{"id":98734,"date":"2020-02-19T01:00:15","date_gmt":"2020-02-19T09:00:15","guid":{"rendered":"\/blogs\/?p=98734"},"modified":"2025-08-29T01:38:01","modified_gmt":"2025-08-29T08:38:01","slug":"consumers-want-a-fully-connected-life-but-at-what-cost","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/","title":{"rendered":"Consumers want a fully connected life &#8211; but at what cost?"},"content":{"rendered":"<p>Convenience has always, and will always be king. That\u2019s why it\u2019s no surprise that the average person is collecting connected devices left and right and is <a href=\"https:\/\/www.martechadvisor.com\/articles\/iot\/by-2030-each-person-will-own-15-connected-devices-heres-what-that-means-for-your-business-and-content\/\" target=\"_blank\" rel=\"noopener noreferrer\">expected<\/a> to own 15 connected devices by 2030. While they vary from person to person, recent research shows that the most popular connected devices tend to be smart meters, speakers, activity trackers, and TVs. That said, customers are curious and are keen to go even further, adopting the latest and greatest when it comes connectivity. This could mean anything from a connected toaster, washing machine or garage, but for many, the connected car is the ultimate toy.<\/p>\n<p>The consumer appeal behind device adoption is understandable &#8211; they\u2019re entertaining and they make menial, everyday tasks easier to accomplish. A recent <a href=\"https:\/\/www.techuk.org\/insights\/reports\/item\/15638-the-state-of-the-connected-home-report-3-key-findings-2019\" target=\"_blank\" rel=\"noopener noreferrer\">study<\/a> on connected devices by TechUK found that 42% of consumers agree that both qualities are key drivers in their adoption \u2013 a similar finding seen in <a href=\"https:\/\/www.pwc.fr\/fr\/assets\/files\/pdf\/2017\/01\/pwc-consumer-intelligence-series-iot-connected-home.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">North America<\/a> and across <a href=\"https:\/\/www.researchandmarkets.com\/reports\/4763763\/european-smart-home-market-by-product-lighting\" target=\"_blank\" rel=\"noopener noreferrer\">Europe<\/a>. This is a huge shift in sentiment from years before when most consumers considered connected devices to be too complex and costly to be worthy of purchasing.<\/p>\n<h2><strong>More 5G, more problems?\u00a0<\/strong><\/h2>\n<p>As the demand for continuous connectivity grows, 5G will completely reshape the way consumers interact with the world around them. However, with more devices coming into homes, concerns around the way personal data and information is managed, controlled and used by organizations are starting to come into question.<\/p>\n<p>Recent <a href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2019\/trust-opportunity-exploring-consumer-attitudes-to-iot\/\" target=\"_blank\" rel=\"noopener noreferrer\">research<\/a>\u00a0shows that many consumer worries are specifically based on safety and security related to products being unreliable, data breaches, as well as a lack of trust in smart technology manufacturers. In short, this shows worryingly low levels of trust for suppliers and a lack of knowledge about what fail-safes solutions are in place in case of emergency.<\/p>\n<p>These concerns aren\u2019t unwarranted. Over the past few years, consumers have been witness to some of the worst data breaches and cyber-attacks in history, and many have had a front seat to the growing number of IoT attacks taking hold of homes across the globe. These aren\u2019t our parents\u2019 attackers &#8211; today\u2019s cybercriminals are savvy, smart and are fully aware of the lack of adequate security controls on many of these devices, leaving them in a perfect position to cause chaos.<\/p>\n<p>Unfortunately, they\u2019re doing a great job so far. Recent <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/about\/newsroom\/press-releases\/press-release.html?news_id=15ee603f-edbe-4dfb-9242-6bb1f51f8b23\" target=\"_blank\" rel=\"noopener noreferrer\">figures<\/a> show that the total number of IoT malware samples grew 154% over the last year and just recently, <u>McAfee Advanced Threat <\/u><a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/threat-center\/advanced-threat-research.html\" target=\"_blank\" rel=\"noopener noreferrer\">Research<\/a> discovered a vulnerability in the <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/we-be-jammin-bypassing-chamberlain-myq-garage-doors\/\" target=\"_blank\" rel=\"noopener noreferrer\">Chamberlain MyQ Hub<\/a>, a garage door automation platform, as well as an insecure design in the <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/\" target=\"_blank\" rel=\"noopener noreferrer\">McLear NFC Ring<\/a> that could allow an attacker to easily clone the ring and gain entry to a consumer home.<\/p>\n<h2><strong>Next-generation concerns\u00a0\u00a0 <\/strong><strong>\u00a0<\/strong><\/h2>\n<p>There\u2019s no debate that analytics are key to making every day technology smarter, faster and more efficient. They\u2019re integral to the evolution of artificial intelligence (AI), reinforcement learning (RL) and robotic process automation (RPA) as well as cutting-edge consumer technologies like the connected car.<\/p>\n<p>Nearly every modern vehicle uses state-of-the-art sensors that use analytics technologies like AI and ML. These technologies are specifically designed to automate many of the functions that humans would traditionally have done. These can include &#8211; but are not limited to &#8211; rain-sensors on the windshield to control wiper blades and sensors which detect objects to help avoid collisions.