loT (aka, Internet of Things) devices are everywhere, and so is malware. It only fits that many loT devices you may use are vulnerable. Let’s break down what to be on the lookout for.
If you need a refresher on IoT, check out our related blog: Are Internet-connected Consumer-grade Devices (IoT) Safe For Work?
First of all, it’s important to note a necessary fact about loT devices: they come with default passwords, making them highly vulnerable to simple attacks. While many of us know strong passwords for logins are essential, we don’t always think about the default password function within loT devices. Most are programmed with generic default passwords such as “12345” or “admin.” NordPass recently surveyed users and found that only 33% of users changed the default passwords on their loT devices (source). This is a BIG problem for users. Leaving the default password in place (typically unknowingly) makes them susceptible to attack.
According to the Survey, loT devices pose other vulnerabilities as well. Of the users surveyed, here were the key findings:
In the sea of cyber attacks and vulnerabilities, attackers look for easy and predictable entry points to perform their attacks. Insecure loT devices continue to be a prime opportunity for this.
So, what are we to do?
If you are thinking about acquiring loT devices for your business, please read our related blog here. Reach out if you have questions here.