classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Securing the Internet of Things
July 2018, Cyber Security, Industrial (Industry)

With more than 75 billion devices expected to be connected to the Internet by 2025, the Internet of Things (IoT) has become an integral part of the digital world. As we become more reliant on these devices for our work and personal lives, we need to be aware of their inherent security risks.

Jorina van Rensburg, MD of Condyn.
Jorina van Rensburg, MD of Condyn.

One of the biggest problems is the login and password details of connected devices. These are typically preconfigured by manufacturers. How many end-users change these default settings? Using sophisticated tools, hackers can ‘snoop’ the Internet for these standard details and can easily gain access to them, severely compromising the user.

Another challenge is how easy it has become for manufacturers to send through updates to connected devices. Because this communication is unencrypted, patches can be installed remotely for bug fixes. While ostensibly a good thing, they do leave back doors open for malicious users to exploit.

Of course, it is not always about accessing data but also spying on people. For example, the increasing number of smart televisions in homes have seen some manufacturers pull data that shows what consumers are watching. Even worse, those sets with embedded Web cameras can also be hacked and used to look into the homes of people without them even realising it.

Getting smart

People are not cybersecurity experts. Many will not read the terms of use or technical documentation. It is all about using the connected device as quickly as possible. This is where the term ‘plug-and-play’ comes from – the manufacturer provides standard settings designed to make the device as easy as possible to use when it lands in front of a consumer.

Alexei Parfentiev, senior business analyst at SearchInform, believes a distinction should be made between IoT and the Industrial IoT (IIoT).

“The former is person-oriented and makes people’s life comfortable. The latter is developed for an industry and must be optimised.” Smart appliances, for example, help people save electricity or take care of their health. Within some industries, devices are used to automate menial administrator tasks, increase enterprise productivity, and let employees focus on more strategic roles.

Irrespective of whether it is consumer-facing or enterprise-focused, the reality is that IoT devices need better security. “Manufacturers must take responsibility to protect these devices and warn users of possible cybersecurity threats. Sadly, making the sale seems to be the only priority. But the situation might improve if vendors are motivated to take IoT security more seriously. For example, regulators could fine manufacturers if found guilty of neglecting their corporate responsibilities when it comes to securing devices.”

So, while it becomes inconvenient if a smart home system fails and the doors do not open automatically, imagine the impact if an armament system or power station is compromised. Security therefore has to be a priority in this new era of connected devices and the IoT.

For more information, go to www.condyn.net


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Where safety, security and Industry 4.0 meet
    July 2018, Technews Publishing, This Week's Editor's Pick, Integrated Solutions, Industrial (Industry)
    Integrated security offers more than simply a means to keep unwanted people out of industrial settings, its benefits extend to supporting and enhancing daily operations.
  • Protecting the machines
    July 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Industrial (Industry)
    Security operations at industrial sites need to include cybersecurity and it needs to be treated with the same importance as the physical security of the site as well as health and safety standards.
  • Securex 2018 pulls the (right) crowds
    July 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    With over 6000 visitors attending and exhibitors expressing their satisfaction with not only the number, but also the calibre of the visitors, this year’s Securex was a winner.
  • Securing your digital assets
    July 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, IT infrastructure
    Cyberattacks can’t be prevented, but companies and individuals have ways to keep the attackers out. However, the coming year will see more attacks and more losses because of poor cyber planning.
  • The generations that matter
    July 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    According to Doros Hadjizenonos, country manager, SADC at Check Point, we have entered the fifth generation of cyberattacks.
  • EOH introduces managed Security-as-a-Service
    July 2018, EOH Security & Building Technologies, News, Cyber Security, Security Services & Risk Management
    EOH has introduced a solution to modern security concerns through a managed Security-as-a-Service suite of offerings.
  • How data leaks can be avoided
    July 2018, This Week's Editor's Pick, Cyber Security, News, Security Services & Risk Management
    MyID runs as a service, monitoring your ID number, email address, mobile number and credit card number for fraudulent usage or fraudulent input on the Web.
  • Being prepared is key to mitigating cyber attacks
    July 2018, Cyber Security
    In an age where cyber criminals are a dime a dozen, and the threat landscape more complex than ever, it pays to prepare and be always on guard.
  • Securing your operational systems
    July 2018, Industrial (Industry), Cyber Security
    Forrester research on operational technology (OT) cybersecurity: 56% of organisations experienced a security breach last year.
  • Watch out for digital profiling
    July 2018, This Week's Editor's Pick, Cyber Security
    Research shows that smartwatches can become tools for spying on their owners, by collecting signals that – after analysis – could be turned into datasets unique to the smartwatch owner.
  • Intelligence and compliance ­depend on data governance
    June 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    The growth of data in all its forms caused data governance to become increasingly complex, to the point where it is a skill in itself.
  • Data governance and security
    June 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    Data governance has become a key issue for all businesses, and as with all things data-related these days, security is a key component of data governance.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.