<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.zwirentitle.com/blogs/tag/smart-devices/feed" rel="self" type="application/rss+xml"/><title>Zwiren Title Agency, Inc - ZTA Blog #smart devices</title><description>Zwiren Title Agency, Inc - ZTA Blog #smart devices</description><link>https://www.zwirentitle.com/blogs/tag/smart-devices</link><lastBuildDate>Fri, 03 Apr 2026 10:48:32 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Augmented Reality]]></title><link>https://www.zwirentitle.com/blogs/post/augmented-reality</link><description><![CDATA[Augmented Reality (AR) is a technology that has gained immense popularity in recent years, offering a revolutionary way to seamlessly integrate digital information into the real world. AR technology superimposes digital information, such as images, videos, 3D models, or sound, on to the real world.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_yCsg76EjT5i-GqPu5UN2pQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-96rdWQURnKFd57UaqLvSg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_CbZKvHq8RBWgK-yfElhKDw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9jrtIqFZT-G9oO6LroharA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9jrtIqFZT-G9oO6LroharA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:30pt;">Augmented Reality</span></b></p><span style="font-size:20pt;">Transforming Our World with Digital Magic</span></div></h2></div>
<div data-element-id="elm_ui3CrxgXRFG6J318ytO2DQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ui3CrxgXRFG6J318ytO2DQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Augmented Reality (AR) is a technology that has gained immense popularity in recent years, offering a revolutionary way to seamlessly integrate digital information into the real world. AR technology superimposes digital information, such as images, videos, 3D models, or sound, on to the real world. Unlike Virtual Reality (VR), which immerses users in a completely digital environment, AR enhances the physical world by adding digital elements. This overlay can be achieved through various devices, such as smartphones, tablets, smart glasses, and headsets. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">You may be familiar with AR if you have recently purchased or looked at furniture online. Many retail websites/mobile apps offer Augmented Reality to show how a piece of furniture will look in the user’s living spaces – and all users need is their smartphone camera! Alternatively, you may have utilized AR if you have ever used social media to overlay filters, effects and interactive elements onto your photos or videos!</span></p><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">How Does AR Work?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">AR relies on a combination of hardware and software to function. The hardware includes cameras, sensors, and displays on devices such as smartphones, tablets, headsets or AR glasses. These devices capture the real-world environment, process the data, and then display digital content on the user's screen in real-time. Software plays a crucial role in recognizing the environment, tracking objects, and aligning digital content with the physical world.&nbsp;AR applications and platforms enable the creation and deployment of augmented reality experiences. These applications use computer vision algorithms to recognize and track real-world objects, allowing digital content to interact seamlessly with the environment.</span></p><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Impact on Industries</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">Augmented Reality is reshaping industries by improving efficiency, enhancing user experiences, and creating new opportunities for innovation. The potential for AR's impact is vast, and it continues to evolve and expand its reach. The following are examples of how AR can be and is already being used in different industries:</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Real Estate</span></b><span style="font-size:12pt;">: AR can potentially change the way that homes are previewed. Rather than using VR to tour a property on the computer from the comfort of your home, AR can create a new type of virtual experience for buyers when visiting a property. Potential buyers would be able to use their smart phone to scan a room in the house and with the help of AR, detect the objects and furniture in the room or obtain the room’s dimensions. Then, while standing in the room, they would be able to rearrange the furniture in the room, remove objects, or even replace objects with their own choice of furniture and décor. Such an experience can give potential buyers an idea of what the house could look like if they were to buy it. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Retail: </span></b><span style="font-size:12pt;">In the retail sector, AR is utilized for virtual try-on experiences or product visualizations, allowing customers to preview products before making a purchase. AR can also be used for interactive product demonstrations and in-store navigation. The Target App has a feature called “See it in Your Space” allows customers to digitally view how objects would appear in their home and the Walmart App lets you virtually try on certain clothing items to give users and idea of how the item will fit.&nbsp; Additionally, Treasury Wine Estates, the vineyard behind 19 Crimes wines have implemented AR into their Wine Labels. By downloading their app and scanning the wine bottle’s label, the face on the label comes to life, confessing their crime. The possibilities for AR in Retail are endless. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Healthcare</span></b><span style="font-size:12pt;">: AR has transformative applications in healthcare, from surgical training simulations to real-time augmented imaging during medical procedures. It enhances precision and improves patient outcomes, oftentimes with less invasive procedures. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Gaming and Entertainment</span></b><span style="font-size:12pt;">: AR gaming apps such as Pokémon GO have brought AR to the mainstream, allowing users to hunt virtual creatures in real world locations using their smartphones. Additionally, apps such as Snapchat and Instagram use AR to overlay filters, masks, or little dancing Bitmoji's over the user’s images. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Education</span></b><span style="font-size:12pt;">: AR is used in educational settings to enhance learning experiences. For example, students can use AR apps to explore anatomy in 3D, bring historical events to life through interactive AR simulations, or explore virtual reconstructions of ancient civilizations.</span></p></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Challenges and Future Outlook</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">Despite its promising potential, AR faces challenges such as privacy concerns, technological limitations, and the need for widespread adoption. However, ongoing advancements in hardware, software, and increased investment suggest a bright future for augmented reality in various fields. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">In summary, augmented reality represents a groundbreaking technology that blurs the lines between the digital and physical realms. Its applications span various fields, and its impact on industries is profound. As AR continues to evolve, its applications across diverse industries are poised to transform the way we learn, work, and interact with the world around us.</span></p></div></div>
</div><div data-element-id="elm_m1KaJbk5DJDBzS2NM8K4Qg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_m1KaJbk5DJDBzS2NM8K4Qg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-size:10px;">References:&nbsp;</span></p><span style="font-size:10px;"><span></span><p><span style="color:inherit;">Gillis, Alexander S. (2022, Nov). Augmented Reality.&nbsp;</span><i style="color:inherit;">TechTarget: WhatIs.com.&nbsp;</i><span style="color:inherit;">Retrieved from https://www.techtarget.com/whatis/definition/</span><span style="color:inherit;">augmented-reality-AR. Nov 2023</span></p><p><span style="color:inherit;"><br></span></p><span></span><p><span>High, Spencer (2022, Nov 12). Augmented Reality and Generative AI Could Transform Future of Real Estate Marketing. <i>National Association of Realtors:&nbsp;</i></span><i style="color:inherit;"><span>Newsroom.</span></i><span style="color:inherit;"> Retrieved from https://www.nar.realtor/newsroom/augmented-reality-and-generative-ai-could-transform-future-of-real-estate-marketing. Nov 2023.</span></p><p><span style="color:inherit;"><br></span></p><span></span><p><span>The Fu Foundation School of Engineering and Applied Science (n.d.). Augmented Reality Examples: Use Augmented Reality Marketing in Your Business.&nbsp;</span><i style="color:inherit;"><span>Columbia Engineering; The Fu Foundation School of Engineering and Applied Science. </span></i><span style="color:inherit;">Retrieved from https://bootcamp.cvn.columbia.</span><span style="color:inherit;">ed u/blog/augmented-reality-examples/. Nov 2023.</span></p></span></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 29 Dec 2023 12:07:00 -0500</pubDate></item><item><title><![CDATA[Unlocking the Power of QR Codes]]></title><link>https://www.zwirentitle.com/blogs/post/Unlocking-the-Power-of-QR-Codes</link><description><![CDATA[QR Codes, short for "Quick Response code", have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format...]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_SdX__yuSTUyJWTwNXBxbXw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WcqX3vwvR4iEwR6LvEpH-A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_D30ewmUqQ_6_x3121CL9UA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_D30ewmUqQ_6_x3121CL9UA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mhCFyBHvScammPdVK7hvfw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mhCFyBHvScammPdVK7hvfw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:30pt;">Unlocking the Power of QR Codes:</span></b></span><br><span style="font-size:30pt;color:inherit;">​</span><b><span style="font-size:20pt;">A Comprehensive Guide</span></b><br></h2></div>
<div data-element-id="elm_7ybm0empQvaij_ublEU-gQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7ybm0empQvaij_ublEU-gQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">QR Codes, short for &quot;Quick Response code&quot;, have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format. Standard barcodes can only be read in one direction (top to bottom) which means they can only store a small amount of information. Alternatively, QR Codes are read in two directions, top to bottom and left to right, and can be scanned in any direction. This makes them to be easier to capture and allows these codes to store significantly more data than a standard barcode. Additionally, QR codes have an error correction function that makes the code readable even if parts of the code are stained or damaged. QR codes can store a website URL, phone number, digital business card, shipping label, or up to 4,000 characters of text.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">History of QR Codes</span><br></p><p style="text-align:justify;">QR codes were first developed in Japan in 1994 by a company called Denso Wave, a subsidiary of the Toyota Group, as a means of tracking vehicle parts during the manufacturing process. The company declared they would not exercise patent rights, making their QR code technology available to the public. While they were slow to gain popularity, the first mobile devices with QR code readers were created in 2002.As smartphones gained popularity, QR codes became more common. In 2020, Denso Wave continued to improve their original design, adding traceability, brand protection and anti-forgery technology into QR codes.