IoT and Cybersecurity
Updated: May 23, 2019
By Tom Goodwin
The IoT (Internet of Things) is a growing phenomenon and provides a plethora of benefits, including life-saving medical devices, logistics vehicle/aircraft data, and real-time condition of power grids. According to IDC there are over 13 billion connected devices in use worldwide, and that number could expand over the next few years to 30 billion. A worrisome trend regarding IoT devices is their vulnerability to cyber attacks. With the growing popularity and the rapid proliferation of these devices, the benefit of gaining high volumes data rapidly is fueling this growth. However, the increased use and higher availability of IoT devices makes tracking malware or any other type of harmful invasion of extremely difficult. IoT Devices are Vulnerable Currently, the use of sensors and internet-connected devices to capture useful information is risky. Often devices lack even basic security features or are used with default passwords and configurations, leaving them open to hackers, data skimmers and even botnet attacks. With all these vulnerabilities, these devices are literally creating a hole in security programs.
Example: A new IoT device is introduced, and businesses that rush to stay up-to-date implement it.
Problem: Old devices are still connected but not up-to-date. Firmware updates never happen because the old devices are forgotten.
Risk: Intruders infiltrate one of these older devices and gain access to data - or worse -take control of other connected devices, creating havoc.
To mitigate this problem, the benefits of gaining more data quickly must be balanced with effective security features that protect not only the data but devices on the network as well. This is especially true for industries that have already embraced IoT devices, and are enjoying the benefits of using the IoT to generate the data they need, processing it with sophisticated analytics engines, and creating create useful Business Intelligence (BI). Security Risk Management (SRM) Companies in these verticals are addressing IoT Security challenges by treating the it like all other connected products with appropriate security policies. These policies may include different security protocols for established devices verses IoT devices because many new IoT devices experience a constant “on” and data feed. The HigherGround platform can capture this new type of metadata and is prepared to incorporate a flexible security plan. Built on standard OS platforms, our systems can be adapted to meet changing security needs. For more information on our secure, reliable, and cost-effective solutions:
CONNECT WITH US on Twitter, Facebook, and LinkedIn to discuss the use of IoT devices and their security vulnerabilities!
About the Author - Tom Goodwin is the Vice President of Marketing at HigherGround. His background in telecommunications and data networking has been augmented with work in data analytics and automated reporting prior to joining HigherGround. Click here for more information on Tom and the rest of the HigherGround team!
HigherGround, Inc. provides best-in-class, reliable data capture and interaction storage solutions that enable clients to easily retrieve critical information. Our interaction recording and incident reconstruction solutions transform data into actionable intelligence, allowing optimization of operations, enhanced performance, and cost reduction.