Intersys Logo
Menu

Managed IT Support

A Reasonable, Fixed Monthly Fee for All Your IT Needs
Managed IT Support Provider

Consulting Services

The High Level IT Consulting Services You Need to Transform Your Business
Get IT Consulting Services

Cyber Security

A Comprehensive Range of Cyber Security Services for Robust, Industry-Leading Protection
Get Cyber Security Services

IT Solutions

Whatever your IT needs, we'll create a tailormade solution for you
Get IT Solutions

The Next Big Thing: Securing the IoT

close up of alexa deviceIoT Security

The Internet of things has the potential to radically change business and everyday life โ€“ and that could be a problem if we donโ€™t focus on cyber security.

The rapid growth of the Internet of things isnโ€™t in doubt, but you can argue about the numbers. Is the number of connected devices 27 billion heading to 125 billion by 2030; or just 20 billion and looking to reach 50 billion during the 2020s? Perhaps all we can safely say is that weโ€™re already losing count.

Itโ€™s certainly a massive market, although again estimating its size and forecasting its growth is a subjective business. Proposals that spending on IoT will soon pass $1 trillion donโ€™t seem outlandish, though. Thatโ€™s because, as the title of one report puts it well, IoT is not just a market, but a movement. It promises to transform not only businesses and industry, but also everyday life. Itโ€™s changing the way we do things and think about things. Itโ€™s one of those technologies to genuinely warrant that old clichรฉ: A paradigm shift.

Fast things: 5G and IoT

internet of things close up of hands activating house door via smart phone

The applications of the technology are pretty much infinite. If itโ€™s an object and you can find some purpose in connecting it to the Internet, you can have a new IoT device.

Admittedly, not that many of us yet feel the need to connect our soap dispensers, bins or hairbrushes to the Internet โ€“ not for smart toasters, once a joke, now a reality. Some IoT devices are already proving useful and increasingly ubiquitous, however. Think of Fitbitโ€™s fitness trackers and smart watches or smart speakers, such as Google Home devices and Amazonโ€™s Echo. Others are widely available, if less immediately visible, and growing fast, such as connected cars and industrial devices. Many are still to be conceived.

New technology in the form of 5G mobile networks will turbocharge this. It promises massively faster speeds, the ability to connect far more things and hugely improved latency (the speed with which devices respond to a request to connect) โ€“ vital in applications where a delay in a device activating could be dangerous, such as where the device controls an industrial process, for example.

Itโ€™s well worth listening to this recent radio discussion about some of the possibilities from a business perspective. It truly is exciting.

But itโ€™s also the weak link in an increasing number of businessesโ€™ cyber security.

Cybersecurity risks: Outrageous IoT hacks

close up of malware on screen with skull shape among written code

In the rush to harness the opportunities from the Internet of things it would be a mistake to forget the risks, though. Itโ€™s not that dangers arenโ€™t recognised. In fact, part of the problem here is that the discussion tends to focus on some pretty well publicised and notorious examples. They can be shocking:

  • Researchers hacking into and remotely controlling a Jeep on the highwayโ€“ leading to the recall of 1.4 million vehicles; and, more recently, hacking of Tesla vehicles, for the second year in a row.
  • Hacking of Internet-connected baby monitors, allowing people to view and talk to children in their cots.
  • Cybersecurity vulnerabilities discovered in close to half a million pacemakers โ€“ raising fears of assassinations or even mass murder by hackers using just a computer.

A range of vulnerabilities โ€“ IoT Security Issues

These cases do a good job of conveying some of the possibilities, but little to illuminate the probability of more banal threats: In fact, itโ€™s estimated that by 2020 a quarter of all cyber attacks will target IoT devices.

They also donโ€™t well convey the range of risks IoT devices bring:

  • Threats to privacy โ€“ with the creep of Internet-connected devices into every aspect of our lives posing an insidious threat to freedoms, giving government agencies massively increased scope for surveillance of the population; and exposing intimate personal information, such as health care data and movements to data breaches, with the possibility of significantly liabilities for businesses โ€“ particularly with GDPR now in force.
  • Threats to network security, with not just the businessโ€™s own devices at risk, but those brought in by employees, contractors, customers and others, with an average of 3.5 Internet enabled devices per person. In a study of businesses, over a third had more than 5,000 personal devices connecting to the network each day, opening businesses to social engineering hacks, phishing and malware.
  • Threats to public safety and the environment, with attacks on industry and infrastructure systems. Weโ€™ve seen increasing attacks on such systems in recent years, whether thatโ€™s hackers knocking out the electricity grid for half a million people in the Ukraine; or deliberately targeting safety systems of critical infrastructure โ€“ a โ€œwatershedโ€ moment in industrial cyber security. The introduction of millions more Internet connected devices as the Industrial Internet of things or Industry 4.0 grows will open up new vulnerabilities.
  • Threats to other organisations, with malware such as the Mirai and the Leet botnets infecting and harnessing thousands of IoT devices and massively increasing the complexity and scale of denial of service attacks, for instance. In this way, the IoT hasnโ€™t just added to the number of threats, itโ€™s changing the nature of existing, well-established threats, too.