</p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Today, their use has expanded far beyond automotive manufacturing, with applications across various industries. Marketers started using QR codes in ad campaigns to direct consumers to product information or special offers by putting the codes on posters inside or outside of stores, billboards, and even in commercials. During the COVID-19 pandemic, many restaurants replaced hard copies of printed menus with QR codes to comply with CDC guidance and create a “touchless” environment. Interestingly, there is even a company based in the UK, called QR Memories, that creates QR codes for use on gravestones, allowing people to scan the code to read more about that deceased person’s life (typically linking to an obituary or news story relating to them online).</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">How QR Codes Work</span></p><p style="text-align:justify;">QR codes function as a bridge between the physical and digital worlds. They can store a variety of data, such as text, URLs, contact information, or even Wi-Fi network credentials. The patterns within QR codes represent binary codes that can be interpreted to reveal the codes data. A QR code reader can identify a standard QR code based on the three large squares within the code. Once it has identified these shapes, it knows that everything contained inside the square is a QR code. To analyze the code, the scanner breaks the code down into a grid looking at the individual grid squares. Each square in the grid is assigned one a value based on whether it is black or white. It then groups the grid squares to create larger patterns.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Are QR Codes Safe?</span></p><p style="text-align:justify;">While many people are aware that QR codes can open a website, they can be less aware of the other actions that QR codes are capable of initiating on a user’s device. Aside from opening a website, a QR code can be used to execute code. Therefore, it is possible for spammers to program QR codes with URL's that lead to phishing websites used for obtaining unsuspecting user’s personal information or login credentials. It is also possible for cybercriminals to program a QR code with custom malware which could be used to exfiltrate data from a mobile device when scanned, add contacts to your device or even compose emails. A typical “attack” would involve scammers placing malicious QR codes in public places, or even covering up legitimate QR codes. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">With all the possible malicious uses of QR codes and the fact that users cannot determine what a QR code will do just by looking at it, do the benefits outweigh the risks? As with most technology these days, it seems there is always a risk. If you know for sure that a QR code is from a trusted source, then it is probably safe to scan. However, if you are out in public and see a random QR code stuck to a pole on the side of the road, with no context, scanning that code may not be the best idea. Alternatively, there are secure QR code scanners that you can download to your smartphone. For example, Kaspersky QR Scanner instantly checks that a scanned link is safe before providing any information to the user and will alert the user of phishing scams and dangerous links. It also creates a log of past scans so, if necessary, users can look back to see where and when they were compromised. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Additionally, users may be concerned about QR Codes collecting personal data however, the only data that QR codes do collect (which is only available to the QR code’s creator) includes location, number of times the code has been scanned, the time of day the code was scanned and the operating system of the device that scanned the code.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Conclusion</span></p><p style="text-align:justify;">QR codes have evolved from their origin in the automotive industry to become versatile tools used in marketing, retail, healthcare, and more. Understanding how QR codes work and implementing best practices in their use can enhance customer engagement and convenience. As technology continues to advance, QR codes are likely to remain a valuable asset in bridging the physical and digital realms.</p></div>
</div></div><div data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:8pt;">Kaspersky (n.d.) <i>QR Code Security: What are QR Codes and are they safe to use</i>. Kaspersky. Retrieved from&nbsp;https://usa.kaspersky.com/resource-</span><span style="font-size:8pt;color:inherit;">center/definitions/what-is-a-qr-code-how-to-scan. Accessed 2023.</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 02 Nov 2023 11:26:00 -0400</pubDate></item><item><title><![CDATA[Bluetooth Technology]]></title><link>https://www.zwirentitle.com/blogs/post/Bluetooth-Technology</link><description><![CDATA[Bluetooth technology is an extremely effective tool that allows users to connect wirelessly to other Bluetooth enabled devices. For those who are unaware, Bluetooth is a technology that enables an exchange of data between devices that are located within a short distance]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_5hKn-LHFRpe8YsYXToqjNQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BN8x8sn1QTm4FeD1kxeYRQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_fdF4FV5iQWqAM8NDzxqiGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_2yKvkLPWTv-7_j9U2IkkXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2yKvkLPWTv-7_j9U2IkkXg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:30pt;">Bluetooth Technology</span></b></p><div style="font-size:30pt;color:inherit;"><span style="color:inherit;"><b><span style="font-size:16pt;">Is there a Privacy or Security Concern to be aware of?</span></b></span><br></div></div></h2></div>
