The Internet of Things (IoT) is the network of physical objects accessed through the Internet that can identify themselves to other devices and use embedded technology to interact with internal states or external conditions. The IoT is an environment where an object that can represent itself becomes greater by connecting to surrounding objects and the extensive data flowing around it.

When we talk about interconnection, we usually think in terms of computers, tablets and smartphones. IoT describes a world where just about anything can be connected and communicate in a “smart mode” by combining simple data to produce usable intelligence. With the IoT, the physical world is becoming one big information system with an ultimate goal of improving quality of life and empowering new business models.

However, this also means that more personal information and business data will exist in the cloud and be passed back and forth through thousands of devices that may have exploitable vulnerabilities. One weak link in the security chain could provide hackers with nearly limitless doorways that could potentially be unlocked and lead them to data.

Cybersecurity Landscape for the Internet of Things

Privacy is a serious concern not just in the IoT, but in all the applications, devices or systems where we share information. Even when users take precautions to secure their information, there are conditions that are beyond their control. Hackers can now craft attacks with unprecedented sophistication and correlate information not just from public networks, but also from different private sources, such as cars, smartphones, home automation systems and even refrigerators.

Currently, more things are connected to the Internet than people, according to an infographic from Cisco. It goes on to say that 25 billion devices are expected to be connected by 2015 and 50 billion are slated to connect by 2020. In this quickly evolving world, all the things that connect to the Internet are exponentially expanding the attack surface for hackers and enemies. A recent study showed that 70 percent of IoT devices contain serious vulnerabilities. There is undeniable evidence that our dependence on interconnected technology is defeating our ability to secure it.

The industry needs to learn from its mistakes as it innovates and builds devices to function interconnectedly with the Internet. Many of the best security practices can be leveraged, such as hardening the systems, using secure protocols for communication or installing the latest updates, fixes and patches. Innovators need to consider that future security will be managed automatically by the system instead of users, and designing secure technology will require a new approach and mindset.

Information technology security experts have been warning the public about cyber threats for years, using conferences such as Black Hat to publicize new vulnerabilities in systems and software. At the 2014 Black Hat conference, many discussions were focused on the IoT. Still, users seem not to pay attention to these alerts either because they aren’t particularly knowledgeable on the technical aspects of exploits, vulnerabilities and threats, or simply because they do not care.

To learn more watch the on-demand webinar: Securing the Internet of Things

The Mission of Secure IoT Is Just Beginning

The Open Web Application Security Project’s (OWASP) Internet of Things Top 10 Project aims to educate users on the main facets of IoT security and help vendors make common appliances and gadgets network- and Internet-accessible. The project walks through the top 10 security problems that are seen with IoT devices and discusses how to prevent them. Its list is as follows:

  1. Insecure Web interface
  2. Insufficient authentication or authorization
  3. Insecure network services
  4. Lack of transport encryption
  5. Privacy concerns
  6. Insecure cloud interface
  7. Insecure mobile interface
  8. Insufficient security configuration
  9. Insecure software or firmware
  10. Poor physical security

These types of projects are just the beginning of the future security standards that must be developed to create a network of devices that benefits users in a secure environment.

It seems that capable hackers are everywhere, and their growing focus on the IoT is a natural progression since they are looking to where the world’s data is flowing. The interconnected world is coming, but so are its hackers.

The good news is that the cyber security landscape is already adjusting to the new demands of this widespread network. The bad news is that we are far away from that utopia, where the IoT manages security automatically by the same interconnected devices and provides a safe infrastructure for users and their personal information.

Just as experience has shown us in the past, in a few years, there could be a whole new class of things to worry about in the cyber security field. Hopefully, by then we will have already taken care of the current problems we are facing in the smart IoT network.

More from Intelligence & Analytics

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Despite Tech Layoffs, Cybersecurity Positions are Hiring

4 min read - It’s easy to read today’s headlines and think that now isn’t the best time to look for a job in the tech industry. However, that’s not necessarily true. When you read deeper into the stories and numbers, cybersecurity positions are still very much in demand. Cybersecurity professionals are landing jobs every day, and IT professionals from other roles may be able to transfer their skills into cybersecurity relatively easily. As cybersecurity continues to remain a top business priority, organizations will…

4 min read

79% of Cyber Pros Make Decisions Without Threat Intelligence

4 min read - In a recent report, 79% of security pros say they make decisions without adversary insights “at least the majority of the time.” Why aren’t companies effectively leveraging threat intelligence? And does the C-Suite know this is going on? It’s not unusual for attackers to stay concealed within an organization’s computer systems for extended periods of time. And if their methods and behavioral patterns are unfamiliar, they can cause significant harm before the security team even realizes a breach has occurred.…

4 min read

Why People Skills Matter as Much as Industry Experience

4 min read - As the project manager at a large tech company, I always went to Jim when I needed help. While others on my team had more technical expertise, Jim was easy to work with. He explained technical concepts in a way anyone could understand and patiently answered my seemingly endless questions. We spent many hours collaborating and brainstorming ideas about product features as well as new processes for the team. But Jim was especially valuable when I needed help with other…

4 min read