SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Website: http://www.mobodexter.com Blogs: http://blogs.mobodexter.com
Chandramouli is a serial Entrepreneur who has co-founded MoboDexter Group companies
& ViewFindAR that does Information Technology products & services in CAMS domain.
Prior to starting MoboDexter, Mouli worked as a system software development/test
engineer/lead and Manager in product R&D organization in Intel, Hewlett Packard and
WIPRO. His experience includes 6 years of software product engineering in product R&D
groups as an engineering manager in Intel and HP handling development and test
programs. Specialty includes handling programs which involved recruiting and building
new teams for handling new SW product R&D functions
PMI certified Project Management Professional (PMP) - PMBOK practitioner for the past 3
years and an Agile SCRUM practitioner for 4 years. I have filed 1 US patent and 2 Research
publications in SW/FW domains and passionate about technical contributions to the
projects and programs
Mouli had additional experience of leading large org-wide programs/initiatives on -
Quality : Test transformation, Test Automation, orthogonal defect classification (ODC),
Static Code analysis, product defect prediction models, Closed Loop Quality System
(CLQS)
Methodologies: Test driven development; Model based testing methodologies; Retention
prediction model; Competency evaluation model adoptions
Business : Lean sigma, Outsourcing evaluation & strategy, Business optimization using
Moore’s product adoption model, Data center optimization, innovation
Chandramouli Srinivasan(Mouli)
CEO & President
MOBODEXTER INC
 The hottest new trend on the Internet isn’t a new social network or app. It’s
things. Dubbed “The Internet of Things” it refers to any object you can
connect to with the Internet. These “things” include an array of devices and
even systems.
 The Internet of Things promises to connect more devices than ever before.
The Internet of Things can make your home more secure with a security
system, but it can also open you up to identity theft and other cybercrimes.
Any time you get a new piece of technology on the Internet of Things,
you’re taking new chances with your online security.
Why You Need to Secure the Internet of
Things?
 There are a number of ways that criminals can leverage the Internet of
Things to infiltrate your home.
 Skilled hackers could use your home’s power signature to figure out the
best time for a burglary. If your car gets hacked, you could have identity
thieves spying on everywhere you go and everything that you do.
 Webcams have been hacked on laptops, allowing criminals access to your
most intimate moments. Even if there’s no property crimes or violent
crimes committed, you don’t want to be violated in this way.
Operational aspects of internet of things can be secured using the following
techniques
 Secure your home wireless network. Remember that almost all of these
devices will run off of your wireless network. Hence secure the connection
the home router. Use WPA2 type security configuration in the router and
make the WPA2 stronger. Using VPN & Encryption are additional layers of
security. However, this needs sophisticated knowledge to setup and
operate.
 Use several emails. If, for example, you have an email for your connected
pill bottle, and another for your connected car, you’re not as vulnerable as
someone who has all of their information associated with one account
linked across several devices.
How to Secure Your Home in the Age of the
Internet of Things?
 Always update the firmware on your connected devices. This is as
important as updating the operating system and Internet security suite
on your computer and mobile devices. When hackers start to attack the
Internet of Things, they’re almost always going to use known exploits
to do it, the kind that are patched when firmware updates.
 Remember that your main laptop computer is part of your overall
connection to the Internet of Things. So make sure to update your
operating system and Internet security suite, as well as all the apps on
your laptop.
In addition to this basics of security needs to be adhered at all times to prevent any hacks into any system that’s connected to
internet.
 Secure Passwords: The keys to our digital kingdom, passwords should
be closely protected. A lot of the times, that’s all a cybercriminal needs
to gain access to your account.
 Malware: Malware, malware, malware! You hear that term
everywhere, however, it can mean so many different things. Malware is
more of an umbrella term used for any kind of malicious software on
the Internet landscape- from annoying adware to devastating
ransomware.
 Privacy: If this isn’t an issue for you, it should be. A lot of people take
the stance of “I don’t do anything wrong, therefore I have nothing to
hide.” however that is largely misinterpreted. You have everything to
hide.
 Data Breaches: Data breaches are why we should care about our privacy.
Scammers and criminals target companies in order to obtain as much data
as possible about an individual, which in turn helps them commit identity
theft or collect a hefty sum on the black market for the data.
 Safe Computing: A lot of the threats today you can combat yourself, just
armed with a little bit of knowledge. Internet security software is an
essential piece of the cyber security pie, however, it can’t protect you form
every single threat out there.
 Online Scams: Scammers are the bottom of the barrel of Internet criminals.
Online scams take hardly any technical skills to execute, yet so many people
fall for them. You can find online scams everywhere today, from social
media platforms to our private email accounts.
 Mobile Protection: There are just as many threats on the mobile landscape
as there are with computers. With the popularity of smartphones and
tablets on the rise, they are becoming more of a target to cybercriminals.
Since we’re starting to use our smaller devices as we would a desktop or
laptop computer, more of our personal data is stored on these devices and
thieves are taking notice.
CONTINUED
How to secure your internet of things at

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Empfohlen

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Empfohlen (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

How to secure your internet of things at

  • 1. Website: http://www.mobodexter.com Blogs: http://blogs.mobodexter.com
  • 2. Chandramouli is a serial Entrepreneur who has co-founded MoboDexter Group companies & ViewFindAR that does Information Technology products & services in CAMS domain. Prior to starting MoboDexter, Mouli worked as a system software development/test engineer/lead and Manager in product R&D organization in Intel, Hewlett Packard and WIPRO. His experience includes 6 years of software product engineering in product R&D groups as an engineering manager in Intel and HP handling development and test programs. Specialty includes handling programs which involved recruiting and building new teams for handling new SW product R&D functions PMI certified Project Management Professional (PMP) - PMBOK practitioner for the past 3 years and an Agile SCRUM practitioner for 4 years. I have filed 1 US patent and 2 Research publications in SW/FW domains and passionate about technical contributions to the projects and programs Mouli had additional experience of leading large org-wide programs/initiatives on - Quality : Test transformation, Test Automation, orthogonal defect classification (ODC), Static Code analysis, product defect prediction models, Closed Loop Quality System (CLQS) Methodologies: Test driven development; Model based testing methodologies; Retention prediction model; Competency evaluation model adoptions Business : Lean sigma, Outsourcing evaluation & strategy, Business optimization using Moore’s product adoption model, Data center optimization, innovation Chandramouli Srinivasan(Mouli) CEO & President MOBODEXTER INC
  • 3.  The hottest new trend on the Internet isn’t a new social network or app. It’s things. Dubbed “The Internet of Things” it refers to any object you can connect to with the Internet. These “things” include an array of devices and even systems.  The Internet of Things promises to connect more devices than ever before. The Internet of Things can make your home more secure with a security system, but it can also open you up to identity theft and other cybercrimes. Any time you get a new piece of technology on the Internet of Things, you’re taking new chances with your online security. Why You Need to Secure the Internet of Things?
  • 4.  There are a number of ways that criminals can leverage the Internet of Things to infiltrate your home.  Skilled hackers could use your home’s power signature to figure out the best time for a burglary. If your car gets hacked, you could have identity thieves spying on everywhere you go and everything that you do.  Webcams have been hacked on laptops, allowing criminals access to your most intimate moments. Even if there’s no property crimes or violent crimes committed, you don’t want to be violated in this way.
  • 5. Operational aspects of internet of things can be secured using the following techniques  Secure your home wireless network. Remember that almost all of these devices will run off of your wireless network. Hence secure the connection the home router. Use WPA2 type security configuration in the router and make the WPA2 stronger. Using VPN & Encryption are additional layers of security. However, this needs sophisticated knowledge to setup and operate.  Use several emails. If, for example, you have an email for your connected pill bottle, and another for your connected car, you’re not as vulnerable as someone who has all of their information associated with one account linked across several devices. How to Secure Your Home in the Age of the Internet of Things?
  • 6.  Always update the firmware on your connected devices. This is as important as updating the operating system and Internet security suite on your computer and mobile devices. When hackers start to attack the Internet of Things, they’re almost always going to use known exploits to do it, the kind that are patched when firmware updates.  Remember that your main laptop computer is part of your overall connection to the Internet of Things. So make sure to update your operating system and Internet security suite, as well as all the apps on your laptop.
  • 7. In addition to this basics of security needs to be adhered at all times to prevent any hacks into any system that’s connected to internet.  Secure Passwords: The keys to our digital kingdom, passwords should be closely protected. A lot of the times, that’s all a cybercriminal needs to gain access to your account.  Malware: Malware, malware, malware! You hear that term everywhere, however, it can mean so many different things. Malware is more of an umbrella term used for any kind of malicious software on the Internet landscape- from annoying adware to devastating ransomware.  Privacy: If this isn’t an issue for you, it should be. A lot of people take the stance of “I don’t do anything wrong, therefore I have nothing to hide.” however that is largely misinterpreted. You have everything to hide.
  • 8.  Data Breaches: Data breaches are why we should care about our privacy. Scammers and criminals target companies in order to obtain as much data as possible about an individual, which in turn helps them commit identity theft or collect a hefty sum on the black market for the data.  Safe Computing: A lot of the threats today you can combat yourself, just armed with a little bit of knowledge. Internet security software is an essential piece of the cyber security pie, however, it can’t protect you form every single threat out there.  Online Scams: Scammers are the bottom of the barrel of Internet criminals. Online scams take hardly any technical skills to execute, yet so many people fall for them. You can find online scams everywhere today, from social media platforms to our private email accounts.
  • 9.  Mobile Protection: There are just as many threats on the mobile landscape as there are with computers. With the popularity of smartphones and tablets on the rise, they are becoming more of a target to cybercriminals. Since we’re starting to use our smaller devices as we would a desktop or laptop computer, more of our personal data is stored on these devices and thieves are taking notice. CONTINUED