<div data-element-id="elm_s6gUaWmQTqKs1HBvSxZ0TA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s6gUaWmQTqKs1HBvSxZ0TA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Bluetooth technology is an extremely effective tool that allows users to connect wirelessly to other Bluetooth enabled devices. For those who are unaware, Bluetooth is a technology that enables an exchange of data between devices that are located within a short distance (for most devices, the range is about 30 feet when there are no walls or other obstacles present). Devices that contain Bluetooth technology include smart phones, laptops and desktop computers, vehicles, wireless headphones or speakers, smart watches, and even internet connected devices. Therefore, a user can connect their smartphone to their wireless headphones or speakers to play music or connect their phone to their vehicle to talk on the phone “hands free” while driving. Users can even use Bluetooth technology to share images with another Bluetooth-connected device (on Apple devices, this is commonly referred to as “Air Dropping” and on Samsung phones it is called “Quick Share”). While there are many benefits to utilizing Bluetooth technology, there have been a lot of articles noting security and privacy concerns to be aware of when Bluetooth is left on (or enabled) after a user has ended the connection between devices.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">BLUETOOTH HACKING – IS YOUR SOFTWARE UP TO DATE?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Security researchers are constantly finding new threats to device security. &nbsp;For example, in 2017 Armis, a security research firm, discovered a Bluetooth vulnerability known as “BlueBorne”. When hackers used the “BlueBorne” to attack a device, they were able to control Bluetooth-enabled devices remotely, which gave them the opportunity to steal data from the device. Additionally, the “BlueBorne” could spread from one phone to another phone, like a virus. This gave hackers the ability to infect more phones without having to physically be within the 30-foot range of each device. &nbsp;Fortunately, the security research firm was able to create a security patch for devices to prevent the “BlueBorne” attack. A security patch is code for the operating system that fills in the vulnerability to prevent hackers from exploiting the vulnerability. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;As cybersecurity firms identify new vulnerabilities in the Bluetooth software, they create new security patches which are rolled out in updates to the software or devices; however, they are only helpful when users update their software. Therefore, updating the software on Bluetooth enabled devices is crucial to eliminate any known vulnerabilities from being exploited and keep your devices secure. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">BLUEJACKING – ARE YOU RECEIVING UNSOLICITED OR PHISHING MESSAGES VIA BLUETOOTH?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;On smart phones and laptops, the Bluetooth setting has the option of being enabled or disabled. When an individual leaves their Bluetooth enabled on their smart phone, they open themselves up to “Bluejacking”. “Bluejacking” is when someone uses a device’s enabled Bluetooth connection to send unsolicited messages. Messages may be a harmless prank from a teenager but could also be a phishing attack. Many people are aware of Phishing emails; however, Phishing messages can be sent via Bluetooth connection. A malicious actor may use “Bluejacking” to send a phishing message to a smart phone or laptop, pretending to be a trusted source, such as a bank, phone company or social media application. The message typically entices the user to click a link that leads either to a website that automatically downloads malware to a device or a fake website designed to look similar to well-known companies and requests the user provide login credentials or other sensitive information. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;To avoid any “Bluejacking” pranks or Phishing messages shared through Bluetooth connection, it is advised that users disable the Bluetooth setting when they have finished using the connection. However, if a user is connecting to Bluetooth devices multiple times per day, it may be tedious to enable and disable the Bluetooth setting before and after using. Alternatively, a user can adjust their device settings to prevent unknown contacts from sharing messages via Bluetooth connection. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">IS YOUR DEVICE PAIRED TO A VEHICLE?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;If you connect your smartphone to a vehicle, your phone’s data may be shared with the car. If it is your personal car, it may not be an issue; however, if you connect to a rental car, you want to be aware of the data your phone is sharing with the rental car. Major car-rental companies have no policies to delete sensitive information collected during the trip after you return the car. Your name and navigation history are considered valuable personal information. Using such data, combined with information publicly available on the internet and social media platforms, a malicious actor could track down an individual. Data that could be collected by a vehicle includes your email address, GPS history, phone book, call log and text messages (if hands-free calling and messaging is used), music streaming login, and more. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Interestingly, thus far, data collected on vehicles has been used to fight crime. One man was able to track down teenagers that took his car for a joy ride, using the phone usernames that were stored in the car’s device list. Alternatively, people with malicious intentions can also use data to track people down. To protect yourself, before returning a rented car AND before selling or trading in your personal car, take the time to delete your personal data from the vehicle. This can be done by going into the system settings or Bluetooth settings and deleting your device from the “paired phones” list; or by restoring the vehicle to the factory settings. If you are having difficulty, the car manual can guide users through unpairing a phone and deleting information. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">SHOULD YOU BE CONCERNED ABOUT BLUETOOTH HACKING?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Generally, most people should not be concerned about Bluetooth hacking. Cybercriminals typically target people with high level security clearance. However, it does not hurt to be extra cautious. IT professionals recommend the following:&nbsp;</span></p><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;">Turn off “discoverable mode”, except when pairing new devices.</span></li><ul><li style="text-align:justify;"><span style="font-size:12pt;">If you’re always using the same peripheral devices, such as Bluetooth headphones, Bluetooth keyboard or mouse, or even Bluetooth connection in the car, “discoverable mode” does not need to be turned on because your device will remember the Bluetooth device’s unique identifier. </span></li></ul></ul><ul><li style="text-align:justify;"><span style="font-size:12pt;">Disable the Bluetooth setting when it is not in use.</span></li><ul><li style="text-align:justify;"><span style="font-size:12pt;">For those who connect to Bluetooth devices multiple times per day, instead of&nbsp; disabling and re-enabling Bluetooth on the device, update the device’s settings to prevent unknown contacts from sharing messages through Bluetooth connection will prevent unsolicited messages or images from being “Air Dropped” or “Quick Shared” to your phone. </span></li><li style="text-align:justify;"><span style="font-size:12pt;">For those who do not want to disable or update their device’s Bluetooth settings, &nbsp;only accept paring and messages requests that are shared via Bluetooth connection from known contacts. </span></li></ul><li style="text-align:justify;"><span style="font-size:12pt;">Deleting personal and device information from rented vehicles that remains saved in the car’s settings after using the Bluetooth connection.&nbsp;&nbsp;</span></li></ul><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;">Furthermore, as with all technology today, it is recommended that Bluetooth devices are updated regularly. This ensures the devices are running the latest software which includes security patches for newly identified vulnerabilities.</span></p><p style="text-align:right;"><span style="color:inherit;"><span style="font-size:8pt;">-Emily Comora</span></span><span style="font-size:12pt;"><br></span></p></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 12:18:00 -0400</pubDate></item><item><title><![CDATA[The Internet of Things - Smart Fitness]]></title><link>https://www.zwirentitle.com/blogs/post/The-Internet-of-Things-Smart-Fitness</link><description><![CDATA[Some examples of fitness industry IoT devices include wearable devices, internet-connected cardio machines, and even virtual reality headsets. According to a Statista report, the number of connected wearable devices increased from 326 million in 2016 to 722 million in 2019.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_VLRBZOAySSKZTEl93J-_xg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_B2LAAK9wSf276H45FzEvXA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_JWsw3RGZTSKTz8n5HuBawA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YBsn1PsGQmWKjHQJFJOI7A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YBsn1PsGQmWKjHQJFJOI7A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="font-size:11pt;text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">The Internet of Things (IoT) is a term encompassing everything connected to the internet, but increasingly defines objects that connect. Essentially, an IoT device is any device with an &quot;on/off switch&quot; that connects to the internet, or to another device that uses the internet. Examples include smart phones, smart light bulbs, kitchen appliances, security cameras, wearable devices, industrial manufacturing robots, cars, navigation systems, GPS trackers, and so much more. A February 2020 report found there are 30 billion connected IoT devices on the planet, which is projected to double over the next five years.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Some examples of fitness industry IoT devices include wearable devices, internet-connected cardio machines, and even virtual reality headsets. According to a Statista report, the number of connected wearable devices increased from 326 million in 2016 to 722 million in 2019.&nbsp; The development and mass production of such devices has changed where and how people get exercise with devices that allow people to get a &quot;gym-like&quot; workout from the comfort of their home and innovative methods that make physical activity fun and engaging.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Wearable Devices</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Modern wearable devices were first introduced in 1965, the Manpo-kei pedometer which translates to &quot;10,000 steps meter&quot; along with research that stated 10,000 steps per day along with the proper caloric intake, was the key to maintain a healthy body. In the 1980s, Polar watches introduced the wireless heart rate monitor.&nbsp; Today, wearable devices can track much more than just an individual's step count and heart rate. Some of the more advanced devices are able to detect body temperature, activity level, speed, calories burned, distance traveled, changes in elevation and sleep patterns. Sensors for collecting data have been added to various wearable objects transforming them into a data-tracking device, such as bracelets, rings, anklets, clip-on devices, and sneakers.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Wearable fitness tracking devices typically connect to a smart phone and share the collected data with its mobile application counterpart. Within the mobile application, the user can create an account where their data is stored and they can set personal goals for themselves. Mobile applications can include a journal of daily activity or charts of their collected data over a period of time, allowing users to identify when they are making progress towards their goals.&nbsp;Some wearable device’s mobile application allows users to share their fitness analytics with others, adding a social component that can be used to compete with friends and family. Data collected on wearable devices can also be shared with other applications such as apps that host virtual races or virtual fitness events and challenges.&nbsp;</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Smart Cardio Machines</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Cardio machines have progressively advanced into internet-connected machines with touch screens, interactive interfaces, and user accounts. By setting up an account on a smart machine, the user's data is collected by the machine's built in sensors and saved to their account. The user can then login to their account on any other machine, of that brand, and their data is always stored to their account. Some cardio machines with built in screens give the user the choice of viewing a scenic route as they workout, giving them the illusion of running or biking through different parts the world.&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Additionally, many companies have developed subscription based applications that utilize live streaming technology or on-demand streaming, allowing people to participate in a fitness class from the comfort of their home. While a streaming app is not an IoT device, companies have implemented their applications into devices that connect to the internet, including, stationary bikes, treadmills, ellipticals and even rowing machines.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Virtual&nbsp;Reality Workouts</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">With the rise of virtual reality (VR) technology, an individual can engage in physical activity with a VR gaming headset, such as the Sony's PlayStation&nbsp;VR or the Oculus Quest. Utilizing the VR headset and controls held in each hand, a person becomes immersed in a computer-generated world that responds to the movement of sensors located in the headset and hand controllers, allowing them to interact with&nbsp;their virtual&nbsp;environment. Some of the games created for VR technology include dancing, boxing, racquetball, and rock climbing, which require the user to dance or move around as if they were actually in the ring, on the court or scaling the side of a mountain.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">For the many people who enjoy gaming, the VR headset gets them off of the couch and into a simulated world, where they have to physically move around in order to progress through the game. Many of the games require the player to move laterally, jump or squat to avoid an object that is headed toward them, or swing their arms around, using motions comparable to a tennis swing, to engage with an object or another character in the game. While these types of games may not be considered “fitness” by a regular gym-goer, they certainly increase an individual’s&nbsp; physical activity, especially when the alternative for that individual is sitting on the couch and playing a video game.&nbsp;</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Privacy and Security</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);"><br></span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">IoT fitness devices have changed the fitness industry, empowering people to track their activity and find alternative ways to get active. However, as with any internet connected device, it is essential to be aware of the IoT device’s security and privacy settings.&nbsp;Wearable fitness tracking devices store basic personal health information.&nbsp;When such information is collected at a doctor’s office or hospital it is protected by the Health Insurance Portability and Accountability Act (HIPAA); however, HIPAA does not extend its protections to health data accumulated by personal fitness tracking devices. While basic health information may not seem like much of a privacy concern, when wearable devices are used for long periods of time, the information collected begins to paint accurate picture of an person’s health, lifestyle, habits, and identity.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Fortunately, companies are building strong security measures into the devices, making the actual device difficult to hack. However, security weaknesses typically occur when user profiles within the device's corresponding mobile applications are not secured with strong unique passwords. Easy-to-guess passwords give hackers the ability to compromise a user's account. Therefore, when creating a password for your health mobile application, it is imperative to make it unique from other account passwords, and utilize a combination of upper and lower case characters, a number, and special character (i.e. !, @, #, &amp;, *, ?, etc.). Additionally, enabling multi-factor authentication, if available, improves account security significantly.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Privacy is a major concern for a many people. While the IoT devices may be secure, and the user’s password may be strong and unique, to ensure the information stored within the account remains private, it is important to read the company’s privacy policy. While the data accumulated from fitness tracking devices alone pose no great risk to an individual’s privacy, when the data is associated with other information, there are greater privacy implications if the data is misused or shared with third parties.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">IoT devices in the fitness industry are innovative and offer people new approaches to work out, giving them the freedom to get active outside of a gym. Plus, detailed tracking of various metrics, keep people informed of their progress overtime. The benefits of such devices outweigh the risk of security and privacy, when the user is informed of the privacy policy and settings and&nbsp;actively securing their user accounts.</span></p></div></div>
