![Ransomware: more than just file encryption [part I]](https://biz-file.com/c/1704/387395-120x120.jpg?2)
![]() |
Five IoT security risks and ways to secure yourselfIt is expected that there will be 3.9 IoT (internet of things) based devices per person by 2020. ![]() © My Make OU via 123RF By putting together the operational technology (OT) and information technology (IT), unstructured digital information that is generated by the connected objects (gadgets, tools, devices) can be examined for improvements without immediate human interaction. However, along with all the potential improvements, the potential rise of smart nodes and transferring of data is causing new concerns about online privacy, anonymity, and security. Reasons why security protection is an issueBeing put into the internet environment means that any device’s system unavoidably comes up against multiple online threats. Any connectable device is supplied with an embedded operation system, which is not primarily designed with stringent protective built-in technologies. In view of this, having decided to use IoT, any customer should think about the security issues: 1. DDoS attacksAfter being attacked, IoT-based devices can be controlled from one server, which allows an adversary to use them to overwhelm a website with traffic coming from multiple ‘zombified’ gadgets. Any confidential business content or database can be leaked from the compromised website and misused in the wrong hands. The DDoS attack that targeted Brian Kreb’s website in 2016 is one of the most vivid examples of how the IoT can work against you. 2. Deadly vulnerabilitiesWe already know that the IoT system has achieved wide acceptance in the industrial sector, notably related to energy and nuclear facilities. It needs little imagination to think of the consequences if an adversary finds breaches in the devices’ OSes and starts changing internal settings in these facilities. In the medical sector, devices such as insulin pumps, x-ray systems, CT-scanners, and implantable defibrillators were found to contain deadly vulnerabilities in 2016 by the Symantec Global Intelligence Network. 3. A flood of dataHaving armed a business with the IoT, the enterprise could well encounter problems with the heavy load of traffic, which needs to be collected, processed, stored, and analysed. As a result of the increased data flow, the needs for increased or limitless bandwidth will grow. Besides additional expenses for network maintenance, a company needs to monitor the traffic. Moreover, the enterprise needs to be aware that there are malicious and legitimate data patterns passed to IoT devices. The companies should secure their network by identifying malicious activity and eliminating the problem. 4. Lack of hardware and software protection Protection should be present for each component of the IoT system, as in most cases hardware is not initially stuffed with military-grade defensive technologies and often the built-in tools are out of date. To gain better control over any internet-connected device an attacker will look to compromise a chain of IoT-based gadgets by trying to implant a malicious code or infect one of the OSes for further distribution. 5. Smart home devices’ vulnerabilitiesMillions of homes now suffer from cyberattacks. More than 50 commercial devices (smart light bulbs, locks, energy management devices, etc.) have been found to include dozens of vulnerabilities. Thus, a ‘smart’ door lock can be opened remotely without a password – an ideal opportunity for some robbing. How to secure your IoTThe main issue is that IoT should be created with security in mind and any customer should follow a holistic approach for IT security. Regardless of the fields of the IoT usage, the protective measures are the same:
The numerous spheres of successful implication for IoT, such as environmental monitoring, infrastructure, energy and medical systems management, offer strong grounds for assessing that the technology has already brought plentiful positive results and has become a part of our daily life. However, this rapidly evolving area requires some protective efforts to be taken. So, don’t wait until you are caught off guard, take steps to ensure that your IoT devices are secured. About Yana VardomatskayaYana Vardomatskaya is a VP of Business Development for HQSoftware, a custom software development company with offices in New York City, Tallinn and a development centre in Minsk, Belarus.
Having started with a wide variety of custom software development projects, the company is now working in IoT and AR/VR. View my profile and articles... |