<\/p>\n<p>As these technologies are central to the functionality of autonomous vehicles, researching potential weaknesses in the underlying systems has been key. To do this, the McAfee Advanced Threat Research Team (ATR) and the Advanced Analytics Team (AAT) recently came together to study how AI models within autonomous vehicles could be targeted by adversaries &#8211; a process now referred to as \u201cModel Hacking\u201d. To fully understand the potential for threat, the teams focused their efforts on the broadly deployed MobilEye camera system, which is currently used in over 40 million vehicles, including one of the leading connected car manufacturers. Through their <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/model-hacking-adas-to-pave-safer-roads-for-autonomous-vehicles\/\" rel=\"noopener noreferrer\">research<\/a> they successfully created a black-box targeted attack, causing the camera to misclassify a 35 mile-per-hour (mph) speed limit sign as 85 mph. This resulted in the vehicle increasing its speed to 85 mph on its own.<\/p>\n<p>While it\u2019s currently unlikely that this type of attack would be used to do harm, being able to get ahead of the problem and understand where potential risks lie is vital. It is also important that industry leaders work together to shift perception that machine learning and AI systems are automatically secure in order to drive success in autonomous driving. This means opening up the discussion and raising awareness of the problems and pitfalls to steer the direction and development of safer next-generation technologies.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Taking security into their own hands<\/strong><\/h2>\n<p>Despite the valid concerns around safety, security and information management, the rollout of 5G will only continue to encourage the use of smarter and more efficient IoT devices. But how can consumers fully enjoy the benefits of these new technologies when the most malicious actors continue to evolve and exploit the existing &#8211; and arguably &#8211; sometimes lackluster security controls in place? Get in control! Consumers must take a stand to safeguard their homes from within and start asking the question &#8211; is this device secure?<\/p>\n<p>Running point on your online security may seem overwhelming at first, but it\u2019s possible to both reap the benefits of your connected devices while staying safe &#8211; here\u2019s how:<\/p>\n<ul>\n<li><strong>Practice proper online security habits:\u00a0<\/strong>The silver lining of all this security chaos is that there are now countless \u2018best practices\u2019 consumers can quickly adopt. These include implementing a strong password policy, putting IoT devices on their own, separate network, and utilizing a dual-factor authentication when possible.<\/li>\n<li><strong>Do your research:\u00a0<\/strong>Before purchasing a new IoT device, take the time to look into its security features and understand the security risks associated. Ensure you have the industry knowledge to make sure you\u2019re buying the safest tools available on the market.<\/li>\n<li><strong>Buy through trusted advisors.<\/strong>\u00a0Some brands have your best interests in mind and unfortunately, some don\u2019t. Being able to identify which ones do can make the difference between being a victim or not.<\/li>\n<li><strong>Act: <\/strong>While the accuracy and agility of intelligent systems offers convenience, don\u2019t assume any sort of hiccup is just a fluke. If something seems off with the technology, raise the issue to the manufacturer.<\/li>\n<li><strong>Always update: <\/strong>Part of the convenience of connected technologies is they have the ability to update remotely\u2014when one of these such updates is offered by the manufacturer, make sure to take the time to do so as soon as possible.<\/li>\n<\/ul>\n<p>Of course, the onus does not fully fall solely on the consumer. Brands must do their part in ensuring the supply chain is secure and that consumers\u2019 online lives are fully protected from end-to-end. Doing this starts with designing IoT devices with security in mind. IoT manufacturers must embed security into the architecture, interfaces, and designs of their products. They must ensure device identity and authentication are a part of the provision and configuration process and must work with consumers to empower them to apply proper administration and management throughout the lifecycle of their device.<\/p>\n<p>From 5G and autonomous cars to smart cities and AI, the next few years will no doubt be a transformative time for technology. Though for organizations and consumers to get the full benefits from these technologies, the industry must work together to eliminate risks from the inside out. Sharing the responsibility of safety will be a crucial part in tackling the insidious threats facing us today. It will ensure consumers all across the world will be able to stay connected and live an increasingly digital, convenient and efficient life.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Convenience has always, and will always be king. That\u2019s why it\u2019s no surprise that the average person is collecting connected&#8230;<\/p>\n","protected":false},"author":460,"featured_media":97374,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[4060,5933,5116,214],"coauthors":[1359],"class_list":["post-98734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-consumer-threat-notice","tag-iot-security","tag-mcafee-labs","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Consumers want a fully connected life - but at what cost? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Convenience has always, and will always be king. That\u2019s why it\u2019s no surprise that the average person is collecting connected devices left and right and is\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consumers want a fully connected life - but at what cost? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Convenience has always, and will always be king. That\u2019s why it\u2019s no surprise that the average person is collecting connected devices left and right and is\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-19T09:00:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T08:38:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Raj Samani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@raj_samani\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raj Samani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/\"},\"author\":{\"name\":\"Raj Samani\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc\"},\"headline\":\"Consumers want a fully connected life &#8211; but at what cost?