© Copyright Acquisition International 2026 - All Rights Reserved.

Article Image - Research Shows Many Users Do Nothing to Protect Their Smart Devices
Posted 4th August 2021

Research Shows Many Users Do Nothing to Protect Their Smart Devices

New research by the leading cybersecurity solution NordVPN shows that users don’t take the security of their IoT devices seriously. Almost 88% of people have some kind of IoT device in their household. However, some of them take very little action against the risks, with almost 1 in 6 taking no measures to protect the devices.

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Research Shows Many Users Do Nothing to Protect Their Smart Devices

Protect Devices

Almost 88% of people have some kind of IoT device in their household

New research by the leading cybersecurity solution NordVPN shows that users don’t take the security of their IoT devices seriously. Almost 88% of people have some kind of IoT device in their household. However, some of them take very little action against the risks, with almost 1 in 6 taking no measures to protect the devices.

“As the research shows, the more devices people own, the more vulnerable they usually are. Manufacturers surely have to take responsibility for the safety of their products, but users play a big part in their own cybersecurity,” digital privacy expert at NordVPN Daniel Markuson comments.

The survey on IoT devices also showed what cybersecurity habits people in different countries lack, what smart devices they usually purchase, and who, in their opinion, should be responsible for keeping those devices protected.

 

What is the problem with IoT devices?

IoT devices, by their very nature, collect and send information. This might be done securely and for a specific purpose, such as an encrypted message to tell your heating to turn off. But it might also be leaky, either through bad encryption (or none at all) or through giving away extra information. For example, the internet-connected camera on your front door might let you know when a visitor is there, but, if someone else is watching, it could also reveal when the house is empty, or when children are home alone. In 2020, dozens of Amazon Rings were hacked, resulting in a lawsuit against the company.

“IoT device makers are in a rush to sell the gadgets as quickly as possible. This means that they are shipping them out with the minimum features required for them to function, shortening the development process and cutting costs as much as possible. This is great for device makers, but horrible news for consumers. When things are rushed, they leave huge gaps in security,” Daniel Markuson adds.

User behavior is just one extra aspect of a potential security vulnerability in light of all the technical and structural issues. Still, there are often simple steps we can all take to improve the security of the devices and networks in our homes or offices.

 

People actively use IoT devices but don’t protect them enough

Overall, the vast majority of us have some kind of IoT or connected devices in our homes, even if it’s just a router. In fact, only 12.3% of the people surveyed did not have any of the listed devices. The UK saw the most prolific use of IoT devices, with only 5% of people saying they had none of the devices in their homes. But they also took the least action against the risks, with almost 1 in 5 taking no measures to protect them. 

It’s not just people in the UK who need to improve their habits. The US showed similar results, with 17% of people with IoT devices taking no protective measures. People in the Netherlands and Canada had the best devices-to-behaviors ratio, although France scored well mostly by having much fewer devices (only 77%).

 

What can be done to protect the privacy of IoT devices?

41% of users think that manufacturers should be responsible for the safety of the devices they produce, while 56% see it as their own responsibility. The research shows that the main vulnerabilities users are worried about are deprecation (76%), followed closely by privacy issues (75%)  and design problems (particularly encryption) (75%).

 

Daniel Markuson provides some tips for all IoT device owners:

  • Look into the privacy issues associated with the devices you purchase. Review tech sites that dig into privacy and security issues or buy devices certified by organizations like ioXt.
  • Read the privacy policy and other terms and conditions.
  • Create sophisticated passwords. Use a secure password manager, like NordPass, in case you forget passwords easily.
  • Keep devices patched and up to date. Check if your devices update automatically, and, if not, make sure they are running the latest firmware.
  • Turn off features you don’t use. Having unused features running in the background opens up unnecessary vulnerabilities or privacy issues.
  • Install VPN on your router. As International VPN day (August 19) is approaching, it is important to highlight its part in protecting our homes’ security. VPNs can help prevent man-in-the-middle attacks by encrypting your traffic, covering many of the issues with poor encryption on IoT devices.

You will find more information on possible vulnerabilities and the ways to be protected on NordVPN’s  research page.

Categories: Innovation, News


You Might Also Like
Read Full PostRead - Eye Icon
BiP Solutions Acquires Pro Mark Media
M&A
30/04/2015BiP Solutions Acquires Pro Mark Media

BiP Solutions (BiP), the leading provider of business intelligence solutions for the public/private sector marketplace, has acquired Pro-Mark Media (PMM) - one of the UK's leading construction media companies with an established portfolio of digital magazines

Read Full PostRead - Eye Icon
Injection Molding: Process, Benefits, and Industrial Applications
Technology
20/04/2026Injection Molding: Process, Benefits, and Industrial Applications

Injection molding is a highly efficient manufacturing method widely used across industries to produce precise and durable components. From simple household items to complex industrial parts, this process supports large-scale production with consistent quality.

Read Full PostRead - Eye Icon
How To Expand A Home-Based Business
Innovation
22/02/2023How To Expand A Home-Based Business

Doing business at home has been recently popularized due to the convenience and advent of technology. Startup entrepreneurs can get their businesses off the ground without worrying about paying for overhead expenses.

Read Full PostRead - Eye Icon
Freetech Wins Bid
M&A
17/10/2016Freetech Wins Bid

A leading asphalt pavement maintenance integrated solution provider, announced that the Group's major subsidiary won a bid on bulk equipment procurement project with Hainan Province Highway Department and will provide 13 sets of asphalt pavement multi-purpFree

Read Full PostRead - Eye Icon
6 Trade Show Tactics That Maximize B2B Leads
Strategy
23/04/20266 Trade Show Tactics That Maximize B2B Leads

Research shows that while attending trade shows leads to many business cards and conversations with potential clients, those client relationships do not necessarily turn into business relationships. In fact, on average, 80% of B2B clients require a minimum of

Read Full PostRead - Eye Icon
Association for International Arbitration and Upcoming Events
Legal
01/05/2015Association for International Arbitration and Upcoming Events

The Association for International Arbitration (AIA) is a non-profit organization open to all those interested in Alternative Dispute Resolution (ADR), irrespective of nationality and level of experience.

Read Full PostRead - Eye Icon
Paying the Price: Late Payments Forcing UK Businesses to Make Tough Decisions
Finance
17/02/2015Paying the Price: Late Payments Forcing UK Businesses to Make Tough Decisions

Although late payments are something almost every business comes across, in the UK there is currently a culture of unpaid payment causing a domino effect of debt across the British Isles.

Read Full PostRead - Eye Icon
6 Things to Do Before Implementing An ERP System
Strategy
23/11/20216 Things to Do Before Implementing An ERP System

Usually, when an individual or organization plans to implement new software or system into their infrastructure, preparation is necessary, and that’s especially true when it comes to ERP systems.

Read Full PostRead - Eye Icon
Business Merger vs Consolidation: What’s The Difference?
M&A
24/09/2021Business Merger vs Consolidation: What’s The Difference?

With the continuously evolving economy, business mergers and consolidations are becoming more common. Often, there are also legalities involved in both processes, which makes it important to consult with law experts.



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have a number of unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow