

They may try to use the stolen passwords to access other accounts. If you’re using an old or shared password, or the default password that came with the device, cybercriminals may already have it in their possession. Passwords can be stolen in data breaches. Don’t reuse old passwords or share passwords with other accounts. To set up 2FA on your Ring device you can find instructions here.Ģ. It adds a second factor of authentication in addition to your account password. 2FA is a method of verifying your identity. Many home security products support 2FA, but not all brands set up by default. How to secure your home security cameras and similar devices

If you use one or more smart home security device - or if you’re thinking about buying one - here are six steps to help secure your device when setting it up at home. Instead, hackers accessed passwords from recent data breaches unrelated to Ring and tested them to see if they’re also being reused on Ring accounts.

How does this happen? Ring hasn’t had a data breach, so Ring customer data like passwords or other personal information hasn’t been exposed. These app-based products function by using your existing Wi-Fi network to create a virtual perimeter, but some hackers have reportedly used the devices to shout at people, blast alarms, blare music, and more. Hackers sometimes set their sights on home security cameras from manufacturers such as Amazon Ring, Google Nest, and other smart-home tech makers, and that has made some consumers feel less than secure.
