The Internet of Things (IoT) is the network of physical objects accessed through the Internet that can identify themselves to other devices and use embedded technology to interact with internal states or external conditions. The IoT is an environment where an object that can represent itself becomes greater by connecting to surrounding objects and the extensive data flowing around it.

When we talk about interconnection, we usually think in terms of computers, tablets and smartphones. IoT describes a world where just about anything can be connected and communicate in a “smart mode” by combining simple data to produce usable intelligence. With the IoT, the physical world is becoming one big information system with an ultimate goal of improving quality of life and empowering new business models.

However, this also means that more personal information and business data will exist in the cloud and be passed back and forth through thousands of devices that may have exploitable vulnerabilities. One weak link in the security chain could provide hackers with nearly limitless doorways that could potentially be unlocked and lead them to data.

Cybersecurity Landscape for the Internet of Things

Privacy is a serious concern not just in the IoT, but in all the applications, devices or systems where we share information. Even when users take precautions to secure their information, there are conditions that are beyond their control. Hackers can now craft attacks with unprecedented sophistication and correlate information not just from public networks, but also from different private sources, such as cars, smartphones, home automation systems and even refrigerators.

Currently, more things are connected to the Internet than people, according to an infographic from Cisco. It goes on to say that 25 billion devices are expected to be connected by 2015 and 50 billion are slated to connect by 2020. In this quickly evolving world, all the things that connect to the Internet are exponentially expanding the attack surface for hackers and enemies. A recent study showed that 70 percent of IoT devices contain serious vulnerabilities. There is undeniable evidence that our dependence on interconnected technology is defeating our ability to secure it.

The industry needs to learn from its mistakes as it innovates and builds devices to function interconnectedly with the Internet. Many of the best security practices can be leveraged, such as hardening the systems, using secure protocols for communication or installing the latest updates, fixes and patches. Innovators need to consider that future security will be managed automatically by the system instead of users, and designing secure technology will require a new approach and mindset.

Information technology security experts have been warning the public about cyber threats for years, using conferences such as Black Hat to publicize new vulnerabilities in systems and software. At the 2014 Black Hat conference, many discussions were focused on the IoT. Still, users seem not to pay attention to these alerts either because they aren’t particularly knowledgeable on the technical aspects of exploits, vulnerabilities and threats, or simply because they do not care.

To learn more watch the on-demand webinar: Securing the Internet of Things

The Mission of Secure IoT Is Just Beginning

The Open Web Application Security Project’s (OWASP) Internet of Things Top 10 Project aims to educate users on the main facets of IoT security and help vendors make common appliances and gadgets network- and Internet-accessible. The project walks through the top 10 security problems that are seen with IoT devices and discusses how to prevent them. Its list is as follows:

  1. Insecure Web interface
  2. Insufficient authentication or authorization
  3. Insecure network services
  4. Lack of transport encryption
  5. Privacy concerns
  6. Insecure cloud interface
  7. Insecure mobile interface
  8. Insufficient security configuration
  9. Insecure software or firmware
  10. Poor physical security

These types of projects are just the beginning of the future security standards that must be developed to create a network of devices that benefits users in a secure environment.

It seems that capable hackers are everywhere, and their growing focus on the IoT is a natural progression since they are looking to where the world’s data is flowing. The interconnected world is coming, but so are its hackers.

The good news is that the cyber security landscape is already adjusting to the new demands of this widespread network. The bad news is that we are far away from that utopia, where the IoT manages security automatically by the same interconnected devices and provides a safe infrastructure for users and their personal information.

Just as experience has shown us in the past, in a few years, there could be a whole new class of things to worry about in the cyber security field. Hopefully, by then we will have already taken care of the current problems we are facing in the smart IoT network.

More from Intelligence & Analytics

The 13 Costliest Cyberattacks of 2022: Looking Back

2022 has shaped up to be a pricey year for victims of cyberattacks. Cyberattacks continue to target critical infrastructures such as health systems, small government agencies and educational institutions. Ransomware remains a popular attack method for large and small targets alike. While organizations may choose not to disclose the costs associated with a cyberattack, the loss of consumer trust will always be a risk after any significant attack. Let’s look at the 13 costliest cyberattacks of the past year and…

What Can We Learn From Recent Cyber History?

The Center for Strategic and International Studies compiled a list of significant cyber incidents dating back to 2003. Compiling attacks on government agencies, defense and high-tech companies or economic crimes with losses of more than a million dollars, this list reveals broader trends in cybersecurity for the past two decades. And, of course, there are the headline breaches and supply chain attacks to consider. Over recent years, what lessons can we learn from our recent history — and what projections…

When Logs Are Out, Enhanced Analytics Stay In

I was talking to an analyst firm the other day. They told me that a lot of organizations purchase a security information and event management (SIEM) solution and then “place it on the shelf.” “Why would they do that?” I asked. I spent the majority of my career in hardware — enterprise hardware, cloud hardware, and just recently made the jump to security software, hence my question. “Because SIEMs are hard to use. A SIEM purchase is just a checked…

4 Most Common Cyberattack Patterns from 2022

As 2022 comes to an end, cybersecurity teams globally are taking the opportunity to reflect on the past 12 months and draw whatever conclusions and insights they can about the threat landscape. It has been a challenging year for security teams. A major conflict in Europe, a persistently remote workforce and a series of large-scale cyberattacks have all but guaranteed that 2022 was far from uneventful. In this article, we’ll round up some of the most common cyberattack patterns we…