</div><div data-element-id="elm_ugTYcdCxSb-y7XMPUZCAlw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 19 Jul 2022 16:40:44 -0400</pubDate></item><item><title><![CDATA[The Internet of Things - Smart Homes]]></title><link>https://www.zwirentitle.com/blogs/post/the-internet-of-things-smart-homes</link><description><![CDATA[&nbsp; &nbsp;&nbsp; The Internet of Things (IoT) is a term encompassing everything connected to the internet, but increasingly defines objects that con ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_6c42IEpTRNOKbKSVVmKQ1Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zX_uIBhJQAOWvcns6rOWoA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QTD8fyLcSv2oiSNcxFgWsQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1F88KL3HTRq4pmKXwzKZBg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1F88KL3HTRq4pmKXwzKZBg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="line-height:1.2;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">The Internet of Things (IoT) is a term encompassing everything connected to the internet, but increasingly defines objects that connect with each other. Basically, an IoT device is any device with an on/off switch that is connected to the internet, or to another device using the internet. Examples include cell phones, smart light bulbs, kitchen appliances, security cameras, wearable devices, industrial manufacturing robots, cars, navigation systems, GPS trackers, and so much more. A February 2020 report found that there are 30 billion connected devices on the planet and that number is projected to double over the next five years.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">A smart home is defined as a home equipped with lighting, heating, appliances, and other electronic devices that are controlled remotely by phone or computer—basically a home filled with IoT devices.&nbsp;As of 2018, 130 million homes in the U.S. qualified as “smart”. &nbsp;Serving the same functionality of the regular device, smart devices are typically connected to your home’s wireless internet. Many of the devices have corresponding phone applications that allow you to receive mobile alerts and control the devices from your phone. Advancements in technology and artificial intelligence have allowed companies to produce devices that make life more convenient, save you time, and potentially, save you money.</span></span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Smarter Energy Consumption</span></b></p><p style="text-align:left;"><br></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">Smart Homes are designed to make the most out of available energy and are potentially saving homeowners money. Rather than restricting energy consumption, smart homes keep track of your lifestyle, find ways to conserve energy when possible and make the most out of available energy. Many devices will track the percentage of energy being used for each appliance and inform you of your consumption allowing you understand where you are wasting energy and adjust to conserve more energy. Smart thermostats, smart meters, smart power strips, smart lighting, all offer potential savings on your utility and electric bill.</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><blockquote style="margin-left:40px;border:none;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Thermostats</span></b><span style="font-size:14pt;">&nbsp;</span><span style="font-size:12pt;">can keep track of which rooms are being occupied and make sure the temperature is sufficient while you are in them and turned off when you aren’t. This prevents the house from unnecessarily heating or cooling itself while you are out. The app on your phone allows you to adjust the temperature settings remotely. Therefore, you can warm up or cool down the house on your way home from work or after being away, so when you arrive home, the house is already the perfect temperature.&nbsp;</span></span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp;Additionally, homes that have solar panels installed, smart homes can be programmed to only use the energy the panels are producing, allowing homeowners to be self-sustaining!</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:18px;">Smart Power Strips (outlets)</span></b><b><span style="font-size:18px;">:</span></b><span style="font-size:12pt;"> Some devices, such as TVs, laptops, and cable box, continue to consume energy when they are turned off. Smart power strips can detect when a device is off or in standby mode and cut the power to those devices allowing you to save energy. Some smart power strips can also monitor electricity consumption and report the percentage of energy being used for each smart outlet.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Lighting</span></b><span style="font-size:12pt;">&nbsp;allows you to control the lighting throughout the house from your phone. Bulbs are LED which are more energy efficient and don’t need to be replaced often. Most bulbs offer dimming features and some even change hue, giving you the option to have a range of colors or anything from yellow light to a white natural light. Since it's all controlled from your phone, you can turn the lights on and off from your phone while you are in the house and even when your not!