Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
    data analytics and gold trading
    Data Analytics and the New Era of Gold Trading
    9 Min Read
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Urgent Tips To Guard Against New IoT Cybersecurity Threats
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Urgent Tips To Guard Against New IoT Cybersecurity Threats
ExclusiveInternet of ThingsSecurity

Urgent Tips To Guard Against New IoT Cybersecurity Threats

Diana Hope
Diana Hope
6 Min Read
cybersecurity and internet of things
Shutterstock Licensed Photo - By NicoElNino
SHARE

Networking technologies have made the world very small in the sense that they have allowed people who are thousands of miles apart to communicate in real-time. But network technologies and gadgets can be dangerous when it comes to cyber espionage. Hacked network equipment could cause losses in the tens and hundreds of US dollars. Botnets that affect poorly protected network devices are particularly dangerous.  For example, the Mirai botnet, which initially spread by infecting routers, has damaged hundreds of millions of dollars to the global economy.

Contents
  • How real is the danger?
  • What is the cause of the problem?
  • So, what to do?
    • Final thoughts

According to experts, the number of devices connected to the network will increase to 25 – 50 billion by 2020 and will reach 75 billion in 2025. All types of business use IoT very actively now, by 2022 the expenses in this sphere will reach $1 trillion. At the same time, in the pursuit of functionality, manufacturers and consumers forget about cybersecurity.

How real is the danger?

If someone had created an IoT security indicator, this device would have long been flashing red. A couple of years ago, Kaspersky Lab set up IoT traps (honeypots) that mimicked various gadgets running Linux. Just a few seconds after honeypot was activated, researchers began registering numerous attempts to connect to an open Telnet port. During the day, the number of unique requests reached tens of thousands.

How prevalent are these attacks? The risk is very real. CSO Online reports that 61% of all organizations have experienced an IoT security breach.

More Read

dreamstime l 140362030
The Role of Predictive Analytics in Forecasting using Business Intelligence
Social Engineering Attacks and Other Cybersecurity Threats to Be Aware of in 2023
MDM Industry Becoming New Standard for IT
Cloud Technology Advances Make Telecommuting Highly Viable
Cloud Automation Drives the Trend of E-Procurement Technology

After analyzing the devices that were looking for open connections, it turned out that there are many industrial systems among them. In general, these devices should be well protected and be “behind the seven seals”. First of all, these were hacked systems for monitoring or controlling processes and equipment in different fields of industry and security. Here, experts found a wide spectrum of devices – from cash terminals in shops, restaurants and gas stations to digital television systems, environmental monitoring systems, security and access control systems, power management, and programmable controllers. We need to understand that these are just basic studies that reveal only the tip of the iceberg.

What is the cause of the problem?

In the world of corporations, everything is very complicated. Here are the reasons:

  • Rapid penetration of IoT solutions and scaling of production infrastructure. Companies see technological innovations and seek to use them more quickly in the pursuit of business process optimization and production. Accordingly, different solutions are implemented without proper cybersecurity controls.
  • Unreliable user authentication systems. Despite the fact that businesses, especially large businesses, use reliable authentication systems, IoT devices usually do not have such systems. Sensors added and switched on, and that is all. In such systems, often, default passwords are used. CNet has found that older devices are most susceptible to hackers, because they are harder to authenticate.
  • The heterogeneity of IoT solutions. There are several thousand companies in the world that manufacture and supply IoT solutions. As a result, systems from different manufacturers could be installed at the same enterprise. These devices could have been checked for information security problems individually, but there was no comprehensive check of the finished infrastructure or even its parts.
  • Super quick design-to-production process. To accelerate product launch, many companies do not create a device from scratch but use pre-made components, including a chip, camera, wireless communication modules, etc. Any of these elements can be hacked. In an ideal situation, the IoT system needs to be tested for several weeks before starting implementation.

So, what to do?

There are many suggestions, here are some of them:

  • Certification of IoT systems
  • Introduction of industry and national security standards (possibly international).
  • When building a new IoT system for your company, it is necessary to carry out a full-fledged security audit by the specialists of the company’s IT department or with the help of outsourced security specialists.
  • Use a multi-layer security software approach which includes antivirus, firewall, intrusion detection tools, virtual private network.
  • Disable IoT debugging features.
  • Implement physical protection of IoT devices.
  • Abandon the practice of creating final systems from the “zoo” of completely different solutions. It is difficult to do it now because of the lack of standards, but over time the situation should improve.
  • Implement reliable user authentication systems.
  • Manufacturers should stop using obviously vulnerable technologies, protocols and software platforms.
  • Use advanced hardware security gateways which include machine learning technologies to effectively protect against zero-day threats.

Final thoughts

The situation is unlikely to change until major consumers of IoT solutions for business – ie, companies and corporations of different levels – want to change it. The market situation will change as soon as we impose higher security requirements for IoT devices.

TAGGED:cybersecuritydata securityinternet of thingsIoTiot cybersecurity
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

microsoft 365 data migration
Why Data-Driven Businesses Consider Microsoft 365 Migration
Big Data Exclusive
real time data activation
How to Choose a CDP for Real-Time Data Activation
Big Data Exclusive
street address database
Why Data-Driven Companies Rely on Accurate Street Address Databases
Big Data Exclusive
predictive analytics risk management
How Predictive Analytics Is Redefining Risk Management Across Industries
Analytics Exclusive Predictive Analytics

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

big data security 2017-18
Best PracticesComputingData ManagementExclusiveRisk ManagementSecurity

The Direst Security Breaches of 2017 and How Data Centers Are Responding

5 Min Read
ExclusiveInternet of Things

Small Devices Will Play a Huge Role in the Future IoT

7 Min Read
CASB
Security

CASBs Help Cloud-Based Businesses Avoid Data Breaches

6 Min Read
iot based indoor mapping
Internet of Things

4 Incredible Benefits Of IoT-Based Indoor Mapping

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?