SlideShare a Scribd company logo
Tips
to protect your
Smart Devices
Setting up the router:
When setting up a new router,
it is important to always change
the default password to a
unique, strong password and
enable 2FA, where possible.
Change
router's name
Change your router’s name. If you keep the
router name given by the manufacturer, it
could allow snoopers to identify the make or
model. Instead, give your router a new name.
Instead of having an open hotspot at
home, create a password-protected
guest Wi-Fi network for guests and
unsecured IoT devices.
Use a WPA2 encrypted
Wi-Fi network
IoT Configuration
Assume every IoT device
needs configuring. Leaving
them unconfigured and not
locked down is an opening
for a cyber criminal,
whatever the device.
Know your devices
It’s imperative that you know
which types of devices are
connected to your network
and keep a detailed,
up-to-date inventory of all
connected IoT assets.
Make sure to
update the device
Update the device on first use,
as the firmware and software
may have been updated
between when the device was
made and when you bought it.
Enable auto-update features.
Only use IoT products
from reliable vendors
Verify that a manufacturer
integrates adequate security
measures into their IoT
products and provides ongoing
updates and support.
Check the privacy settings for
your IoT devices
Your IoT devices probably come
with default privacy and security
settings. It’s a good idea to read
through these and change the
settings where appropriate to
ensure they are set to a level you
are comfortable with.
Tips
to protect your
Smart Devices
@Cybermaterial @Cybermat3rial

More Related Content

Similar to Cyber Hygiene: Tips to protect your Smart Devices

Introduction-to-Netgear-WiFi-Extender-EX6100 (1).pdf
Introduction-to-Netgear-WiFi-Extender-EX6100 (1).pdfIntroduction-to-Netgear-WiFi-Extender-EX6100 (1).pdf
Introduction-to-Netgear-WiFi-Extender-EX6100 (1).pdf
Netgear Extender Setup
 
Wireless security
Wireless securityWireless security
Wireless security
Aurobindo Nayak
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FIDO Alliance
 
Databook 2018
Databook 2018Databook 2018
Databook 2018
DrayTek
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
clcewing
 
IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
Guy Vinograd ☁
 
What is the procedure for setting up a wireless network | Unisol
What is the procedure for setting up a wireless network | UnisolWhat is the procedure for setting up a wireless network | Unisol
What is the procedure for setting up a wireless network | Unisol
Unisol Communications Pvt.Ltd.
 
Databook 2018 ver2
Databook 2018 ver2Databook 2018 ver2
Databook 2018 ver2
DrayTek
 
5 steps
5 steps5 steps
5 steps
Rozell Sneede
 
Manual repetidor wi fi
Manual repetidor wi fiManual repetidor wi fi
Manual repetidor wi fi
Patrícia Nascimento
 
How to setup a wireless network router
How to setup a wireless network routerHow to setup a wireless network router
How to setup a wireless network router
Anthonysshareslide
 
Domotics – A Cost Effective Smart Home Automation System Using Wifi as Networ...
Domotics – A Cost Effective Smart Home Automation System Using Wifi as Networ...Domotics – A Cost Effective Smart Home Automation System Using Wifi as Networ...
Domotics – A Cost Effective Smart Home Automation System Using Wifi as Networ...
IJERA Editor
 
What is the procedure for setting up a wireless network | Unisol Communications
What is the procedure for setting up a wireless network | Unisol CommunicationsWhat is the procedure for setting up a wireless network | Unisol Communications
What is the procedure for setting up a wireless network | Unisol Communications
Unisol Communications Pvt.Ltd.
 
WiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless Router
Wispot
 
Wi-Fi
Wi-Fi Wi-Fi
Wi-Fi
sukhdeepK
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
joebursell
 
COT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptxCOT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptx
BILLYSALAMERO2
 
Go Wireless with WicommFi WiFi USB Adapter
Go Wireless with WicommFi WiFi USB AdapterGo Wireless with WicommFi WiFi USB Adapter
Go Wireless with WicommFi WiFi USB Adapter
WicommFi
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
ashubhardwaj03
 
192.168.1.250 Netgear Extender Default IP
192.168.1.250 Netgear Extender Default IP192.168.1.250 Netgear Extender Default IP
192.168.1.250 Netgear Extender Default IP
Nome Sobrenome
 

Similar to Cyber Hygiene: Tips to protect your Smart Devices (20)

Introduction-to-Netgear-WiFi-Extender-EX6100 (1).pdf
Introduction-to-Netgear-WiFi-Extender-EX6100 (1).pdfIntroduction-to-Netgear-WiFi-Extender-EX6100 (1).pdf
Introduction-to-Netgear-WiFi-Extender-EX6100 (1).pdf
 
Wireless security
Wireless securityWireless security
Wireless security
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Databook 2018
Databook 2018Databook 2018
Databook 2018
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
 
What is the procedure for setting up a wireless network | Unisol
What is the procedure for setting up a wireless network | UnisolWhat is the procedure for setting up a wireless network | Unisol
What is the procedure for setting up a wireless network | Unisol
 
Databook 2018 ver2
Databook 2018 ver2Databook 2018 ver2
Databook 2018 ver2
 
5 steps
5 steps5 steps
5 steps
 
Manual repetidor wi fi
Manual repetidor wi fiManual repetidor wi fi
Manual repetidor wi fi
 
How to setup a wireless network router
How to setup a wireless network routerHow to setup a wireless network router
How to setup a wireless network router
 
Domotics – A Cost Effective Smart Home Automation System Using Wifi as Networ...
Domotics – A Cost Effective Smart Home Automation System Using Wifi as Networ...Domotics – A Cost Effective Smart Home Automation System Using Wifi as Networ...
Domotics – A Cost Effective Smart Home Automation System Using Wifi as Networ...
 
What is the procedure for setting up a wireless network | Unisol Communications
What is the procedure for setting up a wireless network | Unisol CommunicationsWhat is the procedure for setting up a wireless network | Unisol Communications
What is the procedure for setting up a wireless network | Unisol Communications
 
WiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless Router
 
Wi-Fi
Wi-Fi Wi-Fi
Wi-Fi
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 
COT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptxCOT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptx
 
Go Wireless with WicommFi WiFi USB Adapter
Go Wireless with WicommFi WiFi USB AdapterGo Wireless with WicommFi WiFi USB Adapter
Go Wireless with WicommFi WiFi USB Adapter
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
192.168.1.250 Netgear Extender Default IP
192.168.1.250 Netgear Extender Default IP192.168.1.250 Netgear Extender Default IP
192.168.1.250 Netgear Extender Default IP
 

More from Cybermaterial

8 tools for malware analysis
8 tools for malware analysis8 tools for malware analysis
8 tools for malware analysis
Cybermaterial
 
How to protect your smartphone from malware
How to protect your smartphone from malwareHow to protect your smartphone from malware
How to protect your smartphone from malware
Cybermaterial
 
How to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on TwitterHow to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on Twitter
Cybermaterial
 
10 Tips To Secure Your Social Media Accounts
10 Tips  To Secure Your Social Media Accounts10 Tips  To Secure Your Social Media Accounts
10 Tips To Secure Your Social Media Accounts
Cybermaterial
 
How To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google AuthenticatorHow To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google Authenticator
Cybermaterial
 
9 steps on how to set up email aliases in Gmail
9 steps on how to set up email aliases in Gmail9 steps on how to set up email aliases in Gmail
9 steps on how to set up email aliases in Gmail
Cybermaterial
 
7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack
Cybermaterial
 
8 steps to assess the security of your email
8 steps to assess  the security of your email 8 steps to assess  the security of your email
8 steps to assess the security of your email
Cybermaterial
 
How to create aliases to protect your real email on Microsoft Outlook
How to create aliases to protect your real email on Microsoft OutlookHow to create aliases to protect your real email on Microsoft Outlook
How to create aliases to protect your real email on Microsoft Outlook
Cybermaterial
 
9 Email Security Tips
9 Email Security Tips9 Email Security Tips
9 Email Security Tips
Cybermaterial
 
How To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPNHow To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPN
Cybermaterial
 
How to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on WindowsHow to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on Windows
Cybermaterial
 
How to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your FamilyHow to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your Family
Cybermaterial
 
