Easy Prey

Securing Your IoT Smarthome with Amanda Fennell


Listen Later

Home technology can be hacked. Anything from a coffee machine or LED light to a TV or a doorbell. We understand the risk of being vulnerable on our tablets and phones, but you’ll be shocked to realize how much data is collected from our other smart devices and how those very same devices can lead to a much wider compromise. Many of us don’t even know how many devices are on our connected networks, so we better listen up.

Today’s guest is Amanda Fennell. Amanda is the Chief Security Officer and Chief Information Officer at Relativity. In her role, she is responsible for championing and directing their tech and security strategies including risk management and compliance practices. She has a Master’s degree in Forensic Science and over 15 years of experience in Forensics and Cyber Security. 

Show Notes:
  • [1:12] - Amanda explains Relativity, her roles in the company, and how she was drawn to this field.
  • [3:35] - Many people assume Amanda has all the new and greatest technology but knowing the risks of exploitation, she is selective.
  • [4:25] - There are a multitude of devices that people don’t even realize they connect to their network.
  • [5:23] - Because of the sheer volume of devices, hackers can do a sweep and use the information gathered.
  • [6:32] - The number one security problem is keeping things up to date.
  • [8:16] - Amanda walks through the simple steps of hacking smart devices.
  • [9:40] - Amanda demonstrates how hacking something seemingly inconsequential can lead to accessing more.
  • [11:23] - You need to know what’s connected to your network. You have more than you think.
  • [12:41] - Surprisingly, there are connected lightbulbs that people sacrifice security for ease of access.
  • [14:02] - When guests come over and you share your password, did you take their access back?
  • [15:15] - Amanda is a big fan of segregating your network. She describes what this means.
  • [16:29] - How can you segregate your network?
  • [18:08] - Amanda suggests using WireShark.
  • [19:39] - Many people hang on and use old routers because they still function, but most are not supported with updates after just a few years.
  • [21:18] - It is also common practice to use identifying information as passwords and device names.
  • [22:33] - Even Direct TV can be hacked. How can this be used against you?
  • [23:30] - Amanda shares an investigation and how she used a printer spool file.
  • [25:06] - Medical devices, printers, and copiers can be hacked.
  • [27:29] - Amanda describes the differences between two security companies and what she advises doing to stay secure.
  • [31:40] - How can you implement ongoing monitoring and detection in your home network?
  • [33:52] - Implement updating devices into your monthly or weekly routine.
  • [36:03] - You can do a scan on your network and even ask a friend for help.
  • [37:28] - Smart coffee and smart fridges seem simple but can be used for targeting phishing and even when you are leaving the house.
  • [39:33] - Just making yourself a little less accessible could deter a hacker because others will be easier.
  • [41:43] - Amanda shares how false donations were used in fraud.
  • [43:25] - We all deserve to have our information private and secure but it also needs to be personally accessible. That’s the risk.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources:
  • Podcast Web Page
  • Facebook Page
  • whatismyipaddress.com
  • Easy Prey on Instagram
  • Easy Prey on Twitter
  • Easy Prey on LinkedIn
  • Easy Prey on YouTube
  • Easy Prey on Pinterest
  • Relativity Website
  • Security Sandbox Podcast
  • Amanda Fennell on Twitter
  • Relativity on Twitter
...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

27 ratings


More shows like Easy Prey

View all
The Art of Manliness by The Art of Manliness

The Art of Manliness

14,229 Listeners

Hacked by Hacked

Hacked

175 Listeners

Malicious Life by Malicious Life

Malicious Life

923 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,841 Listeners

The Jordan Harbinger Show by Jordan Harbinger

The Jordan Harbinger Show

12,001 Listeners

The Perfect Scam by AARP

The Perfect Scam

1,070 Listeners

Hacking Humans by N2K Networks

Hacking Humans

309 Listeners

People Who Read People: A Behavior and Psychology Podcast by Zachary Elwood

People Who Read People: A Behavior and Psychology Podcast

230 Listeners

The Dr. Phil Podcast by Dr. Phil McGraw

The Dr. Phil Podcast

13,810 Listeners

Creating Confidence with Heather Monahan by Heather Monahan | YAP Media

Creating Confidence with Heather Monahan

1,186 Listeners

Huberman Lab by Scicomm Media

Huberman Lab

28,293 Listeners

What the Hack with Adam Levin by Loud Tree Media

What the Hack with Adam Levin

213 Listeners

Navigating Narcissism with Dr. Ramani by iHeartPodcasts

Navigating Narcissism with Dr. Ramani

1,723 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

159 Listeners

Tetragrammaton with Rick Rubin by Rick Rubin

Tetragrammaton with Rick Rubin

967 Listeners