
Sign up to save your podcasts
Or


Your house didn't suddenly become unsafe. It just became chatty. Little devices, quietly talking to the internet, all day, all night. Most of them were never meant to be guarded.
This episode explains IoT security by starting with a translation: if a device needs an app to work and Wi-Fi to exist, it's a computer with software, memory, and network access, and computers inherit risk. It covers why manufacturers optimize for convenience over long-term protection, how most IoT compromises happen through automated scanning rather than targeted attacks, and why devices outlive the software inside them. The episode walks through the three things that happen when a device is compromised, becoming part of a botnet, serving as a network foothold, or leaking metadata, then closes with a seven-step starter kit covering device inventory, firmware updates, default credential changes, network separation, disabling unnecessary features, monitoring connected devices, and buying intentionally.
Whether you've got a house full of smart devices or you're just starting to wonder what your thermostat is doing on the network at 3 a.m., Plaintext with Rich sorts it out.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene
By Rich GreeneYour house didn't suddenly become unsafe. It just became chatty. Little devices, quietly talking to the internet, all day, all night. Most of them were never meant to be guarded.
This episode explains IoT security by starting with a translation: if a device needs an app to work and Wi-Fi to exist, it's a computer with software, memory, and network access, and computers inherit risk. It covers why manufacturers optimize for convenience over long-term protection, how most IoT compromises happen through automated scanning rather than targeted attacks, and why devices outlive the software inside them. The episode walks through the three things that happen when a device is compromised, becoming part of a botnet, serving as a network foothold, or leaking metadata, then closes with a seven-step starter kit covering device inventory, firmware updates, default credential changes, network separation, disabling unnecessary features, monitoring connected devices, and buying intentionally.
Whether you've got a house full of smart devices or you're just starting to wonder what your thermostat is doing on the network at 3 a.m., Plaintext with Rich sorts it out.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene