IoT Will Change (Almost) Everything In Cybersecurity

The Internet of Things is growing fast, with an estimated 8.4 billion devices expected to be connected this year. 

As a result of that rapid expansion, the IoT is reshaping the way in which we think about corporate cyber-security by increasing the attack surface, potentially adding billions of network points of entry for cyber-criminals, each one an additional target to be compromised. 

Gartner put security at the top of its list of the top 10 IoT technologies for 2017 and 2018, and recent research validates the high priority of cybersecurity and connected things among businesses. One recent survey at Black Hat USA 2016 revealed 70 percent of IT experts who responded indicated that their organisation wasn't prepared for IoT-related threats.

While these statistics are real, there also exists a great deal of hype in the market, painting a grave portrait of the IoT and its unique requirements as the grim reaper for businesses. IoT security is a real concern, with open-source cyber-threats like Mirai already showing its potential, but businesses shouldn't believe every scary tale they hear. An attack on any one endpoint doesn't necessarily have to mean all systems are compromised or crippled.

Organisations looking to build or adopt connected devices should educate themselves on how additional endpoints change their threat-scape, and should seek to address a few key questions:

What New Vulnerabilities Is the IoT Creating for the Network? 

New vulnerabilities are created not just by the expansion of entry points, but by the nature of those entry points. Some of the more common vulnerabilities and concerns that businesses need to prepare for include:

• Insecure Web interfaces: "Internet" is in the name, so step one of IoT security is to make certain the connections themselves are secure. 
• Insecure endpoints: Each endpoint is open to an attack, so any that aren't equipped with antivirus software could be infected with malware, opening up the gates to the rest of the network. Businesses will need to keep a watchful eye on how endpoints are behaving and interacting with the rest of the network. 
• Mobile interfaces: The IoT happens everywhere, so ensuring a secure mobile strategy is imperative, including monitoring credentials and any accidental exposure.
How can Business address IoT security/vulnerabilities? 
The changes to the attack surface aren't beyond our abilities to address. Business can do a few simple things to increase their IoT security from the start:
• Change all default passwords. Simple cybersecurity best practices, like always resetting default passwords, will continue to be a vital first step in the age of the IoT. 
• Like changing the password, using an encrypted connection whenever one is available is generally a good cybersecurity rule of thumb that helps to mitigate the risk of attack on the many endpoints within the IoT.
• Create guidelines to quickly call out anomalous behavior of sensors. Sensors perform a very specific task or set of tasks, so detecting any suspicious behavior should be relatively simple if the technology and personnel monitoring the network understand which behaviors are authorized upfront.

How Is the IoT Changing the Future of Securing Businesses? 

In many ways, securing an IoT-enabled business requires much of the same, but the game has changed in that the sheer volume of endpoints, and thus the area to secure, is quickly multiplying. Businesses will need to move beyond traditional network and endpoint security, and be diligent in monitoring all network connections. 
Detection and response strategies will need to become more closely integrated with cybersecurity practices, and IT departments will be most effective by combining the power of technology and human oversight to keep a watchful eye over expanded attack surfaces.

This is particularly true for new and emerging threats, and an overreliance on technology will result in undue complacency, which is exactly what the cybercriminals want in prospective targets.

IoT Journal:

You Might Also Read: 

Internet of Things Brings Threats To Security:

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks:

Data Breaches & The Internet of Things:

Guide To The Internet of Things:

 

« Information Security Forum Launches - Threat Intelligence Report
Facebook Deploys AI To Block Terror Propaganda »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government.

BotGuard

BotGuard

BotGuard provides a service to protect your website from malicious bots, crawlers, scrapers, and hacker attacks.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.