classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Securing the Internet of Things
July 2018, Cyber Security, Industrial (Industry)

With more than 75 billion devices expected to be connected to the Internet by 2025, the Internet of Things (IoT) has become an integral part of the digital world. As we become more reliant on these devices for our work and personal lives, we need to be aware of their inherent security risks.

Jorina van Rensburg, MD of Condyn.
Jorina van Rensburg, MD of Condyn.

One of the biggest problems is the login and password details of connected devices. These are typically preconfigured by manufacturers. How many end-users change these default settings? Using sophisticated tools, hackers can ‘snoop’ the Internet for these standard details and can easily gain access to them, severely compromising the user.

Another challenge is how easy it has become for manufacturers to send through updates to connected devices. Because this communication is unencrypted, patches can be installed remotely for bug fixes. While ostensibly a good thing, they do leave back doors open for malicious users to exploit.

Of course, it is not always about accessing data but also spying on people. For example, the increasing number of smart televisions in homes have seen some manufacturers pull data that shows what consumers are watching. Even worse, those sets with embedded Web cameras can also be hacked and used to look into the homes of people without them even realising it.

Getting smart

People are not cybersecurity experts. Many will not read the terms of use or technical documentation. It is all about using the connected device as quickly as possible. This is where the term ‘plug-and-play’ comes from – the manufacturer provides standard settings designed to make the device as easy as possible to use when it lands in front of a consumer.

Alexei Parfentiev, senior business analyst at SearchInform, believes a distinction should be made between IoT and the Industrial IoT (IIoT).

“The former is person-oriented and makes people’s life comfortable. The latter is developed for an industry and must be optimised.” Smart appliances, for example, help people save electricity or take care of their health. Within some industries, devices are used to automate menial administrator tasks, increase enterprise productivity, and let employees focus on more strategic roles.

Irrespective of whether it is consumer-facing or enterprise-focused, the reality is that IoT devices need better security. “Manufacturers must take responsibility to protect these devices and warn users of possible cybersecurity threats. Sadly, making the sale seems to be the only priority. But the situation might improve if vendors are motivated to take IoT security more seriously. For example, regulators could fine manufacturers if found guilty of neglecting their corporate responsibilities when it comes to securing devices.”

So, while it becomes inconvenient if a smart home system fails and the doors do not open automatically, imagine the impact if an armament system or power station is compromised. Security therefore has to be a priority in this new era of connected devices and the IoT.

For more information, go to www.condyn.net


  Share via Twitter   Share via LinkedIn      

Further reading:

  • 2019 cybersecurity crystal ball
    February 2019, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
    Craig Rosewarne, MD of Wolfpack Information Risk says the cyber landscape will be more volatile and dangerous in 2019, are we ready?
  • 50% of companies can’t detect IoT breaches
    February 2019, This Week's Editor's Pick, Cyber Security, IT infrastructure
    Only around half (48%) of businesses can detect if any of their IoT devices suffer a breach. This comes despite an increased focus on IoT security.
  • Data security sits at the heart of democracy
    February 2019, Cyber Security, Security Services & Risk Management
    A succession of high-profile government data breaches both locally and abroad has cast a stark light on the importance of effective public sector cybersecurity policies and protections.
  • Corporate fraud and insider threats
    February 2019, Cyber Security, Security Services & Risk Management
    Insider fraud and theft can often be more damaging to a company than risks from outside.
  • Corporate privacy in a selfie age
    February 2019, Cyber Security, Security Services & Risk Management
    Doros Hadjizenonos, regional sales director at Fortinet in South Africa looks at how CISOs can maintain corporate privacy even as employees adopt emerging technologies.
  • SME cybersecurity: high risk
    February 2019, Cyber Security, IT infrastructure
    Small and medium-sized businesses are becoming more attractive targets for cyber criminals – both direct and also as a starting point for larger attacks across a supply chain.
  • Kaspersky unveils new partner programme
    February 2019, Kaspersky Lab, News, Cyber Security
    Specialised, enabling and profitable: Kaspersky Lab unveils new programme to empower its partners and improve services to clients.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Using tomorrow’s tools to solve ­today’s security problems
    November 2018, Access Control & Identity Management, Cyber Security, Integrated Solutions
    It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions.
  • NEC XON talks Industry 4.0 and disruption
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Conferences & Events, Training & Education
    NEC XON held its seventh annual summit at Sun City in October this year in which it focused on the Fourth Industrial Revolution (IR4) and how it would disrupt the status quo.
  • Our dependence on cyber-connectivity
    November 2018, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security, Government and Parastatal (Industry)
    The health, safety, security, economic well-being of citizens, effective functioning of government and perhaps even the survival of the industrialised world relies heavily upon interconnected critical systems.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.