{"id":93571,"date":"2019-01-08T06:00:02","date_gmt":"2019-01-08T14:00:02","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=93571"},"modified":"2025-04-24T23:17:22","modified_gmt":"2025-04-25T06:17:22","slug":"how-to-protect-three-common-iot-devices-in-2019","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/","title":{"rendered":"How to Protect Three Common IoT Devices in 2019"},"content":{"rendered":"<p>It\u2019s no secret \u2013\u00a0IoT devices are creeping into every facet of our daily lives. In fact, <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016\" target=\"_blank\" rel=\"noopener\">Gartner<\/a> estimates there will be 20.4 Billion IoT devices by the year 2020. More devices mean greater connectivity and ease of use for their owners, but connectivity also means more opportunities for hacks. With <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/ces-2019-kickoff\/\" target=\"_blank\" rel=\"noopener\">CES 2019<\/a> kicking off this week, we turn our focus toward the year ahead, and take a look at some of the IoT devices that are particularly high-profile targets for cybercriminals: gaming systems, voice tech, routers, and smart cars.<\/p>\n<h2><strong>Routers<\/strong><\/h2>\n<p>Routers are very susceptible to attacks as they often come with factory-set passwords that many owners are unaware of or don\u2019t know how to change, making these devices easy targets for hackers. That\u2019s bad news, since a router is the central hub in a connected home. If a router is compromised and all of the devices share the same Wi-Fi network, then they could potentially all be exposed to an attack. How? When an IoT device talks to its connected router, the device could expose many of its internal mechanisms to the internet. If the device does not require re-authentication, hackers can easily scan for devices that have poorly implemented protocols. Then with that information, cybercriminals can exploit manufacturer missteps to execute their attacks. To help protect your router (and thus all your other devices), a best practice is to consider one with <a href=\"https:\/\/securehomeplatform.mcafee.com\/\" target=\"_blank\" rel=\"noopener\">a layer of protection built-in<\/a>, and be sure to use a long and complex password for your Wi-Fi network.<\/p>\n<h2><strong>Gaming Systems <\/strong><\/h2>\n<p>Over ten years ago, <a href=\"http:\/\/www.upnp-hacks.org\/\" target=\"_blank\" rel=\"noopener\">researchers<\/a> found that many video gaming consoles were being distributed with major security issues involved with the Universal Plug and Play protocol (UPnP), a feature that allows IoT devices on a network to see each other and interact with one another. However, not much has been done to solve the problem. Through exploiting the <a href=\"https:\/\/www.wired.com\/story\/upnp-router-game-console-vulnerabilities-exploited\/\" target=\"_blank\" rel=\"noopener\">UPnP weaknesses<\/a> in gaming systems to reroute traffic over and over again, cybercriminals have been able to create &#8220;multi-purpose proxy botnets,&#8221; which they can use for a variety of purposes.\u00a0 This is just the jumping-off point for malicious behavior by bad actors. With this sort of access into a gaming system, they can execute DDoS attacks, malware distribution, spamming, phishing, account takeovers, click fraud, and credit card theft. Our <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/ces-gaming-survey\/\" target=\"_blank\" rel=\"noopener\">recent gaming survey<\/a> found that 64% of respondents either have or know someone who has been directly affected by a cyberattack, which is an astonishing uptick in attacks on gamers. Considering this shift, follow our tips in the section above for routers and Wi-Fi, never use the same password twice, and be weary of what you click on.<\/p>\n<h2><strong>Voice Tech<\/strong><\/h2>\n<p>In 2018, <a href=\"https:\/\/techcrunch.com\/2018\/03\/07\/47-3-million-u-s-adults-have-access-to-a-smart-speaker-report-says\/\" target=\"_blank\" rel=\"noopener\">47.3 million<\/a> adults had access to smart speakers or voice assistants, making them one of the most popular connected devices for the home. Voice-first devices can be vulnerable largely due to what we enable them to be connected with for convenience; delivery, shopping, and transportation services that leverage our credit cards. While it\u2019s important to note that voice-first devices are most often compromised within the home by people who have regular access to your devices (such as kids) when voice recognition is not properly configured, any digital device can be vulnerable to outside attacks too if proper security is not set up. For example, these always-on, always-listening devices could be infiltrated by cybercriminals through a technique called \u201c<a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/05\/16\/amazon-echo-google-home-voice-squatting-attack-exposes-devices\/#4a8e80157533\" target=\"_blank\" rel=\"noopener\">voice squatting<\/a>.\u201d By creating \u201cmalicious skills,\u201d hackers have been able to trick voice assistants into continuing to listen after a user finishes speaking. In this scenario an unsuspecting person might think they\u2019re connecting to their bank through their voice device, when unbeknownst to them, they\u2019re giving away their personal information.\u00a0 Because voice-controlled devices are frequently distributed without proper security protocol in place, they are the perfect vehicle in terms of executing a cyberattack on an unsuspecting consumer. To protect your voice assistants, make sure your Wi-Fi password is strong, and be on the lookout for suspicious activity on linked accounts.<\/p>\n<p>While you can\u2019t predict the future of IoT attacks, here are some additional tips and best practices on how to stay ahead of hackers trying to ruin your year:<\/p>\n<ul>\n<li><strong>Keep your security software up-to-date. <\/strong>Software and firmware patches are always being released by companies and are made to combat newly discovered vulnerabilities, so be sure to update every time you\u2019re prompted to.<\/li>\n<li><strong>Pay attention to the news.<\/strong> With more and more information coming out around vulnerabilities and flaws, companies are more frequently sending out updates for smart cars and other IoT devices. While these should come to you automatically, be sure to pay attention to what is going on in the space of IoT security.<\/li>\n<li><strong>Change your device\u2019s factory security settings.<\/strong>\u00a0This is the single most important step to take to protect all devices. When it comes to products, many manufacturers aren\u2019t thinking \u201csecurity first.\u201d A device may be vulnerable as soon as opening the box. By changing the factory settings you\u2019re instantly upgrading your device\u2019s security.<\/li>\n<li><strong>Use best practices for linked accounts.<\/strong>\u00a0 For gaming systems and voice-first devices in particular, if you connect a service that leverages a credit card, protect that linked service account with strong passwords and two-factor authentication (2FA) where possible. In addition, pay attention to notification emails, especially those regarding new orders for goods or services. If you notice suspicious activity, act accordingly.<\/li>\n<li><strong>Setup a separate IoT network<\/strong>. Consider setting up a second network for your IoT devices that don\u2019t share access to your other devices and data. Check your router manufacturer\u2019s website to learn how. You might also consider adding in another network for guests and unsecured devices from others. Lastly, consider getting a\u00a0<a href=\"http:\/\/securehomeplatform.mcafee.com\/\" target=\"_blank\" rel=\"noopener\">router with built-in security features<\/a> to make it easier to protect all the devices in your home from one place.<\/li>\n<li><strong>Use a firewall.\u00a0<\/strong>A firewall is a tool that monitors traffic between an Internet connection and devices to detect unusual or suspicious behavior. Even if a device is infected, a firewall can keep a potential attacker from accessing all the other devices on the same network. When looking for a\u00a0<a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/catalog.html\" target=\"_blank\" rel=\"noopener\">comprehensive security solution<\/a>, see if a Firewall is included to ensure that your devices are protected.<\/li>\n<li><strong>Up your gaming security<\/strong>. Just announced at CES 2019, we\u2019re bringing a sense of security to the virtual world of video games. Get in on the action with <a href=\"https:\/\/gameonmcafee.com\/\" target=\"_blank\" rel=\"noopener\">McAfee Gamer Security<\/a>, Beta, it\u2019s free!<\/li>\n<\/ul>\n<p>Interested in learning more about IoT and mobile security trends and information? Follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u201d us on\u00a0<a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s no secret \u2013\u00a0IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will&#8230;<\/p>\n","protected":false},"author":674,"featured_media":93597,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,1838],"tags":[4452,32,4131,5084],"coauthors":[3973],"class_list":["post-93571","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-mobile-security","tag-cybersecurity","tag-data-protection","tag-internet-of-things","tag-iot"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Three Common IoT Devices in 2019<\/title>\n<meta name=\"description\" content=\"It\u2019s no secret \u2013 IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will be 20.4 Billion IoT devices by the year 2020.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Three Common IoT Devices in 2019\" \/>\n<meta property=\"og:description\" content=\"It\u2019s no secret \u2013 IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will be 20.4 Billion IoT devices by the year 2020.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-08T14:00:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T06:17:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter62.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"How to Protect Three Common IoT Devices in 2019\",\"datePublished\":\"2019-01-08T14:00:02+00:00\",\"dateModified\":\"2025-04-25T06:17:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/\"},\"wordCount\":1099,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter62.jpg\",\"keywords\":[\"cybersecurity\",\"data protection\",\"Internet of Things\",\"IoT\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/\",\"name\":\"How to Protect Three Common IoT Devices in 2019\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter62.jpg\",\"datePublished\":\"2019-01-08T14:00:02+00:00\",\"dateModified\":\"2025-04-25T06:17:22+00:00\",\"description\":\"It\u2019s no secret \u2013 IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will be 20.4 Billion IoT devices by the year 2020.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter62.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter62.jpg\",\"width\":1024,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Guides and Tutorials\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Protect Three Common IoT Devices in 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Three Common IoT Devices in 2019","description":"It\u2019s no secret \u2013 IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will be 20.4 Billion IoT devices by the year 2020.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Protect Three Common IoT Devices in 2019","og_description":"It\u2019s no secret \u2013 IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will be 20.4 Billion IoT devices by the year 2020.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-01-08T14:00:02+00:00","article_modified_time":"2025-04-25T06:17:22+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter62.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"How to Protect Three Common IoT Devices in 2019","datePublished":"2019-01-08T14:00:02+00:00","dateModified":"2025-04-25T06:17:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/"},"wordCount":1099,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter62.jpg","keywords":["cybersecurity","data protection","Internet of Things","IoT"],"articleSection":["How To Guides and Tutorials","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/","name":"How to Protect Three Common IoT Devices in 2019","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter62.jpg","datePublished":"2019-01-08T14:00:02+00:00","dateModified":"2025-04-25T06:17:22+00:00","description":"It\u2019s no secret \u2013 IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will be 20.4 Billion IoT devices by the year 2020.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter62.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter62.jpg","width":1024,"height":576},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-protect-three-common-iot-devices-in-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"How To Guides and Tutorials","item":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/"},{"@type":"ListItem","position":3,"name":"How to Protect Three Common IoT Devices in 2019"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=93571"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93571\/revisions"}],"predecessor-version":[{"id":212209,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93571\/revisions\/212209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93597"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=93571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=93571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=93571"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=93571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}