Ads 468x60px

Thursday, March 6, 2014

How to Protect Your Home From Smart Lock Hackers

Smart locks let homeowners remotely lock or unlock their doors from their smartphones or computers. This feature can be a highly convenient way to:
  • Let visitors in when you’re not home (think family, house sitters, cleaners, babysitters, etc.).
  • Lock doors that you forgot to secure before leaving.
  • Ensure that you never get locked out again.
But, with anything connected to the Internet, security must be a top priority. CNNMoney recently did a feature on the vulnerabilities present in some home devices—in particular VeraLite’s smart home controls—exposing how hackers may be able to control your locks and change PINs. See below for the piece:
At Vector Security, we are committed to keeping you safe, and offering the best products, services and securities. We work closely with all of our manufacturers to ensure they uphold security and safety standards not just at product rollout, but through the life of the product. The products we install in people’s homes are those we would put in our own homes. To prevent the above (and similar hacks) from happening to you, we worked with our manufacturers to compile the below recommendations.

1. Choose Z-Wave Certified Devices

The lock hack shown in the above CNN video resulted from an exploit of the device’s operating system—specifically, the back door was left open. This is a known hack that the best manufacturers guard against.
To ensure your device’s operating system is intact, double check that it is Z-Wave certified prior to installation. Products with this seal of approval have been rigorously tested for performance and security. Vector Security only recommends vendors who use Z-Wave certified products.
YaleKwikset and Schalage—the largest providers of locks—are all certified. However, be wary of knockoff or uncertified brands. For a list of all certified locks and other smart home products, visit the Z-Wave website.

2. Ensure Safe Network Operations Centers (NOC)

The network operations center manages your interactive service network, and is where your data is stored offsite. Vector Security and ADT Security relies on Alarm.com and Honeywell for NOC management—both of which meet international security standards.
When installing interactive services, ask your provider to verify who operates the NOC and to verify that they are ISO/IEC 27001:2005 accredited. This widely recognized standard is designed to ensure adequate security controls are in place to protect your information. It includes network protection, as well as physical facility and personnel (background checks, access control, etc.) security.

3. Carefully Follow Installation Instructions

Manufacturers also recommend that dealers and customers follow all recommendations and protocols when installing and managing devices and networking components.
As a consumer, select a partner that is committed to your utmost protection. A good indicator is often if they are able to intelligently answer your questions on the above—Z-Wave and NOC certification, and are proactive in addressing secure home networking practices with you.

4. Practice Secure Home Networking

As eluded above, it’s also up to the homeowner to practice safe computing.
Regardless of the device security, an unsecured network will leave you vulnerable to unauthorized use of your Internet connection—making you a potential target for information hacks or cybercrimes. To secure your network, StaySafeOnline.org recommends these five tips:
  1. Give your router a unique name, instead of using the default provided by the manufacturer, so others can’t guess it.
  2. Don’t use the pre-set password, and update your password frequently. Microsoft offers a tool to check the strength of your passwords, but in general, use at least eight characters of varying types (numbers, symbols, etc.), and don’t use the same passwords across applications.
  3. Create a guest password, if you have frequent visitors.
  4. Pick WPA2 (preferred) or WPA router security levels, as they have stronger encryption than WEP. (This article explains the difference in these security settings and their protection strength.) For most routers, simply log in to the settings to update your security mode to the safer options.
  5. Use a firewall, which can help identify and protect you from hacker threats. Most operating systems and security software come with pre-installed firewalls, as long as you turn those features on.
If unsure, ask your provider to help navigate you through the appropriate settings. Also, as learned in the CNNMoney example, it’s a best practice to only open secure emails from people and brands you trust.
What questions and concerns do you have about interactive services? Let us know in the comments; we’d be happy to address them.
Artical Source :vector security.com

Call For free security Review 888-302-1372

Tips to Set Up Your Outside Security Cameras

Before burglars can break into your home, they must first scope out the perimeter and find an optimal point of entry. Outdoor surveillance cameras are a proactive solution to stop an intrusion before it begins.
Outdoor cameras enable you to monitor your property line so that you are always aware of who is on your premises.

1. Strategically Place Cameras

Walk the perimeter of your home and take note of high interest areas. This may include those that are heavily trafficked, contain shrubbery/trees or are points of entry.
Look to install cameras on your home’s exterior that keep them covert but also allow for a wide coverage angle. Tuck your cameras away near doorways, pathways, garages and basement windows. These areas are ideal because they allow you to see who is entering and exiting you home, while also providing a full view of your property.
Best vendors will consult you on optimal spots for cameras to be placed based on your unique home layout.

2. Consider Wiring

Always consider how your wiring will run through the house.
Often times, you want your wires to enter the house right from the base of the camera, rather than running along the exterior of your home. This limits the possibility of an intruder cutting the wires and cords.
In addition, you have the option to either go wireless or hardwired. Remember though, that even if you decide upon a wireless system, you will still need a wire running from your camera to the electrical power source.
Like camera placement, trained professionals can assist you with this process and provide recommendations on optimal placement.

3. Pair Cameras with Lighting

Unless you install a night-vision capable system, cameras are fairly useless in the dark. Pair your system with optimized outdoor lighting to increase your safety and maximize your camera’s potential.
We recommend motion detection lights that only activate if a sensor is triggered. This technology pairs perfectly with your outdoor video surveillance system. Motion lights let you easily scan through your archived video feeds to see only when the lights were turned on—meaning someone or something entered your property.
Outdoor security cameras extend the reach of your security system and provide a more proactive approach to your home security.
Have you considered installing outdoor surveillance cameras? What have been your experiences?
Artical Source" vector security

Call Us Free Home Security Review 888-302-1372

Related Posts Plugin for WordPress, Blogger...