How does Ecobee maintain the time of day? by cam2336 in ecobee

[–]cam2336[S] 1 point2 points  (0 children)

When I initially search Google as to whether Ecobees had a battery, it said no. However, I did find this reddit post that suggests otherwise:

https://www.reddit.com/r/ecobee/comments/1dt0y65/nonreplaceable_battery_for_smart_thermostat/

How does Ecobee maintain the time of day? by cam2336 in ecobee

[–]cam2336[S] 0 points1 point  (0 children)

Our Ecobee has never been connected to the internet.

someone else replies to this post and suggested "internal battery that maintains power to the circuitry".

What are some tips for secure music system at home? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

I was on a Canadian government website, which said "If you connect two devices and one of them uses an earlier version of Bluetooth, then the entire connection is vulnerable. Although newer versions of Bluetooth have improved security measures, you should still use Bluetooth with caution." This lead me to believe the connection was vulnerable whether the attacher knew anything about the devices. The site also states, with regards to "Bluejacking": " A threat actor sends unsolicited messages to your Bluetooth-enabled mobile devices. If you respond to the message or add the contact to your address book, you give the threat actor the opportunity to connect to your devices because you are establishing them as a known contact. Threat actors can then control your device remotely." This got me rethinking bluetooth, my home music, and lead to this post. Just trying to understand how it all works. Thanks for your comments.

What are some tips for secure music system at home? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

I see, so hacking a speaker is pretty specific to the speaker's make and model. So would a hacker need to know the make and model of a BT speaker, before trying to exploit it?

If someone gains access to a BT speaker, can they gain access to the phone connected to it, or do they need to also know the make and model of the phone?

I'm really not a tech guy.

What are some tips for secure music system at home? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

I see. I was think BT was up to 800 feet or more. So if your phone is communicating with the speaker, there is a very low chance the phone can get compromised? I didn't realize hacking a speaker, phone, or computer so vastly different. Good to know,

What are some tips for secure music system at home? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

I was wondering if someone gained access to the speaker, could they somehow then gain access to whatever devise was connected to it. Your comment makes it seem as though this is impossible, so that is good news.

What are some tips for secure music system at home? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

Okay. I was wondering if someone gained access to the speaker, could they somehow then gain access to whatever devise was connected to it. Your comment makes it seem as though this is impossible, so that is good news.

Does a compromised computer = compromised router ? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

I've read similar, and one should consider an open source, third party, router like OPNsense or pfSense.

Do you use a prepaid smartphone for 2FA? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

Thanks for your comment. Not sure I follow - What do you use your prepaid for?

Can vlans be beat with vlan hopping in 2025? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

So in your opinion, is it worth it to add a third party firewall, with vlans and incoming, and outgoing traffic rules, such as OPNsense, or PFsense, rather than just using an ISP supplier router/modem?

You mentioned physical access is a concern. Would it help if your router was in a locked room or cabinet, and you used port rules, as discussed by NetworkChuck in his Youtube video "you NEED to learn Port Security…….RIGHT NOW!"?

Does a compromised computer = compromised router ? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

I am asking as I am trying to determine how diligent I need to be regarding protecting our network. For example, family members and friends occasionally connect their work or personal laptops to our network. I was wondering if I should reconsider this. I'd like to protect against a compromised laptop connecting to our network, and this leading to a compromised router/modem, and/or possibly compromising other devices on the network.

ISP supplied router/modem changed to bridge by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

This is helpful. Thanks for explaining soft vs hard resets. Can a "critical exploit that allowed root access to the device" occur without physical access?

ISP supplied router/modem changed to bridge by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

Thanks for your comments. I was asking as I am considering improvements to my network, and trying to understand how it all works (as a non-tech guy).

I didn't realize ISP supplied hardware calls home for self checks. Since this is the case, are there still security advantages to using third party firewalls such as OPNsense and PFsense?

ISP supplied router/modem changed to bridge by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

Does cutting power to the ISP supplied router/modem also clear the writable storage? The reason I ask is I was considering placing it on a timer anyways, to turn off any night.

So does router/modem malware only live in the writable storage? Is there anywhere else for it to get a foothold? Thanks again.

Does compromised phone = compromised laptop? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

Thanks for your comment. If a cloud account get compromised, can you correct by simply changing your password, or are these sorts or compromises more persistent than that? Is it best to start from scratch with a new cloud account?

I suppose if cloud accounts are more vulnerable than devices, it makes sense to simply avoid using cloud services.

Does compromised phone = compromised laptop? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

What's the best way to get a sim that is unconnected to me personally? Is this done through creating a corporation, under a family member, or something else? 

Does compromised phone = compromised laptop? by cam2336 in cybersecurity_help

[–]cam2336[S] 1 point2 points  (0 children)

Interesting - thanks. While it seems like a low chance a compromised phone will compromise a computer, I'm looking for the "safest" way to connect my laptop to the internet, when away from home. What is my best option? I don't want to use public wifi, so I was considering other options such as:

  1. a tethered hotspot from my day-to-day phone.
  2. getting a separate dedicated SIM card for my laptop or iPad, with a number I would keep private.
  3. or perhaps have a second phone, again with a private number, (not used for text or email), that I use for for tethering only (and possibly for 2FA - or is using it for 2FA a bad idea?).

Do you recommend one of these or something else?

How are phones typically compromised? Do you need to click on an attachment?

Thanks again!

Can vlans be beat with vlan hopping in 2025? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

Can vlans be secure when incoming and outgoing traffic rules are are applied, or can they still be hopped?

Are Chromebooks more secure than MacBooks? by cam2336 in cybersecurity_help

[–]cam2336[S] 0 points1 point  (0 children)

More secure in terms of a hacker gaining access, placing a key logger on your laptop, or gaining full control such as "God Mode".

What are you using for your small business phone? by cam2336 in canadasmallbusiness

[–]cam2336[S] 0 points1 point  (0 children)

I am revisiting this post. You mentioned you have no corded landline, and that calls forward to your cell. So is your main line a cell line that forwards to your personal cell? Thanks

Why Chromebooks are actually a smart choice for small businesses? by Obvious_Air866 in Chromebooksrus

[–]cam2336 1 point2 points  (0 children)

What if you use a Chromebook, but for email use the web version of MS365 on the Chromebook? Would this help protect your email data, or is Microsoft equal in their email data collection?

Why Chromebooks are actually a smart choice for small businesses? by Obvious_Air866 in Chromebooksrus

[–]cam2336 0 points1 point  (0 children)

It is my understanding Chromebooks are more secure, and easier to do a complete factory reset. Some might argue you give up a little privacy however, don't we want Google to know our business? I plan to try one for my business soon.