Connect with us

Feature/OPED

Ericsson: Smart Home Privacy: How to Avoid ‘Data Paparazzi’

Published

on

Smart home tablet Data Paparazzi

The paparazzi are known for often taking covert photographs of celebrities and selling them to tabloids or gossip magazines.

In a similar vein, could the increasing number of smart, connected devices coming into our lives start acting like covert “data paparazzi”? And what can we do to avoid it? Find out here.

Today, our devices collect and forward information to all sorts of external parties: our home security alarm provider, our electricity supplier, our fitness watch vendor, our car manufacturer, our security needs to be good enough that it deters attackers and so on. Smart assistants listen to our voice commands and take that information to the internet to execute our orders.

But smart devices go beyond the obvious too – they can be anything from a connected toaster to a washing machine, sewing machine, or a toothbrush!

Data from one device may not be a problem, but combining data from several devices could create a pattern that may reveal unwanted information about a user or a business. And with more devices coming into homes, concerns around the way personal data is managed, controlled and used by devices and organizations are increasingly being raised.

Each new device may introduce a new security risk, if not properly managed through its life cycle. The security risks must be handled by all actors in the value chain, including the device owner, regardless if devices are used by consumers, industries, or smart cities.

So what will be important to think about to ensure that users benefit and get value from devices and their related services, but avoid adding security issues? Should we risk unintentionally becoming surrounded by data paparazzi with their viewfinder aimed at us?

In this blog post, we’ll bring some light on to what these factors mean for the device owner and what can be done to confront it.

Smart devices and privacy: the big picture

Many of us already interact with at least 3 to 5 devices daily – a smartphone or even two, a smart watch, a tablet PC, a work laptop, and maybe a smart TV. One estimate is that by 2030, each of us will own 15 connected devices. Some devices, like a connected car or smart meter, are connected by default and typically managed by the company the user is a customer of. They typically rely on cellular connectivity. For many other devices, the users themselves select and provide the connectivity, often Wi-Fi or cellular, and are personally responsible for the management of the devices.

Above all, the network infrastructure and devices need to be secure. It’s important for us all that we can trust how our devices operate and handle data. It will also be important to ensure device security through the life cycle of the devices. With the fast growth and wide of range of smart and connected devices from different brands – that come with different user interfaces and functions – it might be cumbersome to keep all devices up to date in terms of firmware and security status, for example, from the day the device is purchased until its recycled. However, this is a key requirement for enabling a secure and trustworthy IoT environment.

GDPR and similar efforts have raised more attention to privacy from the general public. As people become more informed and want to know how their devices and information are used and managed, there will be an increased need for tools that enable identifying, verifying, and controlling the data the devices are collecting and sharing.

The data paparazzi problem

Let’s now go into some issues that celebrities have to deal with, regarding paparazzi and stalkers, and how similar situations can also occur in the IoT world. We’ll also reveal if similar mitigation strategies can work for both regular, and data paparazzi.

Information availability

While the saying goes that “all publicity is good publicity”, many celebrities wouldn’t agree. They want to be in control of the information shared about them, to build a relevant public image but avoid revealing private relations, unattractive personal habits, or similar.

The same thinking is behind IoT security; information that’s needed to complete the intended tasks of an IoT device should be made available, while the rest of the information should be kept private. However, for IoT there’s often a more fine-grained approach as the information made available should in many cases only be made available to a restricted group of observers on a need-to-know basis.

The stalker problem

Many celebrities might also have to deal with stalkers – individuals who are overly interested in them and may try to gain as much information about them as possible, even using illegal means.

In the IoT space, the same phenomenon could happen to the average Joe. A smart home that doesn’t restrict access to the information it generates can easily become a lucrative target for an attacker; the information generated by the home can be used to gather different information about the inhabitants, which could later be leveraged to commit a cyber attack. Information about when various appliances are used, such as when doors are opened, lights are switched on/off, energy consumption fluctuates, can be a real treasure trove. This also means that potential attackers might not skip a house just because there’s some security applied, rather the security needs to be good enough that it deters attackers from trying, or stops them in their tracks.

Mitigation strategies

Celebrities tend to take precautions to hinder paparazzi and stalkers from invading their privacy. This can be in the form of living in gated communities or at least having access control to their property, through walls and gates for example. They might also apply surveillance measures such as motion sensors and surveillance cameras, and even security measures such as guards or guard dogs. When moving about in public, they might have a security guard with them to keep interested parties at least at arm’s length.

The same things need to be considered in the IoT world. For example, in smart homes, access to the internal network and the data generated and stored there should be controlled and protected, monitoring should be applied to pick up on suspicious behaviour, and reactive security measures, such as blocking and logging, should be taken when a breach is detected.

What has been normal for celebrities should now also become the standard for anyone in an IoT environment. When it comes to privacy, active measures should be taken to maintain it. While this might sound scary – and without proper actions, it would be – it’s not something that’s difficult to achieve. Rather it’s about having the right mindset and recognizing that security needs to be built in and considered more and more in the connected world, even for private citizens.

What to protect?

IoT is very much about the data generated and consumed by IoT devices. At first, this data may be seen as producing no risk, but even simple data in a certain context may be sensitive. For example:

  • Power consumption data recorded by a smart meter can provide a lot of information about what’s happening in a home. For example, based on the power consumption profile of TVs, switching on the TV will be visible from the data and if it’s possible to match the time the TV is turned on with the TV guide, that will provide a good indication as to what people at home are watching.
  • Any competent smart lock manufacturer will make sure that the communication with the lock is encrypted and its integrity protected. However, this might not be enough; by observing the traffic generated by a smart lock, one could potentially deduce whether the lock has been opened from the inside or the outside and thereby predict if there’s anyone in the house at any given moment. Other data generated by a smart home, including power consumption and light switch data, can be used to improve the prediction.
  • It’s inevitable that, at some point, an electric device will reach the end of its lifetime and will need to be disposed of. If the information stored on the device isn’t properly removed, a hacker who retrieves the device from a waste bin or who purchases it from a second-hand store could dig out data or credentials, as well as information about the services the device has been connected to. This is information that could be used to spy on the owner in a more efficient way, or even control or modify other devices belonging to the owner from the backend.

The question, therefore, shouldn’t be, “what do I need to protect?”, rather, “what don’t I need to protect?”, meaning “what do I actually need to share?”.

How to avoid unauthorized use of private data

There’s no silver bullet solution to this problem and the complexity is proportional to the number of devices and services that we as individuals interact with. Applying the best security practices is the responsibility of many entities. Device manufacturers and service providers need to provide secure devices/services, with proper control and maintenance for future proof device security.

But there are some rules of thumb that each of us can follow to minimize security and privacy issues related to our devices. By following these recommendations, one can build a system that will withstand a great deal of malicious intent, and deter the vast majority of attackers and opportunists. A few highly skilled and well-connected groups or individuals might be able to get past even the most secure systems, often through social engineering and phishing, that is, human weakness, rather than by technical security exploits. However, with the effort required, “average Joe” is maybe not the typical target.

End-user responsibilities include selecting suitable and secure solutions, and installing and configuring them in a secure way. Well-designed products should make this a relatively easy task, but it can also be done with the help of professionals. Furthermore, there are initiatives such as the Finnish Cybersecurity Label providing security labels for IoT devices, which aim to help consumers select products for which security has been verified.

Another important thing is to remember to update the software of the device.

And based on statistics regarding how a system’s security most often fails, a crucial task for the end-user is to remember to change the default password of all and any devices that are installed.

What can I do as a device owner?

  • Check whether the device manufacturer/service provider offers firmware/software upgrades in case of security issues.
  • Consider what data is generated and how it’s used and stored, for example, locally and/or in the cloud.
  • Check user terms and conditions to find out how data is used.
  • Remember to change the default device password.
  • Remember to keep device software up to date.
  • Remember to wipe the device before recycling.

And remember to consider the trustworthiness of a device and its services before purchase!

More reading

Read about Ericsson’s contribution to IoT security protocol standard OSCORE, which aims to optimize the computational strain on constrained devices, and keep a low overhead, while maintaining a high level of security.

Read our blog post on evolving SIM solutions for IoT. Such solutions allow the use of the well-established identity management features of mobile networks also for IoT deployments where manual SIM card handling isn’t feasible.

Explore Ericsson telecom security and security management.

Learn more about our research into the future of network security.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Feature/OPED

From Struggle to Stability: How FinTech is Helping Nigerian SMEs Overcome Cash Flow Challenges

Published

on

From Struggle to Stability

When Mrs Agbaje started her school in Ibadan twelve years ago, she didn’t envision a tech-enabled future. Her dream was simple—provide affordable, quality education to children in her community. For the most part, she made it work. But as the school grew, a new challenge took root. It wasn’t infrastructure. It wasn’t teacher retention. It was something far more basic: getting paid.

