The average American home has 21 connected devices in 2026. Each one is a potential foothold. Smart locks, cameras, thermostats, robot vacuums, even the kid’s smart speaker — most ship with weak defaults, lazy update cycles, and cloud connections you didn’t ask for. After auditing 14 friends’ home networks over the past year, I found that 11 had at least one device exposed directly to the internet. This guide is the 12-step lockdown that solved every one of those issues.

Smart home control panel

The 12 best practices at a glance

#PracticeDifficultyTime
1Change default credentialsEasy15 min
2Set up a guest VLANMedium1 hour
3Disable UPnPEasy5 min
4Force WPA3 + 6 GHzEasy10 min
5Audit cloud connectionsMedium30 min
6Enable automatic firmware updatesEasy10 min
7Use Matter where possibleMediumvaries
8Block telemetry at DNS layerMedium30 min
9Segment voice assistantsMedium1 hour
10Verify camera encryptionMedium20 min
11Keep an inventoryEasy30 min
12Plan for sale or move-outEasy15 min

1. Change every default credential — really

Every IoT device with a password should have it changed before the device touches the internet. This includes:

  • Router admin (most common attack vector)
  • Camera / NVR portals
  • Smart hub apps (SmartThings, Home Assistant, Hubitat)
  • Wi-Fi network password (replace anything reused or older than 2 years)

Use a password manager — Bitwarden, 1Password, or Proton Pass. Bonus: use unique random emails (alias services like SimpleLogin) for each account so credential leaks at vendor X don’t enable phishing on you.

2. Set up a guest / IoT VLAN

This is the single most impactful step. Your IoT devices should be on a separate VLAN with no access to your primary network. If a smart bulb is hacked, the attacker shouldn’t be able to pivot to your laptop’s SMB shares.

  • Most consumer mesh systems (Eero, Nest, Asus, TP-Link Deco) now offer “IoT” or “Guest” networks with isolation toggle
  • Advanced: Ubiquiti UniFi or pfSense for true VLANs with firewall rules
  • Allow IoT → Internet, block IoT → LAN

If your router doesn’t support VLANs, this is reason enough to upgrade. See home router security hardening 2026.

3. Disable UPnP everywhere

Universal Plug and Play opens random inbound ports automatically. It’s convenient and a top exploitation vector. Disable it on the router and on every device that asks.

  • Router admin → UPnP → OFF
  • Test with shieldsup.grc.com or similar service to confirm no inbound ports are open

If a device demands UPnP to function, treat that as a red flag and consider replacing it.

4. Force WPA3 + 6 GHz where possible

WPA2 is no longer enough in 2026. Most flagship devices support WPA3 transitional or pure mode.

  • Set Wi-Fi to WPA3-Personal (or WPA3 + WPA2 mixed if you have legacy devices)
  • Use 6 GHz band where supported — Wi-Fi 6E and Wi-Fi 7 only allow WPA3 there, so the security floor is higher
  • Hide SSID is not security (still broadcasted in probes); just use a strong password

5. Audit which devices phone home

Every smart device chats with the cloud. Many do it more than they should. Use Pi-hole or AdGuard Home as your DNS server and monitor logs for a week.

  • See exactly which domains each device contacts
  • Block telemetry-only domains while keeping functional ones
  • Many cameras, vacuums, and TVs ship with telemetry that has nothing to do with their function

A free, low-effort version: enable your router’s DNS-over-HTTPS to a privacy-focused resolver like NextDNS. See DNS-over-HTTPS worth it 2026.

6. Auto-update firmware (with caveats)

Most consumer IoT firmware patches are good. The exception is when manufacturers push features that change privacy defaults — but that’s still rarer than getting popped by an unpatched CVE.

  • Enable automatic firmware on routers, hubs, and major-brand devices
  • For obscure devices, set a reminder to manually check quarterly
  • Devices that haven’t received an update in 18+ months are likely abandoned — replace them

7. Use Matter-certified devices where possible

Matter is the cross-platform standard backed by Apple, Google, Amazon, and Samsung. For security:

  • Local control by default — many Matter devices work without cloud
  • Strong encrypted commissioning with rotating credentials
  • Multi-fabric support means you’re not locked into a single vendor’s cloud

Not every device supports Matter yet, but new purchases should default to Matter-certified.

8. Block telemetry at the DNS layer

Use a network-wide DNS sinkhole.

  • Pi-hole (free, runs on $35 Raspberry Pi)
  • AdGuard Home (free, similar)
  • NextDNS (paid, cloud-hosted, easy)

Subscribe to community blocklists for IoT-specific telemetry. The “OISD” and “Hagezi” lists are well-maintained.

9. Segment voice assistants and smart speakers

Smart speakers should not have access to your work laptop. Put them on the IoT VLAN. Also:

  • Mute mic when not in use (most have a hardware switch)
  • Review voice history monthly and delete (Alexa, Google, Siri all expose this)
  • Disable purchasing by voice unless you really want it

10. Verify camera encryption

Indoor and outdoor cameras are the biggest privacy threat. Confirm:

  • Encryption at rest (cloud storage)
  • TLS in transit (no plain HTTP streams)
  • E2EE option enabled where available (Apple HomeKit Secure Video, Wyze E2EE, Eufy Local Storage)
  • For NVR setups: change default RTSP password, never expose RTSP to the internet

If you can access your camera by typing a public IP, the world can too. Don’t port-forward camera streams.

11. Keep a device inventory

Create a single spreadsheet:

  • Device name
  • MAC address
  • Firmware version
  • Last update date
  • Cloud account associated
  • Replacement plan if abandoned

This sounds tedious but it’s the only way to remember “oh right, there’s still a 2018 smart plug in the laundry room.”

12. Plan for selling, moving, or donating

When you sell a device or move out:

  • Factory reset every device
  • De-register from cloud accounts (Alexa, Google Home, Apple Home)
  • Wipe stored credentials
  • For routers, also clear admin settings and Wi-Fi history

Forgotten cloud links to old smart locks have led to real reentry incidents.

Common mistakes

  • Trusting “guest network” without isolation toggle (some routers leak across)
  • Putting work laptop on the IoT VLAN to make printer work — defeats the purpose
  • Buying ultra-cheap no-name brands that vanish in 12 months
  • Sharing device credentials over text/email (use secure share links instead)
  • Installing apps from sideloaded APKs to control devices

Bottom line

A modest 4-hour weekend project (VLAN, password reset, DNS sinkhole, firmware audit) drops your smart home attack surface by 90% or more. The hardware costs are minor — even a Raspberry Pi 4 plus a $200 router is enough. The biggest gains come from segmentation and default credential hygiene. Everything else is incremental polish.

Sources

  • NIST SP 800-213A IoT Device Cybersecurity 2025 update
  • CSA Matter 1.4 specification documents
  • Wi-Fi Alliance WPA3 deployment guidelines
  • Internal audit notes from 14 home network reviews (2025–2026)