Every year, as Christmas approaches, people share joy and laughter with their loved ones, but since the arrival of IoT devices in the lives of digital users, it is not only the family that accompanies them during this festive season but cybercrime as well. Nowadays, it is rare to find a home that is not filled with lights, trees, games and other goodies under the Christmas tree. In our digital world today, the Christmas spirit manifests itself in the most connected way possible.
According to Mordor Intelligence South Africa’s IoT market size is estimated at USD 6.07 billion in 2023 and is expected to reach USD 11.32 billion by 2028, which represents an average growth of 13.28% during the forecast period (2023–2028). As per the GSMA, the number of cellular IoT connections in the South African region will reach 53 million at the end of 2030.
Furthermore, technology analyst firm IDC predicts that by 2025 there will be 41.6 billion connected IoT devices. During Christmas, use of these IoT devices increases, either to decorate homes or as a gift: Christmas lights that turn on from our smartphone, heating that adjusts to our needs, smart trees, connected plugs, gifts such as watches that track heart rate and health, home automation locks, and many more.
Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading global cybersecurity provider, recognizes the great benefits of the IoT: convenient interconnectivity, accessibility for everyone everywhere, and profound technological innovation. However, IoT devices can also pose a risk to the user: personal information is deposited on them, and devices are interconnected with other devices over the network, making user privacy more vulnerable than ever.
“It is imperative that users make sure that all tech gifts this Christmas bring only happiness and do not sneak intruders into their homes. Wrapping devices in layers of security is the key to keeping the connected holiday spirit positive and safe,”
says Pankaj Bhula, EMEA Executive Director: Africa, Check Point Software.
Check Point Software would like to point out some essential measures that will give you stronger protection:
- Use strong passwords: It is increasingly common for Santa to include smart devices in his gift bag, all of which come with default passwords that are easily exploitable by cybercriminals. To improve their security, change the default username and password and replace them with more complex ones. The use of multi-factor authentication (MFA) is recommended to improve security. Avoid reusing passwords across devices.
- Install firewalls and update devices: Gifts received will stay in our homes and the more devices connected to the network, the more vulnerabilities attackers can find to gain access to a user’s home. To prevent this, it will be essential for these IoT devices to have firewalls to protect them and block any information they store. In addition, the software on these devices will need to be regularly updated to prevent cybercriminals from exploiting known vulnerabilities.
- Use a VPN whenever possible: Another important measure to keep these IoT devices safe is to always use a secure connection. VPN (or Virtual Private Network) is a more secure technology that provides users with online privacy and security by encrypting the data transmitted between the device and the server.
- Enable suspicious event notification mechanism: The system can detect and alert unusual patterns of behavior. This prevents attacks and allows for a quicker response to attacks.
- Eliminate unused IoT devices: With new Christmas IoT devices received that are network-connected, it is necessary to review which other devices are used daily and identify those that are obsolete. If there is a device that is not being used, updated, or monitored but is still in the vicinity of other devices, it may pose a risk as it is still connected to the other devices. It is advisable to disconnect it from the network to reduce the chance of access by the cybercriminal.
“Check Point Software has identified the risk that the use of IoT devices can pose to users, as they offer very weak security systems. To maintain an adequate level of security in the home, it is essential that consumers are aware of the risks that these IoT devices pose to their daily lives and, above all, that they acquire the necessary knowledge to protect them and thus avoid any incursion into their privacy as much as possible. The greater the number of devices, the higher the level of protection must be, if we want to be safe from cyber-attacks,”
explains Bhula.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cybersecurity solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th-generation cyberattacks with an industry-leading catch rate of malware, ransomware, and other threats. Infinity comprises four core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacentres, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.