'Internet of Things' Security Concerns: How IT Pros Can Save the Day

'Internet of Things' Security Concerns: How IT Pros Can Save the Day

You may think people are the only ones using the internet, right? Wrong. The internet has become a tool all sorts of devices use--smartphones, TVs, gaming systems and even home appliances!

This phenomenon is called the Internet of Things (IoT) and it allows for some pretty amazing technological feats. Want to see who’s at the door without getting up to check? No problem! How about automatically starting the coffee maker when your alarm goes off? Done!

"Each device or gadget that is connected has the potential of being compromised."

But the perks of IoT come with risks you may not have realized. Internet of Things security has become a real concern for IT pros across the industry.

“Each device or gadget that is connected has the potential of being compromised,” says Rob Boirun, manager of VPN service IPinator. He explains that while IoT is meant to simplify our lives, it could ultimately lead to trillions of vulnerabilities.

We spoke to experts in the field to learn about the biggest Internet of Things security concerns and what IT pros can do to prevent breaches.

‘Internet of Things’ security concerns you need to know about

The root of the problem with IoT security is that once one device has been compromised by malware or hackers, all connected devices become susceptible as well. Even more concerning is the lack of regulation when it comes to ensuring the security of IoT devices.

“IoT devices tend to have weaker security protections than regular computers,” says Mike Baker, founder of cyber security service provider Mosaic451. With so many manufacturers in various channels, there are no common controls regarding passwords, encryption or other security measures, according to Baker.

Our experts indicated that these are three of the biggest IoT security concerns:

1. Privacy violations

Many IoT devices have built-in cameras or microphones, such as home security cameras or baby monitors. These cameras are a reassuring way to keep an eye on your home from afar. But in the wrong hands, they can also be used to spy on you and violate your privacy.

In one case, critical vulnerabilities were discovered in a wide range of IoT baby monitors, according to Kevin Shahbazi, CEO of cloud-based security solution LogMeOnce. Hackers were able to access the live video footage, change the camera settings and authorize other users to remotely view and control the monitors.

2. Compromised physical safety

It may sound convenient to have an app that adjusts your home thermostat or controls the lock on your front door. But these conveniences could be used to endanger your physical safety, according to Edward Kiledjian, chief information security officer at Bombadier Aerospace.

A hacker could easily use a compromised IoT device to do everything from unlocking your door and disabling your alarm system to changing your physical environment by turning off your home’s heat, Kiledjian explains. These possibilities can expose families to real physical harm, putting IoT security concerns on a whole new threat level for consumers.

3. Network threats

The average Joe isn’t the only one vulnerable to compromised IoT devices. Unsuspecting businesses are also targets, according to Shahbazi.

“Not only are business owners unaware of what data is stored on IoT devices, but there are also broader issues around what data can be transmitted from these devices and where that data may ultimately end up,” Shahbazi says.

Many companies have started making expensive investments to protect themselves from IoT threats. But it only takes one employee using a connected device on an unsecured network or copying data to the cloud to place a whole business at risk from hackers, Shahbazi explains.

Preventing ‘Internet of Things’ security risks

Our experts agree that the best security fixes lie within the companies that are manufacturing IoT devices in the first place. “Unfortunately most manufacturers are more interested in selling a cheap, half-baked product than delivering a secure, high-quality device,” Kiledjian says. Naive consumers continue buying the inexpensive, unsecured devices, which drives the manufacturers to continue the vicious cycle.

So what’s being done to prevent security breaches? Kiledjian notes that some IoT manufacturers, such as Ring Video Doorbell, are stepping up to the plate by providing remote upgrades to patch known security risks. But if other IoT companies aren’t willing to protect their customers, prevention will have to come from IT pros.

“IT pros are aiming to provide an up-to-date understanding of where the threats are coming from in order to stop an exploit from happening,” Shahbazi explains. When it comes to the interconnected chain of devices that make up the IoT, he sees IT pros as the guards ensuring that security is factored into each link.

How the ‘Internet of Things’ affects IT pros

With all of this pressure on IT pros to take care of the security issues manufacturers are ignoring, you may be wondering how the Internet of Things is affecting IT jobs. The answer is that IT workers in all industries and at all levels need to stay aware of possible threats to protect their company and their customers.

“Businesses and IT departments should be wary of IoT in terms of connected devices and the security of their networks,” Shahbazi warns. He also recommends that IT pros work with their companies to create a separate network specifically for IoT devices to ensure maximum safety. Baker suggests that IT managers push for secure mobile device management, which would ensure that every employee’s device met minimum security standards.

"Security is a balancing act and a risk evaluation exercise."

Though a separate, secure network and increased authentication methods can certainly help the problem, Baker adds that IT pros shouldn’t rely on technology to prevent security breaches. “If you examine the largest data breaches, phishing scams and companies held hostage by ransomware in 2015, technology did not protect the vast majority of these companies. Employees must be thoroughly trained on cyber security practices and security awareness---and this training must be an ongoing process.”

