Eleanor Hecks, Managing Editor of Designerly Magazine, looks at five common devices that attract attackers, asks why they are easy to exploit and what to do about them.
From smart kettles to office security systems, Internet of Things (IoT) devices are everywhere in the U.K. However, the convenience that they bring creates new questions about security.
Increase your awareness by understanding the trade-offs between protection and connection.
Your home’s 5 most vulnerable IoT devices
Connected devices often get overlooked during setup, and they can be the least secure. 2024 data indicates that 80% of consumers in the U.K. own at least one smart product [1]. These five household gadgets are the ones you should check first.
- Home router
The router is the gateway for every device in the house or small office. If it is weak, everything operating on it is weaker. Routers are an easy target because hackers can access the factory-administered passwords.
A 2024 survey by Broadband Genie found that 47% of its users admitted to never adjusting any of their routers’ factory settings [2], and 81% have not even changed the administration password. Firmware is also not regularly updated. Old firmware means known holes remain open and are routinely exploited. Weak Wi-Fi passwords make it easy for nearby attackers to guess access credentials and gain unauthorised access to the network.
You can strengthen your home network’s security by changing the administrative password during setup and enabling automatic firmware updates, if available. Put visitor devices on a guest network, so guests cannot see sensitive machine information.
- IP cameras and baby monitors
Remote viewing is among the primary reasons people buy smart devices in the first place. Unfortunately, these same features are what make them attractive to intruders.
The most common security flaw is the use of default login credentials. Hackers can easily scan the internet for these gadgets and log in using factory-set usernames and passwords. Some streams even travel without encryption, allowing videos to be intercepted and anyone to view the feed. Peer-to-peer connections can also expose devices to online threats.
To address this, change any default username and password, then disable remote access unless you need it. Follow the manufacturer’s guidance for a secure setup, and verify whether the vendor offers encrypted streams and provides regular updates.
- Networked printers
The humble office printer is often the most forgotten device on a network. However, modern printers are equipped with hard drives, memory and their own network connection. If yours is not secure, hackers can access its memory to find sensitive documents, such as employee data, contracts or financial reports.
Print-related data breaches usually cost around $400,000 per incident [3] (approximately £305,000), something 60% of businesses in France, Germany, the U.K. and the U.S. have experienced.
Be sure to keep your printers up to date and protect them with all the same security measures you would other devices in your home.
- Smart speakers and voice assistants
Devices like Google Nest and Amazon Echo are incredibly useful, but their primary feature — always listening — also raises security concerns. This includes accidental recordings where the device mishears a “wake word” and records a private conversation.
Another technical risk comes from third-party apps or systems, where attackers create malicious applications that seem harmless but are designed to phish. This is relevant because voice user interfaces are becoming essential accessibility tools. For example, they greatly assist many people with disabilities [4], so developing the technology for different users means ensuring the system understands how users speak, including those with speech impediments. This growing reliance makes securing smart voice tools even more important.
Make it a point to review third-party apps and set limitations where applicable. Turn off features that store recordings unless absolutely necessary, and follow the vendor’s guidance for privacy settings.
- Smart TVs
Smart televisions run apps, store user accounts, and may also include built-in cameras and microphones. Such multitasking creates higher risks. Many smart TVs receive infrequent or nonexistent software updates from the manufacturer, leaving known security holes unpatched for years. Software and security support for smart TVs typically lasts two to five years, depending on the brand.
Check update policies before buying. Disable unused microphones or cameras, and uninstall or disable apps you no longer use. Place smart TVs on a separate network from work devices.
Practical Guide to Securing Your IoT Devices
You can take immediate steps to improve digital security with IoT devices. Here’s a quick checklist of what you should do:
? Change all default administrator passwords. Use a password manager to create and store unique codes.
? Enable automatic firmware updates on all devices. If that isn’t an option, schedule to check for updates manually every month.
? Create a guest Wi-Fi network for your IoT devices. This isolates them from your main computer and phone.
? Disable services you don’t need, such as Universal Plug and Play or remote administration.
? Look for devices that comply with the U.K.’s Product Security and Telecommunications Infrastructure legislation, which sets minimum security rules for consumer connected products.
Security as Part of Convenience
Smart devices should make life easier. To keep that promise, security must be part of the purchase, setup and daily habits. Treat IoT products as small computers, not just toys. This mindset stops many common attacks before they start.
Sources:
1. GfK Smart Home Survey
2. Broadband Genie Router Security Study 2025
3. Big Systems: ‘Is your printer a security risk?’
4. Designerly: ‘What every designer should know about voice user interface creation’
Author biography:

Eleanor Hecks is the Managing Editor at Designerly Magazine, where she’s passionate about covering IoT news and insights for businesses. She’s also a mobile app designer with a focus on UI.
There’s plenty of other editorial on our sister site, Electronic Specifier! Or you can always join in the conversation by visiting our LinkedIn page.