In part one of this blog post, I discussed the security risks of connected toys. In this post, I will discuss the action which can be taken to protect consumers from...
5 IoT security shockers (and what they teach us about staying safe)
3 mins read
With IoT penetration on the rise, securing the networks, infrastructure and devices becomes ever more essential. We review some of the surprising ways connected things have been used to hackers' advantage and what we can learn to stop history repeating itself.
In 2016, a photograph taken of Mark Zuckerberg revealed that he’d taped over the camera and microphone on his laptop.
With a total of 20.4 billion connected ‘things’ predicted to be in use by 2020, sometimes even the most innocuous products can offer a way in for people with nefarious intentions as we see below... Beware of the fish Many people who go to Vegas come back with far less money than they went with, but it’s not usually due to a cyber-attack, much less one that started in a fish tank. However, that’s exactly how an unnamed casino in Sin City was once infiltrated, when an aquarium thermometer used for remote monitoring and feeding was used to gain access to the network and a list of the casino’s highest-spending visitors was stolen. The hackers stole 10GB of data in total, sending it to a remote server in Finland. When autopilot strikes back"Gartner found that nearly 20 percent of organisations observed at least one IoT-based attack in the past three years."


But with every new connected device, the threat landscape evolves that little bit more, meaning security tools need to be agile enough to cope at every point. IoT devices are increasingly being used across diverse sectors including manufacturing and retail sectors and, as seen by the Vegas fish tank example, can be gateways to other parts of an enterprise’s network. Given that 80 per cent of the world’s data is kept on private servers and the punishments for breaching GDPR rules can be cripplingly severe, keeping hackers out has never been more crucial. The fledgling nature of IoT is likely to make it an attractive target to hackers for the foreseeable future but emerging technologies can provide a potent defense in the fight against them. Implementing security analytics strategies based on Big Data can help identify anomalies in behaviour and usage across the vast populations of IoT that are getting launched, to pick on critical security incidents or misuse. Also, Blockchain, for example, can remove the need for a central authority in IoT networks, meaning devices in common groups can alert administrators if they’re asked to carry out an unusual task."Products like these are susceptible because businesses often focus on the new feature set of the IoT device and the security aspect tends to be an after-thought."
With the correct safeguards in place it can deliver the improved processes, reduced costs and better-quality services it’s designed to provide." Read more about the importance of security in the digital age."Fundamentally, though, IoT should not be feared."
Leaders In Our Own Right
Explore related solution
In part one of this blog I discussed the need for healthcare providers to think globally and act collaboratively across ecosystems. In part two we will look deeper into...
From connected home assistants and smart meters to fitness wristbands and Wi-Fi-enabled baby monitors, different Internet of Things (IoT) technologies are becoming more...
What’s next?
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators