Page Content

Connected toys are all the rage, but how secure are they? Many toys today come with Bluetooth, Wi-Fi and mobile apps that enhance the experience of playtime. However, these toy manufacturing companies overlooked the ability for a professional hacker to gain access to many toys like Furby, Cloudpets and more. Take a look at the potential outcome:

These toys had Bluetooth, Wi-Fi connectivity, and the ability to talk to a child. A recent study found it very easy for a stranger to talk to a child through the toy when the Bluetooth connection was not secure; meaning the hacker did not need a password, pin code or any type of authentication to gain access. This means any person could “hack” your child’s toy without much of a technical background.

Another cause for concern is that Bluetooth usually has a range of about 10 meters, which means the hacker has to be close enough to the toy with their own device in order to hack it. They could easily have their system set up in a van and roll down the street looking for unsecured toys.

Here are a few tips to keep your kids and home safe this holiday season:

  1. Don’t buy a connected toy unless you have done research and know the toy is safe.
  2. Stay informed about any security and software updates for the toy.
  3. Check if any recordings devices in the toy can be manually de-activated.
  4. Ensure your home network is secure and all your devices are behind a firewall.

Don’t let a Grinch steal your holiday happiness. This holiday season, stay on top of tech toys and the security risks they carry.

For more cyber security updates check our blog regularly or subscribe so you don’t miss an important update.

Want to learn more about what a Managed Security Services Provider is? Listen to Succurri partner, Grant Eckstrom, and Fractional CMO, Tony Lael, discuss the topic in more depth in this video.


Learn how to do some amazing things with computers

A little introduction to doing stuff with computers that you wouldn’t know without reading this book.
Schedule a Call with Us

You’ll be able to select a time to discuss any IT support needs with us.

Sarah W
Sarah W.

Phoenix Consultant

More Articles

At Succurri our Quarterly IT Performance Review with Clients is a critical process for assessing

An IT dashboard for business executives should provide clear and concise visualizations of data and

Patch management software is a critical component of IT systems management that ensures your software

Submit a new Support Ticket