March 22, 2018 By Douglas Bonderud 2 min read

The Internet of Things (IoT) is everywhere. Even historically reticent industries such as insurance are now getting in on the act.

A new LexisNexis report found that 70 percent of U.S. insurance companies recognize the value of IoT data from sources such as fitness wearables, connected cars and smart homes. However, just 21 percent have an IoT strategy in place, and 43 percent agree that security will be a major challenge.

Healthcare faces similar obstacles with IoT and cybersecurity. The Royal Academy of Engineering’s “Cyber Safety and Resilience” report found that connected device attacks could have “severe, or even life-threatening, consequences on patient safety.” It suggested that governments should “consider the full range of possible levers for improving cyber safety and resilience, including regulatory and nonregulatory measures.”

A Disconnect Between the IoT and Cybersecurity

More industries now rely on off-the-shelf products to provide critical IoT data. For example, insurance companies often use data from smart thermostats and security systems to customize polices and deductibles, while healthcare agencies might leverage fitness trackers and connected mobile health apps to improve patient outcomes.

As noted by V3, however, researchers at Ben-Gurion University found that most of these devices come with “frightening” security risks. Simple factory resets, hardcoded passwords and easy-to-crack stock access credentials enable attackers to stake a claim to IoT products. In many cases, users aren’t even aware they’ve been compromised.

The result is a disconnect between data and danger: Companies recognize the need to leverage new IoT offerings as a way to collect actionable insight, but risk unwittingly exposing both consumer information and corporate networks to device-driven threats.

Purpose-Built Problems?

As noted by Internet of Business, companies also face challenges when it comes to securing hardware that is now part of IoT networks but was never designed to perform in a connected environment. This includes legacy devices in supervisory control and data acquisition (SCADA) and industrial control systems (ICS) that were purpose-built to handle industrial controls across corporate intranets. Suddenly, these devices, which lack the basic security features necessary to safeguard key data, are part of larger cloud deployments.

Pair these devices with newly designed IoT sensors and controls across industrial machinery, and it’s a recipe for disaster. Both new and old deployments alike are susceptible to low-tech, high-volume attacks.

The Government’s Role in Improving IoT Policy

So how can organizations strike a better balance between the IoT and cybersecurity? Researcher Yael Mathov of the Ben-Gurion University team hopes to “hold manufacturers more accountable, and help alert both manufacturers and consumers to the dangers inherent in the widespread use of unsecured IoT devices,” as quoted by V3. While this is a noble goal, current IoT forces favor speed over security — first to market often means better sales even if security features must be added after the fact.

Another option is government regulation. As noted by Informaton Age, the U.K. government recently released a new set of IoT manufacturing measures that require device-makers to ensure that passwords are unique and can’t be reset to factory defaults, and to encrypt all data transmitted by IoT applications. In addition, the government’s Security by Design review mandates that manufacturers create a clear point of contact for security researchers to report issues to as they emerge.

The intersection of the IoT and cybersecurity represents a risk for industries even as the data generated by connected devices becomes critical for long-term success. Government regulations aim to help organizations in insurance and other industries shift the IoT landscape toward better security practices.

More from

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today