Emerging technologies, including smart devices, machine learning, and the advent of 5G networks are powering new efficiencies in the Internet of Things (IoT). Analysts expect the total number of installed IoT connected devices to explode, with one projection estimating more than 75 billion worldwide by 2025.1 With so many devices connecting to the Internet from both home and business networks, it’s important to pay attention to data security.
IoT devices often share the same networks used for our desktop computers and laptops. Traffic and data from devices like wearables, digital home assistants, and cameras, move freely and, in most cases, unencrypted over the network—and unfortunately their security vulnerabilities are well-known by hackers. Most IoT devices are connected 24/7 and have “significant bandwidth available, making them attractive targets for conscription into Distributed Denial of Service (DDoS) botnets.”2 Additionally, cybercriminals use these devices to enter enterprise or home networks, gather confidential data, and compromise privacy.
There are many known IoT device vulnerabilities, including unprotected network services and data transfer, lack of software updates or patches, and widespread use of insecure default settings. There is also an uptick in malware attacks on IoT devices that target devices running on old operating systems with known or guessable default passwords. For example, in June 2019, a 14-year-old hacker used the Silex malware to shut down more than 4,000 insecure IoT devices.3 Many security analysts believe these types of attacks against IoT devices will continue to evolve.
Many IoT devices lack the ability to update or patch software, leaving personally identifiable and sensitive data permanently at risk and exposed to cybercriminals. As it stands now, too few IoT devices have basic security measures in place, such as data encryption. Some wearable devices contain vulnerabilities that have allowed hackers to track a user’s location, listen in on conversations, and even communicate with the user.
As the number of connected IoT devices continues to grow, so will the amount of data they generate. Fortunately, there are a number of steps you can take to secure your IoT devices and protect your privacy. Below are seven ways to minimize risk when using IoT devices:
CyberScout®—We’ll take it from here.™
This content provided by CyberScout. CyberScout is leading the charge against hackers and thieves, providing identity management, credit monitoring and cyber security for more than 17.5 million households and 770,000 businesses. Barton Mutual is proud to partner with CyberScout for our commercial and family cyber insurance products.
1 Statista, “Forecast Market Size of the Global Smart Home Market from 2016 to 2022,” February 19, 2020
2 Security Magazine, “The Rise of the Internet of Things,” January 20, 2020
3 Threatpost, “Thousands of IoT Devices Bricked by Silex Malware,” June 27, 2019