BYOD & the Internet of Things: Security Risks Businesses Need to Know
The Internet of Things (IoT) is an emerging technology trend that will fuel an explosion in the number of Internet-connected "smart" devices in the coming years. While the IoT will largely be a boon to businesses, it will also present new security risks which must be carefully assessed prior to the implementation of these technologies.
One of the key issues is that, at present, there are no security regulations in place for IoT technology developers. With businesses using an increasing number of "smart" devices in the workplace, it's important to understand how IoT security risks interact with bring-your-own-device (BYOD) policies. In this regard, the overall message is clear: the current landscape is unpredictable, and companies are vulnerable to cyber threats.
Here's a look at three specific security threats presented by the rising popularity of the IoT:
Fitness Programs
An estimated 80 percent of the world's major corporations support employee wellness programs by offering fitness tracking technologies to their employees. These BYOD, IoT-enabled devices have a down side: they enable hackers to track the locations of employees based on data collected and transmitted by these devices.
In a worst-case scenario, it is possible for a dedicated black-hat hacker to identify high-ranking employees based on location data collected from these devices. From there, it could be just a hop, skip, and jump to highly sensitive data, which could be extracted from other BYOD devices used by targeted employees.
Network Hotspots
Companies that allow guest access to wireless networks leave themselves vulnerable to the possibility of a visitor leaving behind a digital fingerprint that could then allow a malicious hacker access to the company's private network. Unfortunately, there are very few ways for IT security teams to neutralize these types of threats right now, so companies should be very careful to implement guest network access policies that prioritize operational security.
Bluetooth Connectivity
The vast majority of IoT-enabled technologies aren't detected by conventional approaches to internal WiFi security. It is theoretically possible for a hacker to identify and compromise Bluetooth-connected devices that run over an IoT network. This method of cyberattack could enable the hacker to acquire sensitive information, or even listen in on boardroom proceedings in real time -- both of which represent major threats to a company's safety and security.
While most industry insiders expect that IoT security regulations will tighten once these technologies gain a widespread foothold, they represent a dangerous grey area right now. It's very important for businesses to be aware of all the potential security risks presented by BYOD and IoT-enabled devices, and to implement regulations which protect sensitive information from hackers.
by Matt DeGennaro
MPD President
732-236-6161 email
Founder & CMO, ondemandCMO. Positioning, Messaging, Go to Market SME| Award-winning Author. Speaker. Podcaster. Advocate | Why Institute Certified Coach. WBENC-certified.
9 年great post Matt...I don't think the average lay person things of the vulnerabilities they create with internet enabled devices but it is certainly on the minds of the enterprises adopting a BYOD policy. mdm
Managing Partner at Nacimento Holdings
10 年Matt, Really well written and points out some really common risks all enterprises should consider. Thanks for the post