IoT devices were popular gifts again this holiday season. An acronym for Internet of Things, IoT is more than a buzzword. The trend represents a huge shift in how products are made and used, as network connectivity is added to products that were not previously intended to have this functionality.
Reports are emerging that a consumer-grade network attached storage (NAS) device owned by Rice Consulting, a fundraising firm working primarily with the Democratic Party in the US, containing client data and passwords giving access to other organisations, was left publicly accessible.
Both Cisco and Ericsson forecast there will be approximately 50 billion connected devices in operation globally by 2020. Whatever the exact figure, we can predict one certainty: IoT will play an increasingly dominant role in our lives, redefining them as we know it.
Up to now, individuals have generally been using a dedicated computer for work; now, however, the Internet of Things (IoT), with billions of networked devices that are for the most part not monitored by humans, presents enormous inherent security risks.
In a society where connectivity is everything, our expectations of technology are constantly increasing and changing. It is estimated that there will be 20 billion connected devices by 2020, the data gathered in this IoT era is helping businesses stay relevant, understand their customers more fluently and improve various parts of their lives.
Having set up petcams in my home to remotely monitor my new puppy’s behaviours with my 4G smart device when I am out, I was reminded about Shodan, the search engine that looks for IoT devices such as webcams and makes their streams available for viewing by anyone on the internet.
Innocuous devices that the Internet of Things search engine Shodan recently found to be vulnerable to cyber attacks include a teddy bearable to remotely send voice messages and a doorbell with a video monitor that can be remotely accessed by a phone. Unchanged default passwords and poor app configuration were discovered as the most prominent flaws affecting these devices.
The ability to hook devices or machines up to the internet helps critical infrastructure providers speed up manual processes, increase productivity, and grow the business. However, connecting to the Internet eliminates the “air gap” that kept critical networks safe for years, placing them within reach of cyber attackers.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.