks / Reasons for a Hack|
|Security Camera||Watch / record video|
|Smart Light Bulbs||Record when you are home|
|Heating / Cooling||Record schedules|
|TV||Record when you are home , record voices|
|Kitchen Appliances||Record when you are home|
|Locks||Record when you are home, provide access|
|Toys||Record audio potentially video|
** All devices provide potential location for within your home for a hacker to them begin exploting other devices in your network.
The explosive growth of the Internet of Things and Smart Home Technologies have dramatically changed the potential security risks on both home and business network.
Within the enterprise, these risks are reduced dramatically through enterprise network and security processes and technologies.
In your home, these computers are exposed to a dramatically different environment. This network is most likely unmanaged, possibly having a firewall with default access credentials, and the machines are commingled with IOT/ home automation devices that have been proven to have extremely limited security in place. IOT is largely unpatched, unmanaged and ripe for exploitation.
Subscribe to our mailing list