You are currently viewing Why Cody Needs to Use a Guest Network for Security Cameras
Credit: Tripwire

Why Cody Needs to Use a Guest Network for Security Cameras

Recently my buddy Cody asked for recommendations for a security camera system for his PITA neighbor. There were many suggestions, from individuals that offer services to Lorex, Wyze, Reolink, and many more. My advice was no matter what camera system you choose, put it on the Guest Network.

Alex had a great joke that this is a way for guests to see your stuff, but there is a very serious reason for my suggestion. The best way to ensure that the Internet of Things (IoT) devices are never used as a launch pad into your network is to keep them away from your home computers.

Vigilance is required when implementing IoT devices in your home or workplace. Hackers will exploit any weakness they can detect and with the IoT becoming more prevalent, new holes are being created in your home or work networks.

The worldwide number of IoT-connected devices is projected to increase to 43 billion by 2023, Home monitoring systems and items connected to the Internet has risen considerably with consumers recently. Smart bulbs, smart thermostats, smart locks, smart doorbells, smart cams, smart smoke detectors, smart flood sensors, smart vacuums, smart window shades, smart ovens, smart blenders, smart toasters, smart mixing bowls, smart fryers, smart coffee makers, and smart ice makers will all need to be updated. These are no longer simple electronics, they are all tiny little computers with Internet connectivity that will require updates to address security flaws as they are discovered.

It is hard enough keeping up with your desktop, laptop and mobile device. When will you make time to update all the Internet-connected devices in the house to make sure that no one has an open door to your personal information? While it has gotten a bit easier for people to keep computer systems and mobile devices updated, it is much more difficult to monitor these newly connected IoT items.

A smart toaster for example should never be put onto the same network where you do your banking and store family photos. There are many simple solutions to segment these devices from your network. Before you start plugging in devices with abandon, create a plan that separates the traffic, and make sure you stick with it!

The easiest way to protect your data is to segregate your network. Use the guest wireless option on your wireless access point for your IoT devices, and use the primary wireless network for computers, laptops and mobile devices. This will segregate your IoT devices from your network and restrict your IoT devices from being used as a launch pad to probe or attack machines on your network.

When segregating the network, make sure you require the use of a separate set of passwords.

Please note that some wireless access points do not support the capability to deploy more than one network, though this shouldn’t be problem in business-grade Wi-Fi systems. If you don’t have the capabilities to deploy two networks, and don’t want to interrupt your current infrastructure with the replacement of equipment, consider deploying a new network for your IoT devices. This isn’t the cheapest option, but it makes it almost impossible for a device from being used as a launch pad into your network. By adding a couple access points with their own physical wiring directly to your outside Internet connection, your IoT devices are then entirely segregated from your network.

This is not meant to scare you into not using Smart devices.  I just suggest that you think about the implications of what is being plugged into your network before blindly installing these IoT devices that are flooding the market.

So, get that security system Cody to give you the proof you need to keep your family safe. Just make to keep your data safe at the same time.

If you would like help reviewing your plans for IoT deployment, call Advanced Systems Solutions Inc. and we will help you to ensure that you install devices in the safest manner possible. 

Disclaimer: The above information is not intended as technical advice. Additional facts or future developments may affect subjects contained herein. Seek the advice of an IT Professional before acting or relying upon any information in this communiqué.