4 ways to outsmart your smart device

November 18, 2020

Learn how to keep personal (and work) information secure near smart devices.


Think about your home and how many smart devices you have – security cameras, televisions, refrigerators, doorbells, virtual assistants and vacuums that connect to the internet. These are an attractive, easy target for hackers and, if compromised, could record and share sensitive data.

The stakes are higher than ever to secure these devices, especially if you’re now working from home more often due to the pandemic. Whether it’s work or personal data, this presents the potential for sensitive and confidential information to be compromised or stolen.

No matter the smart device or how many you have in your home, it might be worth taking these precautions to keep your information safe.


How to keep sensitive data secure around smart devices

  1. Do not display work or other sensitive information on or near these devices: To keep your data safe, never display sensitive information on or near your smart TV, cover any unused camera, and keep your devices updated with the latest security patches and fixes.  Smart televisions are not designed with security in mind, therefore it is important to be aware of the settings which may allow conversations to be heard. They may have poor security and have the capability to track and listen to conversations from built-in cameras and microphones. Companies often track user preferences and sell your data to advertisers. Under settings, you can disable voice recognition, but you should also be wary of hackers listening and watching you. 
  2. Limit conversations near these devices: If left on throughout the workday, it may be possible that these devices can record your daily conversations and save them, making that information vulnerable to hackers. Be sure to limit conversations near devices when they’re plugged in. When speaking of confidential or sensitive information be sure to step away from smart devices. 
  3. Keep your Wi-Fi network secure: Help prevent your home from being vulnerable to hackers by changing your router’s default password and keeping the firmware updated to eliminate known cybersecurity vulnerabilities. 
  4. Enable two-factor authentication: If available, it is strongly recommended that you enable two-factor authentication (confirming your identity twice) or set up a fingerprint scan.


For more information on protecting yourself from cyberthreats, visit these resources.

Related content

How you can prevent identity theft

Third-party vendor risk: protecting your company against cyber threats

Post-pandemic fraud prevention lessons for local governments

Hospitals face cybersecurity risks in surprising new ways

What you need to know about identity theft

30-day adulting challenge: Financial wellness tasks to complete in a month

Automate accounts payable to optimize revenue and payments

Cybercrisis management: Are you ready to respond?

Webinar: CRE Digital Transformation – Balancing Digitization with cybersecurity risk

Fight the battle against payments fraud

Webinar: Approaching international payment strategies in today’s unpredictable markets.

What is financial fraud?

White Castle optimizes payment transactions

Increase working capital with Commercial Card Optimization

The latest on cybersecurity: Mobile fraud and privacy concerns

Is online banking safe?

The password: Enhancing security and usability

BEC: Recognize a scam

Fraud prevention checklist

4 tips for protecting your business against Coronavirus-related scams

Authenticating cardholder data reduce e-commerce fraud

5 Ways to protect your government agency from payment fraud

The surprising truth about corporate cards

Why Know Your Customer (KYC) — for organizations

Insource or outsource? 10 considerations

Cryptocurrency custody 6 frequently asked questions

Cybersecurity – Protecting client data through industry best practices

5 winning strategies for managing liquidity in volatile times

Learn to spot and protect yourself from common student scams

How-to guide: What to do if your identity is stolen

What is a CLO?

Why a mobile banking app is a ‘must have’ for your next vacation

The future of financial leadership: More strategy, fewer spreadsheets

Proactive ways to fight vendor fraud

How to improve your business network security

How to improve digital payments security for your health system

Understanding and preparing for the new payment experience

How to keep your assets safe

Keep your finances safe and secure: Essential tips for preventing check fraud

Webinar: How to stay safe from cyberfraud

How to avoid student loan scams

Protecting elderly parents’ finances: 6 steps to follow when managing their money

4 ways to outsmart your smart device

How to spot an online scam

Money muling 101: Recognizing and avoiding this increasingly common scam

5 tips for seniors to stay a step ahead of schemers

Recognize. React. Report. Don't fall victim to financial exploitation

Recognize. React. Report. Caregivers can help protect against financial exploitation

8 tips and tricks for creating and remembering your PIN

Webinar: Mobile banking tips for smarter and safer online banking

Start of disclosure content

Loan approval is subject to credit approval and program guidelines. Not all loan programs are available in all states for all loan amounts. Interest rate and program terms are subject to change without notice. Mortgage, home equity and credit products are offered by U.S. Bank National Association. Deposit products are offered by U.S. Bank National Association. Member FDIC.