The next step is critical: Getting confirmation from whoever's moving out that they no longer have administrative or user access to any of the devices in the home.
Then the list recommends sending new ownership and contact information to manufacturers; changing usernames, passwords and access codes; and making sure all the devices have up-to-date software.
That last step could save you from a home-security disaster. Hackers who take advantage of a vulnerability on one device could find their way into everything else on the home network. While a house with that kind of security hole may be very connected, it's not a smart home at all.
Sign up for CIO Asia eNewsletters.