CyberTips: Encryption
CyberTips: Encryption CyberTips: Encryption
CyberTips: Encryption
Cybermaterial
 
Cyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCyber Tips for Executives.pdf
Cyber Tips for Executives.pdf
Cybermaterial
 
10 steps to clean up your digital footprint
10 steps to clean up your digital footprint	10 steps to clean up your digital footprint
10 steps to clean up your digital footprint
Cybermaterial
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
Cybermaterial
 
How to file a complaint with the FTC
How to file a complaint with the FTCHow to file a complaint with the FTC
How to file a complaint with the FTC
Cybermaterial
 
Basic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedBasic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hacked
Cybermaterial
 
Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?
Cybermaterial
 

More from Cybermaterial (20)

8 tools for malware analysis
8 tools for malware analysis8 tools for malware analysis
8 tools for malware analysis
 
How to protect your smartphone from malware
How to protect your smartphone from malwareHow to protect your smartphone from malware
How to protect your smartphone from malware
 
How to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on TwitterHow to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on Twitter
 
10 Tips To Secure Your Social Media Accounts
10 Tips  To Secure Your Social Media Accounts10 Tips  To Secure Your Social Media Accounts
10 Tips To Secure Your Social Media Accounts
 
How To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google AuthenticatorHow To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google Authenticator
 
9 steps on how to set up email aliases in Gmail
9 steps on how to set up email aliases in Gmail9 steps on how to set up email aliases in Gmail
9 steps on how to set up email aliases in Gmail
 
7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack
 
8 steps to assess the security of your email
8 steps to assess  the security of your email 8 steps to assess  the security of your email
8 steps to assess the security of your email
 
How to create aliases to protect your real email on Microsoft Outlook
How to create aliases to protect your real email on Microsoft OutlookHow to create aliases to protect your real email on Microsoft Outlook
How to create aliases to protect your real email on Microsoft Outlook
 
9 Email Security Tips
9 Email Security Tips9 Email Security Tips
9 Email Security Tips
 
How To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPNHow To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPN
 
How to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on WindowsHow to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on Windows
 
How to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your FamilyHow to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your Family
 
CyberTips: Encryption
CyberTips: Encryption CyberTips: Encryption
CyberTips: Encryption
 
Cyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCyber Tips for Executives.pdf
Cyber Tips for Executives.pdf
 
10 steps to clean up your digital footprint
10 steps to clean up your digital footprint	10 steps to clean up your digital footprint
10 steps to clean up your digital footprint
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
How to file a complaint with the FTC
How to file a complaint with the FTCHow to file a complaint with the FTC
How to file a complaint with the FTC
 
Basic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedBasic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hacked
 
Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?
 

Recently uploaded

HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 

Recently uploaded (12)

HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 

Cyber Hygiene: Tips to protect your Smart Devices

  • 2. Setting up the router: When setting up a new router, it is important to always change the default password to a unique, strong password and enable 2FA, where possible.
  • 3. Change router's name Change your router’s name. If you keep the router name given by the manufacturer, it could allow snoopers to identify the make or model. Instead, give your router a new name.
  • 4. Instead of having an open hotspot at home, create a password-protected guest Wi-Fi network for guests and unsecured IoT devices. Use a WPA2 encrypted Wi-Fi network
  • 5. IoT Configuration Assume every IoT device needs configuring. Leaving them unconfigured and not locked down is an opening for a cyber criminal, whatever the device.
  • 6. Know your devices It’s imperative that you know which types of devices are connected to your network and keep a detailed, up-to-date inventory of all connected IoT assets.
  • 7. Make sure to update the device Update the device on first use, as the firmware and software may have been updated between when the device was made and when you bought it. Enable auto-update features.
  • 8. Only use IoT products from reliable vendors Verify that a manufacturer integrates adequate security measures into their IoT products and provides ongoing updates and support.
  • 9. Check the privacy settings for your IoT devices Your IoT devices probably come with default privacy and security settings. It’s a good idea to read through these and change the settings where appropriate to ensure they are set to a level you are comfortable with.
  • 10. Tips to protect your Smart Devices @Cybermaterial @Cybermat3rial