Internet of Things: how to use smart devices safely

- Background
- 6 May 2021
- Edited 24 March 2025
- 2 min
- Managing and growing
- Secure business, Digitalisation
A printer that orders itself an ink cartridge before it runs out. Or a security camera that you control with an app on your smartphone. These are examples of smart devices with an internet connection. Together, they form the Internet of Things (IoT).
Cyber Magazine SECURE IT!
Cyber magazine SECURE IT! contains tips and information on how to secure your business online.
These internet-connected devices are very handy in your business. But there are security risks. For example, do you use the default password set on your IoT device? Then cybercriminals can easily access your corporate network via that device. Find out how to use IoT devices safely.
What is IoT?
The Internet of Things is a network of smart devices connected to each other via the internet. Your smartphone, for instance, but also devices you might be less likely to expect it from sometimes have an internet connection. Such as alarm systems, printers, and robot hoovers.
Advantages
IoT devices can often be controlled, read, and managed remotely. Think of a coffee machine that alerts you via your smartphone that there is a malfunction. It is also possible to link IoT devices together via the internet so that they can exchange data. Such as a smart thermostat that 'talks' with your boiler. The smart device learns how much heat each space needs and when. This saves you on your energy costs.
Risks of IoT devices
An IoT device is always online. Then it is accessible to users and to other IoT devices. But also to cybercriminals. These search the internet for IoT devices and try to hack them.
Poor security
Smart devices are often poorly secured and thus a wanted target for hackers. Such a cyberattack is more likely to succeed.
Outdated software
IoT devices that do not receive regular software updates are especially vulnerable. Criminals hack these devices through weaknesses in the outdated software.
Misuse of a hacked IoT device
Via a hacked IoT device criminals can gain access to your corporate network. Once inside, they steal your money or data. Or they install malware.
Your hacked IoT device could also unwittingly be part of a botnet. This is a network of hacked computers. Criminals use botnets to spread malware and phishing emails. But also for carrying out DDoS attacks.
Privacy
An IoT device often collects, stores or transmits data. Think of a smart speaker from, say, Google, Amazon or Apple that you talk to. What happens to this information? Where does it go? Who has access to this data? ? If you do not know this, it might be a threat to your privacy.
A hacked IoT device poses additional privacy risk. Suppose a hacked security camera sends all the footage to criminals. This way, they are monitoring everything in and around your business.
Safe use of IoT devices
These tips will help you use IoT devices as safely as possible:
- Decide when and for how long the device should be online. For example, a smart TV does not need to have an active internet connection day and night.
- Keep software up-to-date. Only install official updates from the vendor. Makers and sellers of digital devices must provide updates.
- Always change the default username and password. Apply the rules of a good password policy to your IoT devices as well. Is 2-factor verification (2FA) possible? If so, turn that on.
- Buy IoT devices only from trusted IoT vendors. For example, pay attention to quality marks and reviews, and check whether the supplier is a member of a trade association. Since August 2025, stricter rules apply to the digital security of IoT devices.
- Ask the supplier how the IoT device handles your data. Be critical. Only buy a device whose supplier clearly states what data it collects and stores. If the device also sends the data, check to whom. And whether it does so via a secure connection.
- Create a separate network for your IoT devices. It may not be necessary at all that they are directly connected to your corporate network. This will prevent criminals from accessing your corporate network via a hacked IoT device. Ask your IT administrator or a network specialist how to set this up.
- Remove or replace outdated IoT devices that no longer receive updates from the vendor. Or disconnect them from the internet for good.


