January 9, 2015 By Shane Schick 2 min read

The potential benefits of bringing online connectivity to everyday objects as part of the Internet of Things may be extensive, but so are the privacy and security risks, the chairwoman of the Federal Telecommunications Commission (FTC) warns.

Speaking at the Consumer Electronics Showcase (CES) in Las Vegas this week, FTC Chairwoman Edith Ramirez said she was concerned about the way sensor networks would be used to collect, manage and store information, the Wall Street Journal reported. Among the dangers, she noted, were the possible ways in which the Internet of Things might expose more information for cybercriminals to target through a variety of means.

Over the years, the CES has evolved far beyond its origins as a place for basic household appliances to an exhibition filled with emerging technology, from power smartphones to wearable devices and even washing machines. This year, the Internet of Things was a major theme. Experts say even an alarm clock or a refrigerator could now be set up to convey information about its energy use or need for new parts through an app or a signal back to the manufacturer.

According to an article on SlashGear, Ramirez acknowledged that the Internet of Things could make life better for consumers. In order for companies to succeed, however, she said they will first have to ensure their customers are comfortable that the information that travels via Internet Protocol connectivity is truly safe. That should be the top priority as new products and services make their way from CES to the mainstream market.

While public officials sometimes speak in generalities about these types of issues, Computerworld noted that Ramirez had some highly useful ideas about helping consumers avoid putting themselves at risk. For example, she said that besides encryption, companies should make sure any default passwords aren’t so basic that they could be easily guessed by cybercriminals. This has already been a problem with home routers, which some cybercriminals have been breaking into to gain access to Domain Name System settings.

Ramirez suggested that companies should hold off on collecting data now when consumers don’t realize what’s going on and when the use of the data isn’t clear, according to MicroScope. This “just-in-case” mentality is dangerous because it builds up a treasure trove for cybercriminals who would have no trouble coming up with their own ideas for profiting from it.

According to New York Daily News, Ramirez’s bottom line was to design security into the Internet of Things from the get-go and conduct thorough testing long before it is launched. CES gets the world excited about what’s next. The problem is that in some cases, the cybercriminals get excited, too.

More from

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

Security roundup: Top AI stories in 2024

3 min read - 2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been exploring new ways to compromise systems with intelligent attacks.With the AI landscape rapidly evolving, it's worth looking back before moving forward. Here are our top five AI security stories for 2024.Can you hear me now? Hackers hijack audio with AIAttackers can fake entire conversations using large language models (LLMs), voice cloning and speech-to-text software. This method is relatively easy to…

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today