Money Smarts Blog
10 Tips to Securely Configure Your New Devices
Dec 30, 2019 | Dennis Busch
Did you score big with a new phone or computer this holiday season? If so, lucky you! However, as impressive as the latest iPhone or gaming computer might be, ensuring you’re able to properly secure these devices is more important than ever. Any device that connects to the internet is potentially vulnerable and could become compromised.
Here are several tips to keep in mind that can help you securely configure your new devices:
- Adjust default configurations and change default passwords
Passwords are a common form of authentication and are often the only barrier between cyber-criminals and your personal information. Some gadgets are configured with default passwords to simplify setup. But did you know those passwords can easily be found online? To better secure your devices it’s important to change the factory-set default password. Be sure to replace it with a strong and unique password or passphrase for each account.
- Secure your Wi-Fi network with encryption
our home’s wireless router is the primary entrance for cyber-criminals to access your connected devices. To enhance your defenses, use Wi-Fi Protected Access 3 (WPA3). Check your router manual for details on how to do this. WPA3 is currently the strongest form of encryption for Wi-Fi. Other methods are outdated and more vulnerable to exploitation.
- Double Your login protection
Enable multi-factor authentication (MFA) to ensure that only the person who has access to your account is you. If MFA is an option, enable it by using a trusted mobile device such as your smartphone, an authenticator app (like Google Authenticator), or a secure token. For instance, with an iPhone you can utilize your screen lock feature with a pin or password.
- Disable location services and remote connectivity
Location services might allow anyone to see where you are at any given time. Consider disabling this feature when you are not using your device to further secure your private information. Also, most mobile devices are equipped with wireless technologies such as Bluetooth that can be used to connect to other devices or computers. Consider disabling these features when not in use.
- Safeguard against eavesdropping
Disconnect digital assistants, such as your Amazon Alexa, when not in use. Limit conversation near baby monitors, audio recordable toys, and digital assistants. Be sure to cover cameras on toys, laptops, and monitoring devices when they are not in use.
- Don’t broadcast your Wi-Fi network name
To prevent outsiders from easily accessing your network, avoid publicizing your Wi-Fi network name, or service set identifier (SSID). All Wi-Fi routers allow users to disable broadcasting their device’s SSID. Doing so will make it more difficult for attackers to find a network. At the very least, change your SSID to something unique. Check your router manual for details on how to do this. Leaving it as the manufacturer’s default could allow a potential attacker to identify the type of router and possibly exploit any known vulnerabilities.
- Install a network firewall
Install a firewall at the boundary of your home network to defend against external threats. A firewall can block malicious traffic from entering your home network and alert you to potentially dangerous activity. Most wireless routers come with a configurable, built-in network firewall that includes features such as access controls, web-filtering, and denial-of-service (DoS) defense, that you can tailor to fit your needs. Keep in mind that some firewall features, including the firewall itself, may be turned off by default. Ensuring that your firewall is on and all the settings are properly configured will strengthen the security of your network. Please Note: Your internet service provider (ISP) may be able to help you determine whether your firewall has the most appropriate settings for your particular equipment and environment.
- Install firewalls on network devices
In addition to a network firewall, consider installing a firewall on all computers connected to your network. Often referred to as host or software-based, these firewalls inspect and filter a computer’s inbound and outbound network traffic based on a predetermined policy or set of rules. Most modern Windows and Linux operating systems come with a built-in, customizable, and feature-rich firewall. Additionally, most vendors bundle their antivirus software with additional security features such as parental controls, email protection, and malicious website blocking.
- Remove unnecessary services and software & install antivirus software
Disable all unnecessary services to reduce the attack surface of your network and devices, including your router. Unused or unwanted services and software can create security holes on a device’s system, which could lead to more opportunity for your network to be attacked. Additionally, a reputable antivirus software application is an important protective measure against known malicious threats. It can automatically detect, quarantine, and remove various types of malware, such as viruses, worms, and ransomware. Many antivirus solutions are extremely easy to install and intuitive to use, allowing for automatic virus definition updates to ensure maximum protection against the latest threats.
- Update and patch regularly
Manufacturers will issue updates as they discover vulnerabilities in their products. The perfect example being all of the update notifications you receive on your iPhone! Configuring your device to receive automatic updates makes keeping your device up-to-date much easier. However, if you need to manually update your device, make sure you are only applying updates directly from the manufacturer (i.e. Apple), as third-party sites and applications are unreliable and can result in an infected device.