The bottom line is that IT pros should be well acquainted with risk management if they want to avoid IoT security concerns. “There is no such thing as ultimate or perfect security,” Kiledjian says. “Security is a balancing act and a risk evaluation exercise.”

Could you help prevent cybercrime?

With technology constantly evolving, IT pros are tasked with the job of keeping would-be cyber criminals away from private data. Now that you know why the Internet of Things security risks are keeping IT pros on their toes, you may be interested in learning more about the professionals devoted to defending private data.

Check out these 5 Fascinating Infosec Jobs that Help Combat Cybercrime to find out more. One of them could be your future IT career!

RELATED ARTICLES:

About the author

Ashley Brooks

Ashley is a freelance writer for Collegis education who writes student-focused articles on behalf of Rasmussen University. She believes in the power of words and knowledge and enjoys using both to encourage others on their learning journeys

female writer

Related Content

Related Content

This piece of ad content was created by Rasmussen University to support its educational programs. Rasmussen University may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen University does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen University is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

logo-accreditation-acen logo-accreditation-ccne chart-credential-laddering-associates-bachelors-masters 0 Credits 90 Credits 180 Credits 48 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE Start Here MASTER'S DEGREE PURSUERS End Here BACHELOR'S DEGREE End Here MASTER'S DEGREE chart-credential-laddering-associates-bachelors 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 90 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 180 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-msn chart-credential-laddering-nursing-programs chart-credential-laddering-nursing DNP MSN RN to BSN LPN to RN Bridge Accelerated BSN Professional Nursing ADN Practical Nursing Diploma Pre-Licensure Post-Licensure icon-colored-outline-bank icon-colored-outline-certificate icon-colored-outline-circle-dollar-sign icon-colored-outline-folder-search icon-colored-outline-hand-heart icon-colored-outline-head-blocks icon-colored-outline-head-cog icon-colored-outline-head-heart icon-colored-outline-health-plus-leaves icon-colored-outline-hospital icon-colored-outline-lifelong-learning icon-colored-outline-light-bulb-analytics icon-colored-outline-location-pin icon-colored-outline-magnifying-glass icon-colored-outline-monitor-healthcare icon-colored-outline-monitor-paper-search icon-colored-outline-nurse-rays icon-colored-outline-padlock-shield icon-colored-outline-person-presenter-screen icon-colored-outline-scales ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-colored-advance icon-colored-arrows-cross-curve icon-colored-briefcase-star icon-colored-build icon-colored-bulb-analytics icon-colored-certificate icon-colored-continual-development icon-colored-duo-chatbox icon-colored-folder-mortarboard icon-colored-forward-ribbon icon-colored-gears-clock icon-colored-globe-pen icon-colored-growth icon-colored-hand-bubble icon-colored-hand-stars icon-colored-hands-gear icon-colored-head-blocks icon-colored-head-cog icon-colored-health-plus-leaves icon-colored-hospital-building icon-colored-laptop-cbe-skyscraper icon-colored-laptop-checkmark icon-colored-laptop-webpage icon-colored-location-map icon-colored-location-pin icon-colored-monitor-paper-scan icon-colored-mortarboard-dollar icon-colored-national icon-colored-people-chat-bubbles icon-colored-person-cheer-star icon-colored-person-laptop-checkboxes icon-colored-person-screen-instructor icon-colored-person-whiteboard icon-colored-phone-chatbox icon-colored-police-light icon-colored-prep icon-colored-presenter icon-colored-regional icon-colored-save-time icon-colored-shirt-hat icon-colored-skyscraper icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-triangle-arrow-up-plant icon-triangle-calendar-pencil icon-triangle-clock-rotating-arrows icon-triangle-display-gears icon-triangle-hand-right-speech-bubble icon-triangle-laptop-coding-brackets icon-triangle-mortarboard icon-triangle-paper-ribbon icon-triangle-person-cheer-star icon-triangle-person-juggle icon-triangle-triple-people-chat-bubble icon-modality-campus icon-modality-field icon-modality-online icon-modality-residential icon-arrow icon-bank icon-camera icon-filter icon-general-chart icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-hat icon-general-heart icon-general-laptop-building icon-general-laptop icon-general-leader icon-general-map icon-general-money icon-general-paperwork icon-general-people icon-general-phone icon-general-speak-out icon-head-heart icon-info-circle icon-mail-forward icon-mglass icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-scales icon-share-square-o icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-spinner icon-tag icon-testimonial-quotes icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-circle-arrow-down icon-util-circle-dot icon-util-language-switch icon-util-loading icon-util-open-window-link icon-util-pdf-link icon-util-refresh icon-util-x rebrand-arrows icon-social-facebook-colored icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram-colored icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p-colored icon-social-pinterest-p icon-social-twitter-colored icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play graduate-cap-star-coin hand-coin hand-heart nurse-stethoscope-rays card-send-smile person-yoga-pose suitcase-star