Amazon Ring Video Doorbell smart cameras are very popular, but they can be a gateway to your privacy if you don't protect yourself as you should. In November 2019, they corrected a vulnerability that could have allowed hackers access to the networks of the owners through the passwords of the wifi. In December 2019, Ring faced more security problems when a Tennessee family claimed that a man had hacked the security camera of his Amazon Ring system. The cybercriminal used her to talk to an 8-year-old girl in her bedroom. This may not have been a problem of "piracy" in itself, but only a poor use of the password by the owner, but also how to avoid being hacked when using a Ring camera?
When Digital Trends contacted Ring about the most recent incident, a company representative told us: ?Customer trust is important to us and we take the safety of our devices seriously. Our security team has investigated this incident and we have no evidence of an unauthorized intrusion or compromise of Ring's systems or network. Recently, we learned of an incident in which criminals obtained the credentials of some Ring users (for example, username and password) of a separate, external and non-Ring service and reused them to log in to some accounts of Ring. Unfortunately, when the same username and password are reused in multiple services, cybercriminals may have access to many accounts. Upon learning of the incident, we take appropriate measures to quickly block access to the accounts of the known affected Ring with whom we have also contacted. ?
So how can you protect your Ring smart cameras? It is not difficult. Here are some tips.
Enable two-factor authentication
In the case of the 8-year-old girl, the mother admitted that she did not allow the authentication of two factors. This is an important step to maintain the safety of your Ring products. To configure it, go to your Ring application and tap the three-line icon in the upper left corner of your screen to open the menu. Then, select Account and Authorization of two factors, enter your password and enter the mobile phone number to which you want the two-factor authorization code to be entered. Next, enter the six-digit code that was sent to the phone into the application and then tap Continue to finish.
Now you have an extra layer of security against hacks. When someone tries to use your account on a new device, you will receive a code to your phone that you should enter in the application of the new device. If he hacker He doesn't have your phone, he won't be able to access your account because he won't have the code.
Manage your passwords well
Ring said the hacker was able to access the account of the camera Ring because the owners reused their passwords. So make sure you use a unique password for your account. Also, be sure to create passwords that are difficult to decipher. Use a mixture of numbers, upper and lower case letters and symbols as exclamation marks. Try using phrases instead of a single word so that the password is also stronger. If you hate having to enter passwords, use a password generator. To avoid forgetting your passwords, use a password vault. This is our list of the best password managers.
Do not share the login information
There may be times when others need access to your Ring device. There is an ingenious way to allow this without sharing your login information and without compromising your security. Simply adelos as a user shared in the account. This gives the person, as if it were your teenage son or a roommate, access to watch videos, use the two-way conversation feature and save videos, but will not have the login information of the main account.
To add a shared user, open the application and choose your device. Next, go to Settings and click on Shared users and Add user. Then, enter the email address of the person to whom you want to assign a shared user. Select the devices you want to share with the new user, and then select Send invitation. Once the person accepts the invitation, the process is completed. They will be able to access the devices through their own application and login credentials. However, make sure they are using good passwords and also two-factor authentication.