Direct firmware update links for common SMB IoT brands + what to do if a device is compromised. Sources: Vendor documentation, CISA, NIST SP 800-61.
Direct links to firmware update pages — check your device monthly
How to update firmware: Log into your device's admin page (usually 192.168.1.1, or check the label on the device), find Settings → Firmware or System → Update, and apply any available updates. Or visit the manufacturer's page below and search your model number. Apply updates during off-hours to minimize disruption.
Unplug the network cable or disable the device's WiFi. Do not power it off — this destroys forensic evidence. Disconnecting stops attacker access while preserving data for investigation. If it's the router, disconnect only as a last resort.
Step 2 · Immediately
Change All Passwords — From a Clean Device
Use your phone or a computer NOT on the compromised network. Change passwords on email, banking, cloud services, and other IoT devices. If the router was compromised, assume all credentials used on that network are known to the attacker.
Step 3 · Within 24 Hours
Factory Reset the Device Before Reconnecting
Hold the reset button 10–30 seconds (check the manual). After reset: immediately change default username and password, update firmware before reconnecting to the internet, and disable remote access features you don't need.
If one device was compromised, others sharing the same default password may be too. Check all cameras, routers, and printers. This is exactly what Andrew's free assessment covers — every device, plain-English written report. Book here.