I recently bought a fitness band to track my daily workouts and quickly got hooked. The invaluable insights it provided through data analysis, coupled with the constant reminders it pushed out to help me achieve my fitness goals, got me thinking about how the Internet of Things (IoT) is transforming our way of life and shaping our future.

However, my enthusiasm for the fitness band waned somewhat when I read a piece on the IoT security issues it posed. Did you know that cybercriminals can track the movements of your wristband to steal your ATM personal identity number (PIN)? In fact, the success rate can be as high as 90 percent, according to recent research. I was so nervous about the potential consequences that I immediately abandoned my band.

Perhaps that was a bit of an overreaction. After all, certain devices do take steps to protect user identities. The Apple Watch randomizes the media access control (MAC) address of its user every 10 minutes to protect identities, for example, and many wearables regularly update devices and their corresponding mobile apps to close security holes and fix bugs.

Better Safe Than Sorry

By 2025, according to GSMA, the world will have approximately 27 billion connected devices, all of which will need to be reliable and secure. As we move to a more connected world, cybersecurity risks increase manifold. The rising volume of ransomware attacks is proof that digitally connected devices not only pose a financial risk, but also can threaten human lives if breached.

Security professionals, device manufacturers and users alike must be cognizant of the risks that connected devices, including my seemingly innocuous little fitness band, expose us to. We need to minimize these risks if we intend to adopt this life-transforming IoT technology. According to Markets and Markets, the global IoT security market is expected to grow from $6.62 billion in 2017 to $29.02 billion by 2022, at a compound annual growth rate (CAGR) of 34.4 percent during the forecast period.

As more people invest in wearable devices and start paying attention to IoT security, there’s a better chance manufacturers start building in safeguards. In this case, market competition is a good thing: The fitness bands of tomorrow could set themselves apart by offering stronger security controls and enhanced privacy.

IoT Security Is a Shared Responsibility

Increased security awareness is the first step toward fighting IoT threats. Both manufacturers and end users should take equal responsibility to stay protected and minimize security lapses. For example, various layers of cloud, application and network security offerings need to be secured by the manufacturer or vendor. They should ensure that the IoT devices they produce adhere to stringent compliance regulations. Finally, vendors should always plan manual overrides for automated systems in case of a security breach.

As consumers, we must be aware that poor security hygiene is all most attackers need to breach a system. After all, 95 percent of all security incidents involve human error, according to the “IBM Security Services 2014 Cyber Security Intelligence Index.” We should never underestimate the value of using strong passwords, changing default passwords and installing firewalls. Additionally, antivirus, antiphishing and two-factor authentication solutions can go a long way. Most importantly, users should be cautious when clicking on unknown links and use encryption to protect sensitive data from unauthorized access.

Data is a gold mine for cybercriminals, so it’s time we start protecting our devices by any means possible. Vigilance and preparation are the best ways to stay ahead of the bad guys.

Listen to the podcast series: Five Indisputable Facts About IoT Security

More from Endpoint

Deploying Security Automation to Your Endpoints

Globally, data is growing at an exponential rate. Due to factors like information explosion and the rising interconnectivity of endpoints, data growth will only become a more pressing issue. This enormous influx of data will invariably affect security teams. Faced with an enormous amount of data to sift through, analysts are feeling the crunch. Subsequently, alert fatigue is already a problem for analysts overwhelmed with security tasks. With the continued shortage of qualified staff, organizations are looking for automation to…

Threat Management and Unified Endpoint Management

The worst of the pandemic may be behind us, but we continue to be impacted by it. School-aged kids are trying to catch up academically and socially after two years of disruption. Air travel is a mess. And all businesses have seen a spike in cyberattacks. Cyber threats increased by 81% while COVID-19 was at its peak, with 79% of all organizations experiencing a loss of business operations during that time. The risk of cyberattacks increased so much that the…

3 Ways EDR Can Stop Ransomware Attacks

Ransomware attacks are on the rise. While these activities are low-risk and high-reward for criminal groups, their consequences can devastate their target organizations. According to the 2022 Cost of a Data Breach report, the average cost of a ransomware attack is $4.54 million, without including the cost of the ransom itself. Ransomware breaches also took 49 days longer than the data breach average to identify and contain. Worse, criminals will often target the victim again, even after the ransom is…

How EDR Security Supports Defenders in a Data Breach

The cost of a data breach has reached an all-time high. It averaged $4.35 million in 2022, according to the newly published IBM Cost of a Data Breach Report. What’s more, 83% of organizations have faced more than one data breach, with just 17% saying this was their first data breach. What can organizations do about this? One solution is endpoint detection and response (EDR) software. Take a look at how an effective EDR solution can help your security teams. …