Finally, a smart device manufacturer is taking device security seriously, and that's great news indeed.

You may recall reading about a serious issue with Ring security systems recently.

The news was that the security issue allowed hackers to commandeer user systems and spy on them.

The hackers were sending the users messages and making disturbing threats about watching them, effectively turning their own systems against them.

In response to those events, Ring has taken the bold step of outright requiring all users to make use of two factor authentication, or 2FA for short. Effective immediately, you will not be able to log into your Ring account without 2FA.

Ring's President, Leila Rouhi, had this to say about the change:

"While we already offered two-factor authentication to customers, starting today we're making a second layer of verification mandatory for all users when they log into their Ring accounts. This added authentication helps prevent unauthorized users from gaining access to your Ring account, even if they have your username and password."

Ring's implementation of 2FA relies on emailing or texting users a six-digit code which must be entered in addition to the standard username and password.

In addition to that, Ring also announced that they're giving users increased control over the info they share with third-party service providers and will have the ability to opt out of personalized advertising.

Rouhi continues:

"Beginning immediately, we are temporarily pausing the use of most third-party analytics services in the Ring apps and website while we work on providing users with more ability to opt-out in Control Center. In early spring, we will provide you with additional options to limit sharing information with third-party service providers."

These are significant steps that put Ring miles ahead of just about every other smart device manufacturer in business today. While we have a few issues with their implementation, in general, these are good moves that are long overdue. Kudos to Ring for getting serious about device security!

Used with permission from Article Aggregator