</span></span></p></blockquote><p style="text-align:left;"></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Smart Home Security</span></b></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);"><br></span></b></p><blockquote style="margin-left:40px;border:none;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:16px;"><span style="font-size:18px;">Smart Locks</span>&nbsp;</span></b><span style="font-size:12pt;">offer a security as well as a solution for those who chronically&nbsp;misplace their keys, eliminating the need for spare keys hidden by the entrance or given to your neighbors. They are key-less&nbsp;door locks that allow you to lock and unlock your doors from your phone, whether you are there or not. You could unlock the door from the car so you don't have to fumble with your keys when your hands are full or even when you aren't home and need to let someone inside.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;">&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:18px;">Smart Smoke Detectors</span></b><span style="font-size:12pt;"><span style="font-size:18px;">&nbsp;</span>work as a connected system, so if one alarm is triggered, you will receive&nbsp;an alert on your phone. If it's a false alarm because you've burned something while cooking, you can easily shut the alarm off with your phone; however, if you're not home and receive a notification&nbsp;that is concerning, you can notify emergency services potentially avoid serious property damage<i>.</i> If you don't want to replace all of your smoke detectors, you can get a &quot;Listener&quot; which plugs into a standard wall outlet and listens for any alarms. If one goes off, the listener will sent a notification to your phone.&nbsp;</span></span></p></blockquote><p style="text-align:left;"><b><i><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp;</span></i></b></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Smart Kitchen</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">Smart kitchen appliances also offer great convenience, incredible features, and can be monitored, turned on or off all from your phone so if you've ever left the house and forgotten whether you've turned off the oven, or any other appliance, you would be able to check on your phone and turn it of if you did forget.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);"><br></span></p><blockquote style="margin-left:40px;border:none;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Fridge </span></b><span style="font-size:12pt;">allows you to monitor the inside temperature from your phone to ensure everything is working properly. Some even have cameras inside them can be viewed from your phone allowing you to see what you're low on when your out shopping.&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Slow Cookers</span></b><span style="font-size:12pt;">&nbsp;offer settings that will ensure your food is ready by the time you get home by setting a time to finish. If you're delayed for some reason, you can use the app on your phone to adjust the time you'll be home and the slow cooker will adjust it's cooking settings to make sure your meal is not over cooked.&nbsp;<i>&nbsp;</i></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><i><br></i></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Smart Coffee Makers</span></b><span style="font-size:12pt;"> can be controlled by your phone, allowing you to brew a cup or pot of coffee, just how you like. Plus, they can be programmed to brew your coffee at a specific time or when triggered by your morning alarm.&nbsp;</span></span></p></blockquote><p style="text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Privacy&nbsp;and Security</span></b></p><p style="text-align:left;"><b><span style="font-size:14pt;color:rgb(0, 0, 0);"><br></span></b></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">While all of these smart home gadgets are convenient, cost-effective and offer so many interesting features, they also pose potential risk, if you are not secure.&nbsp;Keeping your smart home secure, starts with the&nbsp;WiFi&nbsp;router. This is the&nbsp;foundational&nbsp;item that all of the smart devices use to connect.&nbsp;Lack of security could mean that a hacker who gains access to your&nbsp;WiFi&nbsp;would be also be able to access your smart devices. This means having access to your security camera footage, thermostat, oven, etc.&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">When securing your WiFi router is different from securing the connected devices — A simple firewall or security software is not the answer. You should begin with the router. It is advised to give your WiFi&nbsp;router a unique name and password. When you keep the factory given name and provided password, hackers will know the exact make and model of your router, and could potentially compromise your network.</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">As you purchase smart devices, you can enhance their security by making a few modifications to their default settings.&nbsp;Many IoT devices come with default usernames and passwords that are the same for all devices.&nbsp;With each device, change the usernames and set unique passwords.&nbsp; Check each device's security settings because some device's default security settings benefit the manufacturer more than they benefit you. If you are not using some of the devices features, disable them. For example, if you have a smart appliance that you never plan to access remotely, disable the remote access option.&nbsp;Additionally, find out how the devices receive software updates and don't wait to update. When the company identifies any security flaws, they issue software updates that address those vulnerabilities. Neglecting to update the software makes your device vulnerable to cyber criminals who are looking to exploit that security flaw.&nbsp;</span></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;"><br></span></span></p><p></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="text-align:center;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">The fear of potentially being hacked shouldn't keep you from purchasing smart devices. By simply being proactive about smart device security, you can prevent anything bad from happening.</span></span></p></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 09 Jun 2020 14:24:17 -0400</pubDate></item></channel></rss>