Your loT “Smart Devices” Are a Security Risk: Here’s What To Do
loT (aka, Internet of Things) devices are everywhere, and so is malware. It only fits that many loT devices you may use are vulnerable. Let’s break...
2 min read
Megan Schutz August 9, 2021
Let’s start with a simple question for those that may not know: what are loT devices and why are we talking about them?
loT stands for Internet of Things (IoT). IoT devices are pieces of hardware, such as sensors, actuators, gadgets, appliances, or machines that are programmed for certain functions and can transmit data over the internet or other networks. Simple examples of loT devices include smart mobiles, smartwatches, smart door locks, fitness trackers, smart security systems, smart doorbells, smart Wi-Fi cameras, and more.
It is essential to talk about loT devices because they’re primarily consumer-oriented, and businesses are beginning to install them without proper vetting.
Attacking IoT devices is an ongoing trend, as over 20 billion of them are connected to the internet. Cybersecurity is typically the last thing on these device manufacturers’ minds because they target consumers looking primarily for low-cost and visual appeal over reliability and security.
Consumers take more risks, but businesses cannot.
Businesses are starting to use IoT devices more frequently, posing a serious problem: they’re deploying very insecure products. Consumers accept much more risk, as the worst case for the consumer is still relatively minor. Businesses, on the other hand, have a lot to lose. loT has been consumerized to the bone, and the majority of solutions have not been made safe for businesses (yet).
While we are not the gods of technology, we’ll give you our take on the evolution of loT, and you can take it for what it is–an opinion on a new type of technology that is still evolving in the way individuals and businesses interact with it.
Like any new technology, consumers seem unable to resist the new features loT provides, adding to its growth and demand. Many new business technologies have roots in consumer products; manufacturers test on consumers, improve it, and make a more robust and secure business offering. Examples: Google Gmail preceded Google Workplace, Apple iPod preceded the iPhone with corporate email integration, and attractive thin consumer laptops lead to the slick-looking Microsoft Surface Pro, Macbook Pro, and the Lenovo ThinkPad Carbon.
When consumers go to work, they want the convenience and slick designs they’re accustomed to at home. The result: consumers drive business technology trends, and now IoT is showing up at work.
So, let’s talk about using loT as a business.
Do a mini IoT risk assessment for each device:
Remember, as with deploying any new IT system at your organization, you always need a big picture approach. The “plug in and go” method of installation rarely turns out well. This holds for organizations looking to deploy loT devices. Ensure your security team is at the core of the deployment plan and maintains security as your top priority over additional features and quick additions. A long-term approach to new systems and IT security will provide your organization with a competitive advantage over time.
Questions about the use of loT devices at your organization? Let’s chat. Contact PK Tech here.
loT (aka, Internet of Things) devices are everywhere, and so is malware. It only fits that many loT devices you may use are vulnerable. Let’s break...
Work-from-home status has become a reality for most employees. For employers, this means learning to mitigate a constantly evolving cybersecurity...
Known for cocaine smuggling and gang-related crimes, Ecuador faces a new threat type: USB letter bombs.