\",\"datePublished\":\"2020-02-19T09:00:15+00:00\",\"dateModified\":\"2025-08-29T08:38:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/\"},\"wordCount\":1295,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg\",\"keywords\":[\"Consumer Threat Notice\",\"IoT security\",\"McAfee Labs\",\"mobile security\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/\",\"name\":\"Consumers want a fully connected life - but at what cost? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg\",\"datePublished\":\"2020-02-19T09:00:15+00:00\",\"dateModified\":\"2025-08-29T08:38:01+00:00\",\"description\":\"Convenience has always, and will always be king. That\u2019s why it\u2019s no surprise that the average person is collecting connected devices left and right and is\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg\",\"width\":1920,\"height\":1281,\"caption\":\"Working from home\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Consumers want a fully connected life &#8211; but at what cost?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc\",\"name\":\"Raj Samani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/84322977b2e4d74026259dbee600b443\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png\",\"caption\":\"Raj Samani\"},\"description\":\"Raj Samani is Chief Scientist and Fellow for the Enterprise business. He has assisted multiple law enforcement agencies in cybercrime cases and is a special advisor to the European Cybercrime Centre in The Hague. Samani has been recognized for his contribution to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, and Intel Achievement Award, among others. He is the co-author of the book \\\"Applied Cyber Security and the Smart Grid\\\" and the \\\"CSA Guide to Cloud Computing,\\\" as well as technical editor for numerous other publications.\",\"sameAs\":[\"http:\/\/www.mcafee.com\/\",\"https:\/\/www.linkedin.com\/in\/raj-samani-3697b9\/\",\"https:\/\/x.com\/raj_samani\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/raj-samani\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Consumers want a fully connected life - but at what cost? | McAfee Blog","description":"Convenience has always, and will always be king. That\u2019s why it\u2019s no surprise that the average person is collecting connected devices left and right and is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Consumers want a fully connected life - but at what cost? | McAfee Blog","og_description":"Convenience has always, and will always be king. That\u2019s why it\u2019s no surprise that the average person is collecting connected devices left and right and is","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-02-19T09:00:15+00:00","article_modified_time":"2025-08-29T08:38:01+00:00","og_image":[{"width":1920,"height":1281,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg","type":"image\/jpeg"}],"author":"Raj Samani","twitter_card":"summary_large_image","twitter_creator":"@raj_samani","twitter_site":"@McAfee","twitter_misc":{"Written by":"Raj Samani","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/"},"author":{"name":"Raj Samani","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc"},"headline":"Consumers want a fully connected life &#8211; but at what cost?","datePublished":"2020-02-19T09:00:15+00:00","dateModified":"2025-08-29T08:38:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/"},"wordCount":1295,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg","keywords":["Consumer Threat Notice","IoT security","McAfee Labs","mobile security"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/","name":"Consumers want a fully connected life - but at what cost? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg","datePublished":"2020-02-19T09:00:15+00:00","dateModified":"2025-08-29T08:38:01+00:00","description":"Convenience has always, and will always be king. That\u2019s why it\u2019s no surprise that the average person is collecting connected devices left and right and is","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg","width":1920,"height":1281,"caption":"Working from home"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/consumers-want-a-fully-connected-life-but-at-what-cost\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Consumers want a fully connected life &#8211; but at what cost?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc","name":"Raj Samani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/84322977b2e4d74026259dbee600b443","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png","caption":"Raj Samani"},"description":"Raj Samani is Chief Scientist and Fellow for the Enterprise business. He has assisted multiple law enforcement agencies in cybercrime cases and is a special advisor to the European Cybercrime Centre in The Hague. Samani has been recognized for his contribution to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, and Intel Achievement Award, among others. He is the co-author of the book \"Applied Cyber Security and the Smart Grid\" and the \"CSA Guide to Cloud Computing,\" as well as technical editor for numerous other publications.","sameAs":["http:\/\/www.mcafee.com\/","https:\/\/www.linkedin.com\/in\/raj-samani-3697b9\/","https:\/\/x.com\/raj_samani"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/raj-samani\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/98734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/460"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=98734"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/98734\/revisions"}],"predecessor-version":[{"id":221541,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/98734\/revisions\/221541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/97374"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=98734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=98734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=98734"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=98734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}