{"id":36423,"date":"2022-04-06T17:56:59","date_gmt":"2022-04-06T17:56:59","guid":{"rendered":"https:\/\/www.vmengine.net\/2022\/04\/06\/when-a-smart-home-is-not-only-smart-but-also-secure\/"},"modified":"2025-05-23T17:33:13","modified_gmt":"2025-05-23T17:33:13","slug":"when-a-smart-home-is-not-only-smart-but-also-secure","status":"publish","type":"post","link":"http:\/\/temp_new.vmenginelab.com\/en\/2022\/04\/06\/when-a-smart-home-is-not-only-smart-but-also-secure\/","title":{"rendered":"When a smart home is not only smart but also secure"},"content":{"rendered":"<div class=\"et_pb_section et_pb_section_387 et_section_regular\" >\n<div class=\"et_pb_row et_pb_row_485\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_491  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_1729  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>In winter turn on the heating of your home while you are in the office, in summer the air conditioning. What luxury and what comfort. Smoke detectors, for example, can connect to generate, collect and analyze data and monitor the environment in order to improve the effectiveness of the service. Yet even in these seemingly innocuous systems, dangers could lurk. The sensors and integrated, connected devices that make up the <strong>Internet of Things<\/strong> (<strong>IoT<\/strong>) contain software that provides these systems with their &#8220;<strong>intelligence<\/strong>.&#8221;<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1730  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Software contains<strong> millions of lines of code<\/strong> , and these, in turn, <strong>inevitably contain errors<\/strong>. In the world of cybersecurity, errors are called vulnerabilities, and they can be the equivalent of a window left open for cybercriminals to access.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_392 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2021\/10\/28\/single-point-of-failure-nel-cloud-computing\/\" target=\"_blank\">Single Point of Failure in Cloud Computing<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1731  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\"><H2>  What are the risks?  <\/p>\n<h2><\/h2>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_sidebar_2 et_pb_widget_area clearfix et_pb_widget_area_left et_pb_bg_layout_light\"><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_454\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2022\/04\/error-2.jpg\" alt=\"\" title=\"error\"  sizes=\"(max-width: 740px) 100vw, 740px\" class=\"wp-image-34785\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_cta_393 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2021\/05\/24\/disaster-recovery-quanto-vale-un-piano-di-emergenza\/\" target=\"_blank\">Disaster Recovery. How much is a &quot;contingency&quot; plan worth?<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1732  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Computer analysts say smart <strong>home devices are an easy target for hackers<\/strong>. The reason? These are the computer systems that are periodically the least up-to-date after installation and testing. The<strong> risk<\/strong> is really real because while everyone knows and verifies the automatic updates of the computer and the presence of the active and updated antivirus, how many instead worry about checking how long it has been since the <strong>home automation control unit<\/strong> updates its <strong>application system<\/strong>? And the dream of the <strong>smart home<\/strong>, <strong>interconnected<\/strong>, <strong>monitorable<\/strong> and <strong>manageable remotely<\/strong> could turn into a nightmare: strangers could control it, <strong>raiding personal data<\/strong>,<strong> images<\/strong>, <strong>videos<\/strong>, <strong>audio<\/strong> and <strong>sensitive information<\/strong> with a consequent greater exposure to intrusions and thefts, both physical and identity.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1733  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>And therein <strong>lies the paradox<\/strong>: the hundreds of IoT devices introduced to make a building more secure can create <strong>open gateways<\/strong> to allow hackers to access not only the device with the <strong>vulnerability,<\/strong> but the entire IT network to which the device is connected.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_455\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2022\/04\/Phishing-illustration-1-unscreen-2.gif\" alt=\"\" title=\"Phishing-illustration-1-unscreen\" class=\"wp-image-34791\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1734  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>Cybersecurity<\/strong> is concerned with preventing unauthorized access to a building or a company&#8217;s network and data. And many physical security systems now include numerous connected devices with remote access from the cloud, much like an IT architecture.<br \/>These systems are indispensable for Internet-connected technology. However, when you consider the fact that<strong> many features in smart buildings<\/strong> still contain<strong> critical flaws<\/strong> and neglect best practices, from a security perspective many smart systems are far from smart.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1735  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>One of the first reports on <strong>smart home security<\/strong>, compiled by a company specializing in<strong> cybersecurity<\/strong>, showed worrying data, to say the least. During the research, <strong>16 devices were tested<\/strong> (including security cameras, smart thermostats that can be activated by smartphones, smoke detectors and control units for home control) and only <strong>1 passed the security tests with flying colors<\/strong>, all the others were rejected.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_394 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2022\/02\/28\/data-protection-leuropa-approva-il-codice-di-condotta-sui-servizi-cloud\/\" target=\"_blank\">Data Protection, Europe approves Code of Conduct on Cloud Services<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1736  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>What if we told you that <strong>there is a solution and it has to do with the Cloud<\/strong>? IoT technologies combined with Cloud infrastructures are able to enable new interactions between humans and devices. In addition, the <strong>Cloud relieves the user from configuration<\/strong>, <strong>deployment<\/strong>, <strong>management<\/strong>, <strong>performance<\/strong> and <strong>updates<\/strong> issues that would otherwise have to be solved through advanced knowledge of software and very powerful infrastructures.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1737  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>The cloud is also a <strong>secure architecture<\/strong>, capable of managing the phases of storage, archiving, processing and access to data in complete security: a security that starts from the<strong> single device<\/strong> and extends to <strong>the entire data life cycle<\/strong> with <strong>authentication, encryption, firmware <\/strong>and<strong> hardware<\/strong> update features.<\/p>\n<\/div><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Zero risk for super-hi-tech apartments and state-of-the-art commercial buildings that are increasingly connected<\/p>\n","protected":false},"author":6,"featured_media":34783,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,3574,2297],"tags":[4116,4285,4825,4225,4394,4826],"class_list":["post-36423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-in-evidence","category-news-en","tag-aws-iot-en","tag-cybersecurity-en","tag-iot-en","tag-iot-innovation","tag-safety","tag-smarthome-en"],"aioseo_notices":[],"jetpack_featured_media_url":"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2022\/04\/SaveElectricBill-Automated-House-1.gif","amp_enabled":true,"_links":{"self":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/comments?post=36423"}],"version-history":[{"count":1,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36423\/revisions"}],"predecessor-version":[{"id":41709,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36423\/revisions\/41709"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media\/34783"}],"wp:attachment":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media?parent=36423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/categories?post=36423"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/tags?post=36423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}