Easy Prey

Securing Your IoT Smarthome with Amanda Fennell


Listen Later

Home technology can be hacked. Anything from a coffee machine or LED light to a TV or a doorbell. We understand the risk of being vulnerable on our tablets and phones, but you’ll be shocked to realize how much data is collected from our other smart devices and how those very same devices can lead to a much wider compromise. Many of us don’t even know how many devices are on our connected networks, so we better listen up.

Today’s guest is Amanda Fennell. Amanda is the Chief Security Officer and Chief Information Officer at Relativity. In her role, she is responsible for championing and directing their tech and security strategies including risk management and compliance practices. She has a Master’s degree in Forensic Science and over 15 years of experience in Forensics and Cyber Security. 

Show Notes:
  • [1:12] - Amanda explains Relativity, her roles in the company, and how she was drawn to this field.
  • [3:35] - Many people assume Amanda has all the new and greatest technology but knowing the risks of exploitation, she is selective.
  • [4:25] - There are a multitude of devices that people don’t even realize they connect to their network.
  • [5:23] - Because of the sheer volume of devices, hackers can do a sweep and use the information gathered.
  • [6:32] - The number one security problem is keeping things up to date.
  • [8:16] - Amanda walks through the simple steps of hacking smart devices.
  • [9:40] - Amanda demonstrates how hacking something seemingly inconsequential can lead to accessing more.
  • [11:23] - You need to know what’s connected to your network. You have more than you think.
  • [12:41] - Surprisingly, there are connected lightbulbs that people sacrifice security for ease of access.
  • [14:02] - When guests come over and you share your password, did you take their access back?
  • [15:15] - Amanda is a big fan of segregating your network. She describes what this means.
  • [16:29] - How can you segregate your network?
  • [18:08] - Amanda suggests using WireShark.
  • [19:39] - Many people hang on and use old routers because they still function, but most are not supported with updates after just a few years.
  • [21:18] - It is also common practice to use identifying information as passwords and device names.
  • [22:33] - Even Direct TV can be hacked. How can this be used against you?
  • [23:30] - Amanda shares an investigation and how she used a printer spool file.
  • [25:06] - Medical devices, printers, and copiers can be hacked.
  • [27:29] - Amanda describes the differences between two security companies and what she advises doing to stay secure.
  • [31:40] - How can you implement ongoing monitoring and detection in your home network?
  • [33:52] - Implement updating devices into your monthly or weekly routine.
  • [36:03] - You can do a scan on your network and even ask a friend for help.
  • [37:28] - Smart coffee and smart fridges seem simple but can be used for targeting phishing and even when you are leaving the house.
  • [39:33] - Just making yourself a little less accessible could deter a hacker because others will be easier.
  • [41:43] - Amanda shares how false donations were used in fraud.
  • [43:25] - We all deserve to have our information private and secure but it also needs to be personally accessible. That’s the risk.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources:
  • Podcast Web Page
  • Facebook Page
  • whatismyipaddress.com
  • Easy Prey on Instagram
  • Easy Prey on Twitter
  • Easy Prey on LinkedIn
  • Easy Prey on YouTube
  • Easy Prey on Pinterest
  • Relativity Website
  • Security Sandbox Podcast
  • Amanda Fennell on Twitter
  • Relativity on Twitter
...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

27 ratings


More shows like Easy Prey

View all
The Joe Rogan Experience by Joe Rogan

The Joe Rogan Experience

225,822 Listeners

The School of Greatness by Lewis Howes

The School of Greatness

21,278 Listeners

The Jordan B. Peterson Podcast by Dr. Jordan B. Peterson

The Jordan B. Peterson Podcast

34,060 Listeners

The Diary Of A CEO with Steven Bartlett by DOAC

The Diary Of A CEO with Steven Bartlett

6,978 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,878 Listeners

Swindled by A Concerned Citizen

Swindled

9,763 Listeners

The Jordan Harbinger Show by Jordan Harbinger

The Jordan Harbinger Show

12,029 Listeners

The Perfect Scam by AARP

The Perfect Scam

1,091 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

Strictly Stalking by PodcastOne

Strictly Stalking

2,519 Listeners

Huberman Lab by Scicomm Media

Huberman Lab

28,304 Listeners

Killer Psyche by Wondery | Treefort Media

Killer Psyche

4,618 Listeners

Betrayal: Season 4 by iHeartPodcasts and Glass Podcasts

Betrayal: Season 4

7,070 Listeners

Scamfluencers by Wondery

Scamfluencers

7,086 Listeners

What Came Next by Broken Cycle Media

What Came Next

625 Listeners