- Slightly More Secure
- Posts
- Device Security
Device Security
Go beyond default settings to reduce risk.
It’s a calm evening, and you’re sifting through emails when a ransomware message stops you cold—your device has been breached. Your personal information, once secure, now lies vulnerable. It’s a moment no one anticipates, yet for countless individuals, it’s a harsh reality. Often, the culprit isn’t a sophisticated scheme but something far simpler: the default settings on your devices.
In this newsletter, we’ll uncover why these factory configurations pose a risk and how attackers exploit them. Through real-world examples, we’ll see the consequences of inaction—and the power of taking control. I’ll guide you through practical steps to secure your devices and highlight key settings to adjust, complete with resources to make the process straightforward.
Default settings prioritize ease over protection. They ensure your device works seamlessly from the start, but that convenience comes at a cost. Attackers thrive on predictability, knowing that most users leave these settings unchanged. Consider these weaknesses:
Simple Passwords: Many devices ship with credentials like “admin” or “password,” easily guessed or bypassed. (Go ahead, try searching “default password for…” to see what you find.)
Unneeded Features: Services running in the background, unused by you, can serve as gateways for intrusion.
Broad Access: Systems and apps often retain permissions far beyond what’s necessary, widening the attack surface.
Unchanged, these defaults are akin to leaving your home’s windows unlatched—an invitation to those who know where to look. Fortunately, you hold the key to closing these gaps.
What types of devices are affected?
Basically, everything that you can control with your phone or that can connect to the Internet.
Phones
Laptops
Tablets
Printers
Networking gear (think routers and modems)
IoT (Internet of Things) devices like your “smart” …things like your fridge or TV
Cars
Lessons from the Past
The stakes become clear when we examine history:
Mirai Botnet (2016): Attackers commandeered thousands of internet-connected devices—routers, cameras, and more—using unchanged default credentials. The result? Massive internet disruptions, knocking out services like Twitter and Spotify.
WannaCry (2017): This ransomware paralyzed over 200,000 systems worldwide, exploiting a flaw many could have patched. Default update settings left countless devices exposed.
These incidents underscore a truth: default settings aren’t just oversights—they’re vulnerabilities with real-world impact. Yet they also show that prevention is within reach.
Why It’s Worth the Effort
Adjusting your settings isn’t merely a technical chore; it’s an act of empowerment and significant peace of mind. Think about the following advantages as you adjust those default settings:
Lowered Exposure: Each tweak shuts a door attackers might use.
Unpredictability: Customized configurations disrupt their playbook.
Safeguarded Value: Your data and peace of mind merit more than minimal defenses.
This isn’t about fear—it’s about foresight. Just as you’d secure your home, create an emergency savings fund, or even perform basic maintenance on your car; your devices deserve the same care.
Steps to Strengthen Your Defenses
Let’s turn insight into action with two foundational steps:
1. Distinguish Admin and User Roles (Windows)
On Windows, using an admin account for routine tasks is risky. If malicious software infiltrates, it gains the same elevated access. Instead:
Set up a standard user account for daily use—browsing, emails, and the like.
Reserve the admin account for specific needs, such as software updates.
This separation limits damage, even if a threat emerges.
2. Activate Automatic Updates
Outdated software is a prime target. Enabling automatic updates ensures your device receives security fixes promptly, requiring no extra effort on your part.
Key Settings to Adjust
Here are some additional settings to modify on your device, paired with trusted video guides to simplify the process. These are starting points—feel free to adjust to suit your needs.
Windows 10/11
Activate Windows Defender Real-Time Protection
Tighten Firewall Settings
Enforce a Robust Passphrase
Enable BitLocker Encryption
Turn Off Unused Services
Videos:
Mac OS
Turn On FileVault Encryption
Adjust Gatekeeper Controls
Set a Firmware Password
Activate the Firewall
Disable Auto-Login
Videos:
Android
Enable Device Encryption
Use a Strong Screen Lock
Set it so text messages cannot be read on lock
And other data is not displayed on the lock screen
Block Unknown Sources
Activate Google Play Protect
Review App Permissions
Videos:
iOS
Enable Find My iPhone
Set a Complex Passcode
Turn On Auto-Updates
Fine-Tune Privacy Settings
Activate Two-Factor Authentication
Videos:
Your Next Move
Securing your device doesn’t have to be difficult. Begin with a single step—perhaps enabling updates or creating a user account—and build from there. Each action fortifies your defenses.
For individuals, these measures offer a solid foundation. But businesses face broader challenges, from networks to sensitive data. If you’re seeking to safeguard your company, I’m here to assist. At Marathon Security Consulting, we provide tailored security solutions for organizations of all sizes. Reach out, and let’s ensure your business stands resilient.
Stay vigilant.
P.S. Questions about your setup or business security? Schedule a free call—I’d be glad to advise.
Need security but don’t have a budget for dedicated staff?
Our Security Mentor Service offers personalized guidance, expert insights, and individualized sessions to build your security internally. Reducing risk and saving money on contractors and managed services by empowering you or your staff.
Start today and unlock potential, boost security, and provide value to your team!