Group 4 Created with Sketch.
Your changes have been saved
Episode 83 of 86

Securing Your IoT Smarthome with Amanda Fennell

Share
station description Identify scams, schemes, and situations (online and offline) to prevent yourself fr... read more
Easy Prey
Duration: 46:13
Home technology can be hacked. Anything from a coffee machine or LED light to a TV or a doorbell. We understand the risk of being vulnerable on our tablets and phones, but you’ll be shocked to realize how much data is collected from our other smart devices and how those very same devices can lead to
Snippets are a new way to share audio!
You can clip a small part of any file to share, add to playlist, and transcribe automatically. Just click the to create your snippet!
Snippets: Clips of Securing Your IoT Smarthome with Amanda Fennell that people like
There are currently no snippets from Securing Your IoT Smarthome with Amanda Fennell.
Snippets are an easy way to highlight your favorite soundbite from any piece of audio and share with friends, or make a trailer for Easy Prey
Playlists that Securing Your IoT Smarthome with Amanda Fennell appears on.
There are currently no playlists containing this audio.
Add this audio track to one of your playlists
Add to Playlist
Up Next
Full Description
Back to Top
Home technology can be hacked. Anything from a coffee machine or LED light to a TV or a doorbell. We understand the risk of being vulnerable on our tablets and phones, but you’ll be shocked to realize how much data is collected from our other smart devices and how those very same devices can lead to a much wider compromise. Many of us don’t even know how many devices are on our connected networks, so we better listen up. Today’s guest is Amanda Fennell. Amanda is the Chief Security Officer and Chief Information Officer at Relativity. In her role, she is responsible for championing and directing their tech and security strategies including risk management and compliance practices. She has a Master’s degree in Forensic Science and over 15 years of experience in Forensics and Cyber Security.  Show Notes: [1:12] - Amanda explains Relativity, her roles in the company, and how she was drawn to this field. [3:35] - Many people assume Amanda has all the new and greatest technology but knowing the risks of exploitation, she is selective. [4:25] - There are a multitude of devices that people don’t even realize they connect to their network. [5:23] - Because of the sheer volume of devices, hackers can do a sweep and use the information gathered. [6:32] - The number one security problem is keeping things up to date. [8:16] - Amanda walks through the simple steps of hacking smart devices. [9:40] - Amanda demonstrates how hacking something seemingly inconsequential can lead to accessing more. [11:23] - You need to know what’s connected to your network. You have more than you think. [12:41] - Surprisingly, there are connected lightbulbs that people sacrifice security for ease of access. [14:02] - When guests come over and you share your password, did you take their access back? [15:15] - Amanda is a big fan of segregating your network. She describes what this means. [16:29] - How can you segregate your network? [18:08] - Amanda suggests using WireShark. [19:39] - Many people hang on and use old routers because they still function, but most are not supported with updates after just a few years. [21:18] - It is also common practice to use identifying information as passwords and device names. [22:33] - Even Direct TV can be hacked. How can this be used against you? [23:30] - Amanda shares an investigation and how she used a printer spool file. [25:06] - Medical devices, printers, and copiers can be hacked. [27:29] - Amanda describes the differences between two security companies and what she advises doing to stay secure. [31:40] - How can you implement ongoing monitoring and detection in your home network? [33:52] - Implement updating devices into your monthly or weekly routine. [36:03] - You can do a scan on your network and even ask a friend for help. [37:28] - Smart coffee and smart fridges seem simple but can be used for targeting phishing and even when you are leaving the house. [39:33] - Just making yourself a little less accessible could deter a hacker because others will be easier. [41:43] - Amanda shares how false donations were used in fraud. [43:25] - We all deserve to have our information private and secure but it also needs to be personally accessible. That’s the risk. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Relativity Website Security Sandbox Podcast Amanda Fennell on Twitter Relativity on Twitter
Up Next
Add to playlist
New playlist

Embed

COPY
Embed Options
Create Playlist
Select the Station you want to upload this audio to
Station
0 / 140
0 / 2000
Playlist Icon Image:
(.jpg, .png, min size 500x500px)
Privacy
Subscribers
Your
voice
matters.
Discover & Listen to the world’s largest free collection of audio
Password reset

Enter your email address that you used to register. We'll send you an email with your username and a link to reset your password.



If you still need help, contact Vurbl Support
Password reset sent

You have been sent instructions on resetting you password to the email associated with your account. Please check your email and signing in again.


Back to Sign In
If you still need help, contact Vurbl Support
Your
voice
matters.
Discover & Listen to the world’s largest free collection of audio
Reset password

Please enter your new password below.



If you still need help, contact Vurbl Support
Your voice matters.
Discover & Listen to the world’s largest free collection of audio
Verify Email

Enter your email address that you used to register. We'll send you an email with a link to verify your email.



Cancel
Delete Profile
Are you sure? We will miss you :'(
Delete
Delete Audio
Are you sure?
Delete
Delete Playlist
Are you sure you want to delete this playlist?
Delete
Notifications
You must be signed in to view
your notifications. Please sign in
Edit Snippet
0 / 140
0 / 140

Tag a Station

Type station name to add additional tags
*Station owners will be notified when you tag them
Open this link in the Vurbl Mobile App for the full Vurbl experience.
Open in Vurbl mobile app
Continue to Vurbl website