Each new term brings the same pattern. Parents promise to pay fees “by next week.” Some follow through. Many don’t. As the term wears on, Mrs Agbaje finds herself juggling spreadsheets, reminder texts, and awkward conversations in car parks or at school gates. Meanwhile, salaries must be paid, books restocked, diesel bought. More often than not, she dips into personal savings to keep things running.

Her story is common across Nigeria. Small businesses—whether they’re schools, salons, logistics firms, or cooperative groups—are constantly navigating the emotional and financial toll of delayed payments. And it’s not just a matter of inconvenience. A recent study by MacTay Consulting found that Nigerian SMEs wait between 60 to 120 days on average to receive payment for services or products already delivered. That kind of delay is more than a hiccup. It threatens livelihoods. It blocks growth. It’s a silent killer.

For Chuks, who runs a car hire service in Enugu, the issue is tied to his bigger corporate clients. They insist on “net 30” or “net 60” terms—industry-speak for “we’ll pay you in a month or two.” That might be manageable for a large fleet with strong cash reserves, but for someone like Chuks, every week matters. With fuel prices rising and maintenance bills stacking up, he’s often forced to park cars because he doesn’t have the cash to fix them—even when work is lined up.

What links these stories is the reality that small businesses operate in a system where money is constantly in motion but rarely on time. Customers often mean well, but their own financial instability creates a domino effect. And the existing tools to manage payments—handwritten ledgers, POS machines, WhatsApp reminders—were never designed for structure. They’re patched solutions to a systemic problem.

Even digital banking, for all its advancement in Nigeria, hasn’t solved this issue. Many SMEs still operate informally, managing finances through personal bank accounts or apps not tailored to business needs. The result is a messy web of follow-ups, reconciliations, and emotional strain. Business owners become debt collectors, chasing down what they’ve already earned, time and time again.

What’s often missed in conversations about entrepreneurship is just how deeply this problem cuts. Payment delays mean rent can’t be paid on time. It means holding off on hiring a new staff member, or letting go of a part-time assistant. It means saying no to growth opportunities, not because they’re not viable, but because the cash flow isn’t predictable enough to take the risk.

And when you zoom out, the implications are national. Small businesses make up over 90% of enterprises in Nigeria. They contribute nearly half of the country’s GDP and employ a significant portion of the workforce. Yet, their greatest enemy isn’t market competition—it’s irregular income. This is a structural inefficiency that deserves far more attention than it gets.

Slowly, however, change is beginning to show. A quiet revolution is underway—one where technology is stepping in not as a trend, but as a tool for financial stability. More SMEs are beginning to explore digital solutions that streamline payments and reduce friction between businesses and customers.

Among these solutions is PaywithAccount, a new tool launched by Nigerian fintech company OnePipe. Designed specifically for businesses with recurring payments—schools, cooperatives, service providers—it allows them to automate collections directly from customers’ bank accounts. With full consent and transparency, payments can be scheduled, reducing the need for repeated follow-ups or awkward reminders.

For Mrs Agbaje, this has made a significant difference. Parents receive structured payment plans, reminders go out automatically, and debits happen based on prior agreement. She now spends less time tracking who has paid and more time planning curriculum upgrades and engaging with teachers.

The benefit isn’t just financial—it’s emotional. When business owners don’t have to chase payments, they gain time, clarity, and confidence. They can plan ahead, restock inventory, or finally invest in that expansion they’ve put off for years. And for customers, the experience feels more professional, more trustworthy. Everyone wins.

Technology won’t solve every problem for Nigerian SMEs. But smart, well-designed financial tools are starting to remove some of the biggest roadblocks—quietly and effectively. And that’s the point. The best systems aren’t flashy. They work in the background, reducing stress, restoring dignity, and enabling business owners to focus on what truly matters.

For Ope Adeoye, founder of OnePipe, the issue is personal. “Every Nigerian knows someone who runs a business—a cousin, a friend, a neighbour. When they suffer from late payments, it affects whole families and communities. Fixing this isn’t just a business goal—it’s a social one.”

