https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Thinkstock

Digital lock icon and city background, concept of data security

10 IoT security concerns to keep in mind

Addressing security in the Internet of Things realm requires a multifaceted approach.
  • Written by Brian Buntz
  • 19th October 2017

It wasn’t long ago that the Internet of Things seemed to be a fad and projections of billions of connected devices seemed like a gross exaggeration. But the technology is now beginning to become ubiquitous in the enterprise and industrial realm. Smart TVs are becoming a staple of boardrooms, and internet-connected HVAC, surveillance cameras and lighting systems are commonplace.

While the rise of IoT in the modern workplace may be novel, several of the most common security weaknesses plaguing IoT devices aren’t exactly new. But addressing IoT security concerns is not the same as traditional IT security; it requires keeping track of an array of considerations, including the following 10 items:

Poor mobile security

“The common IoT vulnerabilities that I often see tie into poor security on mobile applications,” said Deral Heiland, a veteran penetration tester (pictured below) who leads Rapid7’s IoT security division. “One of my biggest gripes is data being stored on mobile apps.” While saving data on iOS is likely less risky than on Android, storing sensitive data on any mobile device is less than ideal. What happens if a worker simply loses a smartphone with valuable data on it that isn’t backed up elsewhere?

Storm clouds on the horizon

The cloud is often another weak link in IoT implementations. “Cloud APIs for IoT devices are probably worse than normal web APIs when it comes to security,” Heiland explained. “I think part of the problem is that most of the developers look at the communications between IoT devices and the cloud APIs as machine-to-machine communication.”

The threat of default credentials

And then there’s the risk that IoT devices have not-so-secret backdoors that can be accessed using default usernames and passwords. “Companies should be asking: ‘Are we doing proper authentication and encryption of our communications?'” Heiland advised. “You could have someone Telnet onto a nonstandard port and use a default password. Mirai kind of brought that risk to light.”

Weaponized standard devices

One IoT security concern is that common devices such as smart TVs and printers can become threat vectors. “There are potentially significant security issues around multifunction printers,” Heiland explained. “I consider the current printers to be very IoT-driven. We have used printers during assessment to gain access to organizations’ networks and also to exfiltrate data.”

The difficulty of loading agents onto IoT devices

“A big challenge we see is that you can’t put agents [such as antivirus software] on many IoT devices,” said Yevgeny Dibrov, CEO and co-founder of Armis Security (pictured below), an IoT-focused security startup. “So a lot of companies don’t have the equivalent of endpoint security for every connected device whether they are printers or security cameras or something else. How do you know if one of these devices is doing something it shouldn’t be doing?”

 

The threat of rogue IoT devices

Another IoT security concern is the growing prevalence of rogue connected devices hidden within enterprises secretly surveilling the network. “We are seeing this more and more,” Dibrov said. “We are seeing rogue IoT devices, for instance, Raspberry Pi or Wi-Fi Pineapple devices. This is a popular attack vector because it is so easy. An attacker can take one of these devices and go to Midtown Manhattan and make hundreds of devices connect to a rogue device — including mobile devices belonging to financial institutions and other types of companies.”

A lack of network awareness

A related problem is that many organizations aren’t fully aware of what is on their network and thus can’t judge if they have misconfigured IoT devices or rogue devices. It is often difficult to maintain a dashboard-like view of all the devices on the network. “In our experience, many organizations can only see about 60% of their connected devices in their environment,” Dibrov explained. “We see this problem across organizations, whether they are in healthcare, manufacturing, the tech field or the financial sector.”

Radio frequency concerns

Ultimately, the field of IoT security is a multifaceted, far-ranging discipline. Heiland recommended exploring the entire ecosystem, which includes all the above factors as well as considerations like vulnerabilities posed by specific radio frequency communications. Bluetooth 5, for instance, supports mesh networking, potentially enabling an attacker to target a single Bluetooth device and spread malware across the entire mesh network.

Armis recently discovered a Bluetooth-related vulnerability dubbed “Blueborne” that could potentially affect numerous IoT devices.

IP worries

Manufacturers of IoT devices guarding intellectual property may want to consider protecting the firmware of their products. “For companies where IP is important, they don’t want someone easily getting the firmware off the device,” Heiland said. “That is something we often test.”

Many manufacturers of IoT devices take a lackadaisical approach to protecting intellectual property, failing to use cryptography-based protection that is available on the hardware they use. “We have seen that oftentimes organizations don’t use built-in protection that exists on some of their chipsets.”

Staying realistic about IoT security risks

As a growing number of security researchers are beginning to focus on the Internet of Things, some of their findings pose more of a theoretical risk than an actual one — for now. “I have read some pieces on the concept of using smart lighting to exfiltrate data by compromising an internal network. Can we get a light in a room to fluctuate enough to transmit data?” Heiland asked. “In the test environment, it is very doable. In the real world, it has still not been proven yet — at least that we know.”

While security researchers continue to uncover an array of IoT security concerns, Heiland stressed the importance of having a realistic perspective. “People ask me, ‘What should I do about all of these vulnerabilities that are coming out?’ And I say, ‘All of these vulnerabilities are coming out because of people like me. We are not trying to find these vulnerabilities to ruin peoples’ lives. We are out there trying to find them so we can get them fixed.'”

Tags: Article Security Technologies

Related


  • 3d rendering of human brain on technology background
    AI Ups the Ante for IoT Cybersecurity
    Security providers in IT and OT have implemented AI, ML and other advanced technologies to make systems smarter than malicious attackers.
  • IoT security
    Protecting Your Network Against Ripple20 Vulnerabilities
    Early this year, Ripple20 wrought havoc on numerous IoT devices, given vulnerable third-party code. Here are ways to prevent your organization from the fallout.
  • IoT security
    IoT Security Trends, 2021: COVID-19 Casts Long Shadow
    While some IoT security trends in 2021 will continue trends from 2019 and 2020, COVID-19 has brought some new threats to the fore.
  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • COVID-19 Driving Data Integration Projects in IoT
  • Intro to LynxSecure
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Cybersecurity Crisis Management During the Coronavirus Pandemic

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @aicas_IoT — a flexible, more efficient approach to embedded realtime application… twitter.com/i/web/status/1…

4th March 2021
IoTWorldToday, IoTWorldSeries

Microsoft Ignite 2021: Innovation in COVID-19 Era Signals Future Trends dlvr.it/RtwYcg

4th March 2021
IoTWorldToday, IoTWorldSeries

At Microsoft Ignite: How IoT and Robotics Are Driving Industry 4.0 dlvr.it/Rttgwj

3rd March 2021
IoTWorldToday, IoTWorldSeries

🎙️ Introducing #EIOTWORLD speaker, Obinna Ilochonwu, Industrial IoT Architect at Schlumberger. 📅 Join his session… twitter.com/i/web/status/1…

2nd March 2021
IoTWorldToday, IoTWorldSeries

#Smartbuilding technology lays the foundation for #energyefficiency efforts but also new COVID-19 goals, such as… twitter.com/i/web/status/1…

2nd March 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X