March 15, 2018 By David Bisson 2 min read

Security is the most important consideration for web users in the U.S. when looking to purchase smart home devices, a consumer survey revealed.

According to McAfee’s “New Security Priorities in an Increasingly Connected World,” 36 percent of U.S. internet users said they consider security when shopping for a smart home device, as reported by eMarketer. That’s a higher percentage than those who admitted that they prioritize price (32 percent), ease of use (13 percent) and reviews from other users (8 percent).

Security Priorities Vary by Demographic

Security doesn’t affect all users’ purchasing decisions equally. Broken down by gender, women (38 percent) were more likely than men (33 percent) to consider security when purchasing smart home devices.

Age also plays a role: Users between the ages of 18 and 20 placed the greatest emphasis on security (40 percent), followed by individuals aged 41–50 (38 percent) and those aged 51–55 (37 percent). Consumers between the ages of 21 and 30 are least likely to consider security (34 percent).

Although the majority of users in the U.S. don’t think about security when purchasing smart home devices, they still worry about the security of the devices they do purchase. More than half (63 percent) are concerned about identity theft in the event that someone breaches the connected home’s network.

Even so, 52 percent admitted they don’t know how to secure their smart home apps and devices. As a result, 43 percent of users said they were concerned about their lack of control over companies’ collection and use of their personal information, while just 24 percent said they were confident in their ability to control this data, according to eMarketer.

Protecting Smart Home Devices

Consumers looking to protect their smart home devices from threat actors can reference frameworks such as the Open Web Application Security Project (OWASP)’s “IoT Security Guidance,” which advised users to consider segmenting new IoT devices on a dedicated network.

It also suggested creating strong passwords and enabling two-factor authentication (2FA) on those products. Finally, consumers should avoid entering personal information into IoT devices whenever possible and disable any unused physical ports through each device’s admin interface.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today