Keep your smartphone safe when using it with a connected device hub
Written by a NortonLifeLock employee
There’s no denying that smartphones have become integrated into our lives. In the United States alone, 72% of adults own a smartphone.1 In a world of constant connectivity, smartphones are like little personal assistants, keeping us on top of our work and social schedules, enabling us to chart our health, browse the latest news, and access thousands of powerful apps.
Don’t wait until a threat strikes.
Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device – like most of us do – you need an all-in-one security suite. Meet Norton Security Premium.
Enjoy peace of mind on every device you use with Norton Security Premium.
As we venture into the age of “smart things,” most device manufacturers are looking to the smartphone to be the “controller” of the app for their products. Most smart devices have an “app for that,” which resides on the smartphone.
Essentially, a smartphone is a tiny, pocket-sized computer. Because of the effortless ease smartphones introduce into our lives and the high adoption rate, this might make them more of a target for dangerous malware and hackers that put our privacy and important personal information at risk. Sophisticated hackers can extract data from your devices using spyware, spam, phishing, or just by infiltrating your Wi-Fi connection in public or at home.
Protecting your smartphone
Fortunately, there are many straightforward steps that you can take to protect your smartphone from cyber thieves:
- The first thing you should do is install reputable Internet security software, such as Norton Mobile Security. Norton Mobile Security can help protect against most mobile threats such as malware, adware, web phishing, and more.
- Be sure to avoid opening an email if you do not recognize the sender. If you do open the message, and the unknown sender is requesting you to provide sensitive information, delete the message immediately. If the request appears to be sent from a company you know, use the business’s website to reach out about the message. If it’s a spam message, delete it promptly and never answer it.
- If an unknown sender of a text message requests personal information from you, do not answer. If you believe the text to be legitimate, try getting in touch with the purported sender via a phone call.
- If you are using your smartphone in a public space, never leave it unattended. Do not use any unprotected Wi-Fi or Bluetooth networks, and turn off your service when you aren’t using it. If you do need to use public Wi-Fi, you should use a virtual private network (VPN), like Norton Secure VPN.
- When setting up a password for your emails, social media accounts, and bank accounts, choose a complicated one that contains numbers, letters, and symbols. Avoid using any obvious passwords, such as birthdays, important dates, or consecutive number sequences.
Device hubs such as Google Home and Amazon Echo are designed to be a centralized communication point between you and your devices. The device hub is essentially a voice activated “key” to controlling all of the smart devices in your life. While these devices seem to be “standalone,” they are actually controlled by an app on your smartphone.
How device hubs are vulnerable
Although the device hub is ultimately controlled by your smartphone, these hubs should still be protected. Cyber criminals can discover a lot about your home through vulnerabilities in your device hub. By exploiting these vulnerabilities, not only can the cybercriminals access personal data stored in these devices, but they also could potentially wreak havoc on your devices as well. It’s possible to change your alarm settings, hijack smart hubs to launch DDoS attacks, change your thermostat settings, and even open your door locks. While these device hubs enable you to have total control over the connected items in your home, they also create an entry point for others to control your home without your permission.
Protecting your device hub
- Use your wireless router’s encryption options to deter potential attacks on your security and to protect your device hub. Encryption scrambles wireless communications between devices or computers, so others cannot “read” them. You can use one of two methods to encrypt your signal, including WEP and WPA.
- Next, you should ask your service provider if the latest version of firmware is permanently programmed into your router’s memory.
- Restrict your web connection access point from being detected outside.
- Finally, ensure that your password is tough to crack, and change it every 90 days.
By making it hard for hackers to access your smartphone and device hub, you are increasing your personal security and privacy.
Use a secure router
Norton’s industry leading software protects your PCs, laptops and smartphones from hackers and cybercriminals. But today’s connected homes — with smart TVs, Internet security cameras, Wi-Fi thermostats and baby monitors — require something more. We set out to change Wi-Fi forever. The result is Norton Core. Our uncompromising vision: a wireless router that secures your digital life, while delivering a high level of performance. Through deep packet inspection, intrusion prevention, and more, Norton Core defends your home at the network level. It fends off cyber threats before they can infiltrate your home and compromise your personal life.
While connected devices add convenience to our lives, they can also be a gateway for nosy criminals. Be aware and stay safe.
1 Pew Research Center, “Smartphone ownership rates skyrocket in many emerging economies,” February 19, 2016
Safety for every device.
Security is no longer a one-machine affair. You need a security suite that helps protect all your devices – your Windows PC, Mac, Android smartphone or your iPad.
Copyright © 2020 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.