'Internet of Things' Security Concerns: How IT Pros Can Save the Day

Internet of Things Security

You may think people are the only ones using the internet, right? Wrong. The internet has become a tool all sorts of devices use--smartphones, TVs, gaming systems and even home appliances!

This phenomenon is called the Internet of Things (IoT) and it allows for some pretty amazing technological feats. Want to see who’s at the door without getting up to check? No problem! How about automatically starting the coffee maker when your alarm goes off? Done!

"Each device or gadget that is connected has the potential of being compromised."

But the perks of IoT come with risks you may not have realized. Internet of Things security has become a real concern for IT pros across the industry.

“Each device or gadget that is connected has the potential of being compromised,” says Rob Boirun, manager of VPN service IPinator. He explains that while IoT is meant to simplify our lives, it could ultimately lead to trillions of vulnerabilities.

We spoke to experts in the field to learn about the biggest Internet of Things security concerns and what IT pros can do to prevent breaches.

‘Internet of Things’ security concerns you need to know about

The root of the problem with IoT security is that once one device has been compromised by malware or hackers, all connected devices become susceptible as well. Even more concerning is the lack of regulation when it comes to ensuring the security of IoT devices.

“IoT devices tend to have weaker security protections than regular computers,” says Mike Baker, founder of cyber security service provider Mosaic451. With so many manufacturers in various channels, there are no common controls regarding passwords, encryption or other security measures, according to Baker.

Our experts indicated that these are three of the biggest IoT security concerns:

1. Privacy violations

Many IoT devices have built-in cameras or microphones, such as home security cameras or baby monitors. These cameras are a reassuring way to keep an eye on your home from afar. But in the wrong hands, they can also be used to spy on you and violate your privacy.

In one case, critical vulnerabilities were discovered in a wide range of IoT baby monitors, according to Kevin Shahbazi, CEO of cloud-based security solution LogMeOnce. Hackers were able to access the live video footage, change the camera settings and authorize other users to remotely view and control the monitors.

2. Compromised physical safety

It may sound convenient to have an app that adjusts your home thermostat or controls the lock on your front door. But these conveniences could be used to endanger your physical safety, according to Edward Kiledjian, chief information security officer at Bombadier Aerospace.

A hacker could easily use a compromised IoT device to do everything from unlocking your door and disabling your alarm system to changing your physical environment by turning off your home’s heat, Kiledjian explains. These possibilities can expose families to real physical harm, putting IoT security concerns on a whole new threat level for consumers.

3. Network threats

The average Joe isn’t the only one vulnerable to compromised IoT devices. Unsuspecting businesses are also targets, according to Shahbazi.

“Not only are business owners unaware of what data is stored on IoT devices, but there are also broader issues around what data can be transmitted from these devices and where that data may ultimately end up,” Shahbazi says.

Many companies have started making expensive investments to protect themselves from IoT threats. But it only takes one employee using a connected device on an unsecured network or copying data to the cloud to place a whole business at risk from hackers, Shahbazi explains.

Preventing ‘Internet of Things’ security risks

Our experts agree that the best security fixes lie within the companies that are manufacturing IoT devices in the first place. “Unfortunately most manufacturers are more interested in selling a cheap, half-baked product than delivering a secure, high-quality device,” Kiledjian says. Naive consumers continue buying the inexpensive, unsecured devices, which drives the manufacturers to continue the vicious cycle.

So what’s being done to prevent security breaches? Kiledjian notes that some IoT manufacturers, such as Ring Video Doorbell, are stepping up to the plate by providing remote upgrades to patch known security risks. But if other IoT companies aren’t willing to protect their customers, prevention will have to come from IT pros.

“IT pros are aiming to provide an up-to-date understanding of where the threats are coming from in order to stop an exploit from happening,” Shahbazi explains. When it comes to the interconnected chain of devices that make up the IoT, he sees IT pros as the guards ensuring that security is factored into each link.

How the ‘Internet of Things’ affects IT pros

With all of this pressure on IT pros to take care of the security issues manufacturers are ignoring, you may be wondering how the Internet of Things is affecting IT jobs. The answer is that IT workers in all industries and at all levels need to stay aware of possible threats to protect their company and their customers.

“Businesses and IT departments should be wary of IoT in terms of connected devices and the security of their networks,” Shahbazi warns. He also recommends that IT pros work with their companies to create a separate network specifically for IoT devices to ensure maximum safety. Baker suggests that IT managers push for secure mobile device management, which would ensure that every employee’s device met minimum security standards.

"Security is a balancing act and a risk evaluation exercise."

Though a separate, secure network and increased authentication methods can certainly help the problem, Baker adds that IT pros shouldn’t rely on technology to prevent security breaches. “If you examine the largest data breaches, phishing scams and companies held hostage by ransomware in 2015, technology did not protect the vast majority of these companies. Employees must be thoroughly trained on cyber security practices and security awareness---and this training must be an ongoing process.”

The bottom line is that IT pros should be well acquainted with risk management if they want to avoid IoT security concerns. “There is no such thing as ultimate or perfect security,” Kiledjian says. “Security is a balancing act and a risk evaluation exercise.”

Could you help prevent cybercrime?

With technology constantly evolving, IT pros are tasked with the job of keeping would-be cyber criminals away from private data. Now that you know why the Internet of Things security risks are keeping IT pros on their toes, you may be interested in learning more about the professionals devoted to defending private data.

Check out these 5 Fascinating Infosec Jobs that Help Combat Cybercrime to find out more. One of them could be your future IT career!


RELATED ARTICLES:

Ashley Brooks

Ashley is a freelance writer for Collegis education who writes student-focused articles on behalf of Rasmussen College. She believes in the power of words and knowledge and enjoys using both to encourage others on their learning journeys

female writer

Related Content

This piece of ad content was created by Rasmussen College to support its educational programs. Rasmussen College may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen College does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen College is a regionally accredited private college and Public Benefit Corporation.

Add your comment

*

Please enter your name.

*

Please enter your email.

*

Please enter your comment.

Take the Next Step—Talk to Us!

Request More Information

Talk with a program manager today.

Fill out the form to receive information about:
  • Program Details and Applying for Classes 
  • Financial Aid and FAFSA
  • Customized Support Services
  • Detailed Program Plan

Step 1 of 3

What's Your Name?

Please enter your first name.

Please enter your last name.

Step 2 of 3

Contact Information

Please enter your email address.

Please enter your phone number.

Please enter your five digit zip code.

Step 3 of 3

Program Preferences

Please choose a school of study.

Please choose a program.

Please choose a degree.

By requesting information, I authorize Rasmussen College to contact me by email, phone or text message at the number provided. There is no obligation to enroll.

icon-colored-advance icon-colored-build icon-colored-certificate icon-colored-growth icon-colored-national icon-colored-prep icon-colored-regional icon-colored-state icon-colored-support logo-accreditation-acen logo-accreditation-ccne ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-filter icon-info-circle icon-mail-forward icon-play-solid icon-share-square-o icon-spinner icon-tag icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-laptop icon-general-leader icon-general-map icon-general-paperwork icon-general-phone icon-general-speak-out icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-testimonial-quotes icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-open-window-button icon-util-open-window-link icon-util-pdf-button icon-util-pdf-link icon-util-refresh icon-util-x