The risks are particularly pronounced for highly regulated industries โ€“ whether thatโ€™s utilities and critical national infrastructure or pharma and healthcare, as well as the legal and financial sectors. As regulatory requirements increase, businesses in these sectors (and others) face the possibility of significant penalties and reputational damage even where no attack takes place but authorities determine that their security is inadequate.

 IoT Regulation

Not surprisingly, given the scale of the attacks and potential seriousness, many are calling for governments to do more. The UK is already taking up the challenge, with the British government recently launching a review on the issue. Thatโ€™s expected to lead to requirements on IoT device manufacturers to embed security in the design process and a new Code Of Practice to improve the security, developed in conjunction with the National Cyber Security Centre (NCSC).

โ€œThe NCSC is committed to ensuring the UK has the best security it can, and stop people being expected to make impossible safety judgements with no useful information,โ€ as the NCSCโ€™s technical director said.

We should certainly welcome tougher standards for device manufacturers. Most consumers just assume IoT devices have security built in, when, in fact, the security and safety of many are โ€“ to quote one reviewer โ€“ โ€œatrociousโ€.

Self Help

There are a few good reasons businesses would do well to avoid relying on the government to bring security, though.

First, new requirements will take time to come, and longer still to secure devices already out in the world. That means present vulnerabilities will persist for a long time.

Second, policy priorities wonโ€™t necessarily match those of businesses. The code, for instance, is to address โ€œconsumer internet-connected devicesโ€, and the governmentsโ€™ focus is likely to be on consumer safety and privacy. Preventing disruption to businessesโ€™ operations and profitability is going to be secondary.

Finally, of course, there are no guarantees with cyber security. Taking things on faith and simply trusting that government requirements will bring security would be a mistake. If businesses want the Internet of things to work for them, rather than against them, much of it is going to be down to their own efforts.

Five Steps to IoT Security 

Abstract image about internet security showing a graphic of locks against the backdrop of a binary string

So what can businesses do?

Well, itโ€™s not actually rocket science. Basic security principles and processes followed in a structured way will get you a long way towards security.

So, five steps to making your IoT deployment more secure:

  1. Identify what devices are connected, because you canโ€™t protect devices if you donโ€™t know theyโ€™re there. If your toaster can actually connect to the Internet, you need to know. All security starts with knowing what you need to protect.
  2. Put devices behind a firewall โ€“ An obvious security step that for some reason is often forgotten when it comes to IoT devices.
  3. Set up a separate local network for IoT devices or separate VLANs to keep them isolated. The surest way to keep hackers out is to cut their connectivity.
  4. Use complex, unique passwords for each device. Even where manufacturers include security with passwords, they wonโ€™t provide much protection if you keep the default.
  5. Keep software up-to-date, just as you would for computer systems to keep virus definitions and patching updated. The threat landscape is constantly changing, and device manufactures need to address new vulnerabilities as they are discovered.

This isnโ€™t really much different to traditional security: The principles of securing networks and their endpoints are well understood. Itโ€™s the scale of the challenge, in terms of the numbers of IoT devices โ€“ and the constantly shifting landscape as new devices are introduced and brought in and out of the network โ€“ thatโ€™s arguably new.

That just means that itโ€™s not a job thatโ€™s โ€œonce and doneโ€, though. Procedures need to be in place to continually review cybersecurity and the state of the network; the five steps above are a constant cycle of work, not an annual checklist.

IoT has the potential to set connectivity free and transform businesses and our way of life. As ever, though, the price of liberty will be eternal vigilance.

For more IT security advice take a look at our IT security support page and contact us to see how we can help you.

 

Stay up to date with IT Industry news

Subscribe to our newsletter

Please enable JavaScript in your browser to complete this form.

Subscribe to our newsletter

Please enable JavaScript in your browser to complete this form.

In other news

December 4, 2023

A Haven of Hope

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram