Smart Devices & IoT Safety
Understand how smart speakers, cameras, and connected devices collect your data โ and how to use them safely.
Welcome to Week 24!
Welcome to Week 24 of CyberSafe Kids โ the final module of Unit 8! ๐ Over the past few weeks you've explored cybercrime and location safety. Now we're tackling something that surrounds you every day but rarely gets the scrutiny it deserves: the Internet of Things (IoT). Your home is full of devices quietly collecting data, communicating with servers, and potentially exposing your family's network. Let's pull back the curtain. ๐ ๐
What Is the Internet of Things (IoT)?
The Internet of Things refers to the billions of physical devices worldwide that connect to the internet, collecting and sharing data. But IoT goes far beyond phones and computers:
- ๐ Smart speakers โ Amazon Echo (Alexa), Google Nest Hub, Apple HomePod
- ๐ท IP cameras โ Ring, Nest, Wyze, Arlo, baby monitors
- ๐ก๏ธ Smart thermostats โ Nest, Ecobee, Honeywell
- ๐บ Smart TVs โ with built-in microphones, cameras, and ACR (Automatic Content Recognition) that tracks everything you watch
- ๐ฎ Game consoles โ PS5, Xbox Series X, Nintendo Switch โ all with mics, cameras, and persistent online connections
- โ Wearables โ Apple Watch, Fitbit, Oura Ring โ tracking biometric data 24/7
- ๐ถ Baby monitors โ WiFi-connected cameras and audio devices
- ๐ค Robot vacuums โ mapping your home's floor plan and uploading it to company servers
- ๐ก Smart home hubs โ controlling lights, locks, garage doors, and alarms
If it connects to WiFi, Bluetooth, Zigbee, or Z-Wave โ it's part of the IoT ecosystem.
The Scale of Connected Devices
Consider these numbers:
- The average American household now has over 20 connected devices โ some have 40+
- Globally, there are approximately 15 billion IoT devices as of 2025, projected to exceed 30 billion by 2030
- Each device represents a network endpoint โ a potential entry point for attackers
Every one of these devices:
- ๐ถ Shares your home network โ with your personal laptop, phone, and banking devices
- ๐ค Transmits data externally โ to company servers ("the cloud"), often continuously
- ๐ Runs software โ that may contain vulnerabilities, backdoors, or unpatched security flaws
- ๐ธ๏ธ Can be chained โ a compromised smart bulb can become a stepping stone to reach your computer
Your home network is only as secure as its weakest connected device. That cheap smart plug from an unknown brand? It might be the front door hackers walk through.
The Attack Surface of a Modern Home
In cybersecurity, your attack surface is the total number of points where an attacker could try to break in. In a typical connected home:
- Your router has a web interface, potentially with default credentials
- Your smart TV runs apps, has a microphone, and may have known vulnerabilities
- Your Ring doorbell streams video that can be intercepted or accessed via compromised credentials
- Your game console has voice chat, a camera, and a friend list full of strangers
- Your smart thermostat knows when you're home and when you're not
- Your robot vacuum has a detailed map of your home's layout
In 2020, researchers demonstrated they could hack a smart coffee maker to not only steal WiFi credentials but also pivot to other devices on the same network. A coffee maker became the gateway to everything else.
Map Your Attack Surface
Think about your own home. How many connected devices can you identify? For each one, consider: who made it? When was it last updated? Is it still actively supported by the manufacturer? Could you access it remotely โ and if so, could someone else?
The first step to securing your digital home is knowing exactly what's connected. Most people have no idea. ๐บ๏ธ