An official website of the United States government
Here's how you know
A .gov website belongs to an official government organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

News | Oct. 26, 2020

A change in how we interact with technology and IoT

The smell of coffee from your smart coffee maker welcomes you into the kitchen to start your day. You sit down at the table, open your computer, login, and work for the next eight hours. Occasionally, you take a break and ensure that you’re reaching your fitness goals by sporadically checking your new fitness device.

This is the reality for many government who are now working from home due to COVID-19. Does this make you pause to think about the amount of technology you interacted with throughout the day? We are accustomed to focus on the traditional smart devices, such as a smartphone, computer, or fitness device. But did you consider the security alarm and smart refrigerator in your home?

The Internet of Things (IoT) is a world of evolving and emerging technologies; an estimated 20-30 billion devices are connected right now and that will likely increase to 50-100 billion devices by 2025. IoT is constantly transforming; allowing faster internet speeds, more access to information, and easier to use devices. As connectivity increases, concerns of privacy and security do as well, leading to a greater possibility of attacks on networks and systems.

As a society, we often don’t think twice about how IoT devices acquire our sensitive information or disrupt operations. However, National Security System, Department of Defense, and Defense Industrial Base system owners, as well as the broader community, have to be proactive in taking the necessary steps to protect their information and also offer an additional level of security to their employees who are now working from home on the organization’s software and equipment.

To be successful in protecting our personal information and data, a change in how we interact with technology and IoT is important. The first step is to make sure that all security features are updated and current. Second, take the extra time to read your information sharing and end user license agreements for every product you purchase. Lastly, be aware because the IoT world is constantly evolving. As a technology user, your number one goal should always be to protect your personal information by being proactive and vigilant.

For information on how to enhance your security protection, visit our teleworking and mobile best practices website. To learn more about IoT and to connect, feel free to reach out to

If you enjoy creatively driving outcomes for our Nation, NSA Cybersecurity is the place for you! Our diverse team of problem solvers collaborate across industry and government to prevent and eradicate cyber threats. Join the mission—visit for current openings.