Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsLogical SecurityCybersecurity News

Everything in your home will be connected (what could possibly go wrong?)

By Cameron Camp
smart home
February 11, 2021

Your next home will be connected in creepy ways. It will take a while, but eventually every machine and device in your house will talk to everything else, and Consumer Electronic Show (CES)-born inspiration will be at their roots. From e-toothbrushes to connected e-toilets that can detect a health issue (Really!), the items in your home will be controlled via the internet and will be everywhere. But what does that mean for security?

Some powerhouses in the industry, the kind with the huge CES booths and budgets, have started ramping up security in their connected products. But around the back corners of the digital exhibit halls where the next aspiring hot startup is located? Don’t count on it. The problem is, time-to-market often trumps security, so safeguards get pushed aside with the promise that future firmware updates might address those issues someday. Or not. Anyone got a ten-year-old router that still works fine but is full of holes? Yeah, that.

But back to the creepiness: Recently, a ransomware campaign took control of a home device –  a chastity belt – demanding payment in order to have the belt unlocked. And new automotive vendors have trotted out the ability to determine things like your weight, sex, age and mood, and even increase vent airflow in your car to “cool you down” if you seem angry. Expect this level of invasiveness in your new home – if you allow it.

Who wants your home data? Vendors who will offer discounts in exchange for slurping more and more personal information from your sensor-riddled dwelling. At first, some will welcome the discounts and opt in, but eventually insurance companies’ insatiable actuarial data hordes will be more insistent, tying your home sensors’ information to insurability. Without having to say whether they’re most interested in your weight gain (or loss), sugar content in your e-fridge or whether you’re brushing your molars effectively (your new toothbrush will know), their magical black box will ratchet rates up or down, or even prompt policy cancellation.

Later, you’ll have to pay more if you don’t provide that information. This slow move from opt-in for discounts to penalties if you opt-out is a trend we’ve seen in retail over the last few years. Today, if I don’t provide a rewards card at the gas station, I have to pay 16 cents more per gallon. That’s what my personal information is worth to them, and it’s a hard profit for them to ignore. This oozing market-backed privacy blight will continue into your connected home. And while privacy pundits will continue to balk, marketers will be very motivated to grab every scrap of your data.

All the tech to make it happen already exists.

Next, expect the insatiable hunger by platform manufacturers to consolidate the home-data harvesting empires to their platform. Think Android and iPhone years ago. The eventual winners (among many entrants) will now have a duopoly on your mobile experience. The same will happen in your home.

All of this will make data breaches that dump your private “fingerprint of your life” onto the web very painful to recover from. You’ll have to reset your whole house. Which will be tied to your car. Which will be tied to your work. Which will be tied to your bank account.

Can we stop this with better laws? Maybe. In the EU, there are legal actions aimed at sending a cooling signal to overzealous data collectors, and more of a clear history favoring privacy. There are similar examples forming in the U.S., and we expect such legislation to expand and spread to other markets worldwide soon.

What can you do in the meantime? Log into the devices you buy and uncheck a bunch of over-sharing boxes, likely enabled by default. If you don’t need your device to interact with the cloud, disable that. Uncheck boxes that offer sharing of information for “a personalized experience”. That means they can watch all your activity, then flood you with advertising. You can watch forums for product-specific security tips and learn how to disable unnecessary functions; often times YouTube has great tutorials on popular devices.

Opting out continues to be more painful. A colleague of mine bought a new home entertainment system – every piece of it had an app for you to install if you want to configure more than basic functionality.

Using a VPN can offer some protection, such as for thwarting some geolocation tracking for example. But if your device knows who you are and interacts with cloud services with a unique identifier or other fingerprinting techniques, they’ll know where you are anyway. Still, VPN use is a good idea for lots of security-related issues, so it’s generally beneficial to have.

But if hackers can somehow break into any of your devices and listen into your home and capture your voice, they can pretend to be you and do creepy things like send ransomware threats to people you love. Enabling multifactor authentication (MFA) on sensitive logins can help prevent these creepy hacks from harvesting and using your credentials if they gain access to your home network. But you still don’t want them there.

So maybe less-connected home devices are more. After all, do you really need a robot to get you a new roll of toilet paper (yeah, that was a thing at CES) in the unfortunate event you are mid-task and unable? How have we survived for generations without this? We mostly managed. We bought a few extra rolls and invested in close-proximity storage. You are, of course, free to get a toilet paper-fetching robot, but does it really need to be connected to the network? It’s a question we all need to take more seriously.

KEYWORDS: consumer electronics Internet of Things privacy regulations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cameron Camp is a researcher for global security provider ESET, and has played a critical role in growing the ESET North America Research Lab. Cameron has been building critical technology infrastructures for more than 20 years, beginning as an assembly language programmer in 1987 and eventually becoming an evangelist for Linux and open-source technologies with an emphasis on the security sector. Prior to joining ESET, he founded Logical Web Host in 1998, a data-driven web services company.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • bots-freepik1170x658.jpg

    Why scalper bots will be your worst security nightmare in 2022

    See More
  • Your password could be hacked in under one hour

    See More
  • What Office Item Will Be Obsolete in 2017?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing