Is Your Internet of Things a Security Risk?
MacguyverTech
We Build Useful, Usable Products that Push the Limits of Technology and Innovation.
In today’s business world, cybersecurity is of utmost importance. Firewalls, complex passwords, multi-factor authentication, honeypots, PVA and a myriad of other processes work together to create a company’s cybersecurity. And it almost invariably takes smartphones into consideration, as we discussed?here. But what about your devices?other?than phones? Is Your Internet of Things a Security Risk??
First, let’s get a feel for how vast?an Internet of Things (IoT) can be. Let’s use an example of a young professional’s typical workday morning. We’ll refer to this person as Fred.??
Fred wakes up at 7:00 am, picks up his phone, puts on his Apple Watch and starts his day with a cup of coffee in his Smart Keurig. He then puts in his earbuds and works out by riding 5 miles on his new Cannondale bike. He returns home, showers, and checks out his new Bluetooth speaker in his showerhead. He gets dressed, orders more coffee pods through his Echo speaker, drives to the train station, and gets on the train to work.?
Fred’s IoT consists of at least eight smart devices before he even gets on the train. His watch, coffee maker, earbuds, bicycle, shower, Echo device and automobile each have connectivity to the Internet through Wi-Fi, Bluetooth or GPS (or all of the above), and interact with Fred’s phone, sharing data. Unfortunately, every single one of those things can be a point of attack for hackers.?
Once on the train, Fred is now connected to a public hotspot, and within Bluetooth range of hundreds of other riders using public transportation. Through methods called Bluebugging and Bluejacking, Fred’s phone can be compromised (including contacts, e-mail accounts, credit card information, and passwords). After a 30 minute train ride, Fred walks into his place of business, and his phone automatically connects to his company’s Wi-Fi network.?
Is this a dramatization? Of course. But there are bad actors out there who will scour for any opportunity to steal data, gain passwords, and compromise any system they can. “It’s important for your employees to stay on top of their personal security,” says MacguyverTech CEO Steve (Mac) McKeon. “updating software is always important, because our personal devices are rarely as secure as a business. Once your devices are compromised, they can compromise a business as well.”?
To mitigate these risks, it is important to take steps to secure your IoT devices. Some of the best practices for IoT security include:?
Use strong passwords and authentication:?Your IoT devices often have password requirements (or authentication requirements). Use them.?
领英推荐
Keep devices up to date:?Keep IoT devices up to date with the latest software patches.??
Use a firewall:?Use a firewall in your home to protect IoT devices from unauthorized access.?
Be careful what you connect to the Internet:?Only connect IoT devices to the internet that you trust.?
As for your business, it’s imperative to regularly monitor your cybersecurity to make certain someone’s IoT device hasn’t caused an issue. “We offer a Persistent Vulnerability Assessment (PVA) to our clients,” says McKeon. “There are so many potential points of entry on a network today, and hackers will infiltrate through any means they can find. A PVA checks continuously, because what’s secure today might not be secure in a week or a month.”?
For more information about hacking, IoT, software, and all things cybersecurity, visit the?MacguyverTech homepage.?
For more information about the MacguyverTech PVA service, visit the?PVA page.?