March 15, 2018 By David Bisson 2 min read

Security is the most important consideration for web users in the U.S. when looking to purchase smart home devices, a consumer survey revealed.

According to McAfee’s “New Security Priorities in an Increasingly Connected World,” 36 percent of U.S. internet users said they consider security when shopping for a smart home device, as reported by eMarketer. That’s a higher percentage than those who admitted that they prioritize price (32 percent), ease of use (13 percent) and reviews from other users (8 percent).

Security Priorities Vary by Demographic

Security doesn’t affect all users’ purchasing decisions equally. Broken down by gender, women (38 percent) were more likely than men (33 percent) to consider security when purchasing smart home devices.

Age also plays a role: Users between the ages of 18 and 20 placed the greatest emphasis on security (40 percent), followed by individuals aged 41–50 (38 percent) and those aged 51–55 (37 percent). Consumers between the ages of 21 and 30 are least likely to consider security (34 percent).

Although the majority of users in the U.S. don’t think about security when purchasing smart home devices, they still worry about the security of the devices they do purchase. More than half (63 percent) are concerned about identity theft in the event that someone breaches the connected home’s network.

Even so, 52 percent admitted they don’t know how to secure their smart home apps and devices. As a result, 43 percent of users said they were concerned about their lack of control over companies’ collection and use of their personal information, while just 24 percent said they were confident in their ability to control this data, according to eMarketer.

Protecting Smart Home Devices

Consumers looking to protect their smart home devices from threat actors can reference frameworks such as the Open Web Application Security Project (OWASP)’s “IoT Security Guidance,” which advised users to consider segmenting new IoT devices on a dedicated network.

It also suggested creating strong passwords and enabling two-factor authentication (2FA) on those products. Finally, consumers should avoid entering personal information into IoT devices whenever possible and disable any unused physical ports through each device’s admin interface.

More from

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today