In a country as dynamic and entrepreneurial as Nigeria, the challenge is rarely about lack of ideas. It’s about systems that help those ideas survive. And one of the most overlooked systems is the way money flows—or fails to.

As more SMEs embrace tools that put payment on autopilot, a future of stability—rather than constant survival—starts to feel possible. And in a nation powered by small businesses, that kind of shift could move mountains.

Continue Reading

Feature/OPED

How AI is Revolutionizing Sales and Business Development for Future Growth

Published

on

Olubunmi aina

By Olubunmi Aina

Many experts have highlighted the growing impact of Artificial Intelligence (AI) across the financial industry, and I would like to share my perspective on a key functional area that typically drives business growth and profitability— sales and business development professionals and how AI is impacting their work.

Sales and business development professionals are often regarded as the engine room of an organization, thanks to their eye for business opportunities, ideation and conceptualization, market engagement and penetration expertise.

AI is enabling sales and business development professionals to automate tasks, take meeting notes, analyze data, and personalize customer experiences, all of which are embedded within CRM (Customer Relationship Management) systems. A CRM with an AI tool is what forward-thinking businesses are leveraging to manage leads, customer data, customer interactions, notify and remind professionals to take action when due, drive growth and profitability.

This is why it is crucial for these professionals to invest heavily in AI knowledge to remain globally competitive. This can be achieved through self-study, attending industry events, or consulting with leading technology companies that have embraced AI, such as Interswitch Group, AI In Nigeria, and Revwit.

Most importantly, to maximize the potential of AI, sales and business development professionals must pay close attention to customer interactions. and ensure they collect high-quality data. Feeding the data repository or CRM Systems with valuable insights and data from real customer engagement is key to getting AI to produce near accurate insight for effective results.

AI will continue to be a key driver of business growth and decision-making in the years ahead. If you are yet to embrace it, now is the time. Keep learning!

Olubunmi Aina is the Vice President, Sales and Account Management at  Interswitch Group

Continue Reading

Feature/OPED

Mother’s Day: Bridging Dreams and Burdens With Global Marketplace Success

Published

on

Motherhood in Nigeria is a dynamic force fueled by strength, resilience, and unwavering love. As Mother’s Day approaches, we celebrate the women who carry the weight of their families and communities, often while nurturing their dreams. From bustling market traders to ambitious entrepreneurs, Nigerian mothers are a force to be reckoned with.

However, the reality is that balancing these roles can be incredibly challenging. The daily hustle, coupled with the rising cost of living, often leaves little time or resources for personal aspirations. This is where the digital marketplace and platforms like Temu are beginning to play a significant role, not just in Nigeria but globally.

For Stephanie, a Nigerian hair and beauty influencer navigating the demands of work and motherhood, the ease of online shopping became invaluable. She discovered that purchasing baby necessities, like baby high chairs from Temu, from the comfort of her home significantly simplified her life, granting her more time to dedicate to her family and professional pursuits.

Beyond convenience, digital platforms are also fueling entrepreneurial success for women. Caterina Tarantola, a mother of three, achieved the remarkable feat of opening her translation and interpretation office in just 15 days. Her secret weapon was also Temu. Initially skeptical of online shopping, she found it to be a personal advisor, providing everything from office furniture to decor, delivered swiftly and affordably. This kind of direct access is precisely what can empower many Nigerian mothers who strive to maximise their resources and time.

Similarly, Lourdes Betancourt, who left Venezuela to start a new life in Berlin, turned to Temu when launching her hair salon. By sourcing essential supplies directly from manufacturers, she avoided costly markups and secured the tools she needed to turn her vision into reality.

Since Temu entered the Nigerian market last November, more Nigerian mothers have embraced the platform to access quality, affordable products. By shopping online instead of spending hours at physical markets, they can reclaim valuable time for their businesses, families, and personal growth.

This shift reflects a global trend as consumers worldwide seek convenience and affordability. In response, Temu has rapidly grown into one of the most visited e-commerce sites and was recognized as a top Apple-recommended app of 2024.

                                 

The digital marketplace, while still developing in a place like Nigeria, presents a significant opportunity for empowerment. The progress made thus far highlights the tremendous potential for positive impact.

This Mother’s Day, we celebrate Nigerian mothers’ strength and adaptability. Like Stephanie, Caterina, and Lourdes, they are turning challenges into opportunities—building brighter futures for themselves and their families with the support of innovative online platforms like Temu.

Continue Reading

Trending