Securing Your IoT Smarthome with Amanda Fennell
Easy Prey29 Sep 2021

Securing Your IoT Smarthome with Amanda Fennell

Home technology can be hacked. Anything from a coffee machine or LED light to a TV or a doorbell. We understand the risk of being vulnerable on our tablets and phones, but you'll be shocked to realize how much data is collected from our other smart devices and how those very same devices can lead to a much wider compromise. Many of us don't even know how many devices are on our connected networks, so we better listen up.

Today's guest is Amanda Fennell. Amanda is the Chief Security Officer and Chief Information Officer at Relativity. In her role, she is responsible for championing and directing their tech and security strategies including risk management and compliance practices. She has a Master's degree in Forensic Science and over 15 years of experience in Forensics and Cyber Security.

Show Notes:
  • [1:12] - Amanda explains Relativity, her roles in the company, and how she was drawn to this field.
  • [3:35] - Many people assume Amanda has all the new and greatest technology but knowing the risks of exploitation, she is selective.
  • [4:25] - There are a multitude of devices that people don't even realize they connect to their network.
  • [5:23] - Because of the sheer volume of devices, hackers can do a sweep and use the information gathered.
  • [6:32] - The number one security problem is keeping things up to date.
  • [8:16] - Amanda walks through the simple steps of hacking smart devices.
  • [9:40] - Amanda demonstrates how hacking something seemingly inconsequential can lead to accessing more.
  • [11:23] - You need to know what's connected to your network. You have more than you think.
  • [12:41] - Surprisingly, there are connected lightbulbs that people sacrifice security for ease of access.
  • [14:02] - When guests come over and you share your password, did you take their access back?
  • [15:15] - Amanda is a big fan of segregating your network. She describes what this means.
  • [16:29] - How can you segregate your network?
  • [18:08] - Amanda suggests using WireShark.
  • [19:39] - Many people hang on and use old routers because they still function, but most are not supported with updates after just a few years.
  • [21:18] - It is also common practice to use identifying information as passwords and device names.
  • [22:33] - Even Direct TV can be hacked. How can this be used against you?
  • [23:30] - Amanda shares an investigation and how she used a printer spool file.
  • [25:06] - Medical devices, printers, and copiers can be hacked.
  • [27:29] - Amanda describes the differences between two security companies and what she advises doing to stay secure.
  • [31:40] - How can you implement ongoing monitoring and detection in your home network?
  • [33:52] - Implement updating devices into your monthly or weekly routine.
  • [36:03] - You can do a scan on your network and even ask a friend for help.
  • [37:28] - Smart coffee and smart fridges seem simple but can be used for targeting phishing and even when you are leaving the house.
  • [39:33] - Just making yourself a little less accessible could deter a hacker because others will be easier.
  • [41:43] - Amanda shares how false donations were used in fraud.
  • [43:25] - We all deserve to have our information private and secure but it also needs to be personally accessible. That's the risk.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Avsnitt(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mars 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mars 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mars 45min

Populärt inom Politik & nyheter

aftonbladet-krim
rss-krimstad
p3-krim
svenska-fall
spar
aftonbladet-daily
politiken
flashback-forever
rss-sanning-konsekvens
rss-expressen-dok
rss-krimreportrarna
motiv
rss-vad-fan-hande
kungligt
ett-rent-noje
blenda-2
grans
rss-frandfors-horna
rss-flodet
svd-ledarredaktionen