March 15, 2018 By David Bisson 2 min read

Security is the most important consideration for web users in the U.S. when looking to purchase smart home devices, a consumer survey revealed.

According to McAfee’s “New Security Priorities in an Increasingly Connected World,” 36 percent of U.S. internet users said they consider security when shopping for a smart home device, as reported by eMarketer. That’s a higher percentage than those who admitted that they prioritize price (32 percent), ease of use (13 percent) and reviews from other users (8 percent).

Security Priorities Vary by Demographic

Security doesn’t affect all users’ purchasing decisions equally. Broken down by gender, women (38 percent) were more likely than men (33 percent) to consider security when purchasing smart home devices.

Age also plays a role: Users between the ages of 18 and 20 placed the greatest emphasis on security (40 percent), followed by individuals aged 41–50 (38 percent) and those aged 51–55 (37 percent). Consumers between the ages of 21 and 30 are least likely to consider security (34 percent).

Although the majority of users in the U.S. don’t think about security when purchasing smart home devices, they still worry about the security of the devices they do purchase. More than half (63 percent) are concerned about identity theft in the event that someone breaches the connected home’s network.

Even so, 52 percent admitted they don’t know how to secure their smart home apps and devices. As a result, 43 percent of users said they were concerned about their lack of control over companies’ collection and use of their personal information, while just 24 percent said they were confident in their ability to control this data, according to eMarketer.

Protecting Smart Home Devices

Consumers looking to protect their smart home devices from threat actors can reference frameworks such as the Open Web Application Security Project (OWASP)’s “IoT Security Guidance,” which advised users to consider segmenting new IoT devices on a dedicated network.

It also suggested creating strong passwords and enabling two-factor authentication (2FA) on those products. Finally, consumers should avoid entering personal information into IoT devices whenever possible and disable any unused physical ports through each device’s admin interface.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today