Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are Smart Devices Getting Smarter?

Are Smart Devices Getting Smarter?

Smart devices are everywhere, with the Internet of Things (the blanket term for any device that connects to the Internet for added functionality) growing larger each day. While this is great for convenience (and in many cases, the "cool factor") it can have some chilling ramifications for cybersecurity.

Let's explore how this may be changing in the near future.

The Projections for the IoT

With 127 new IoT devices connected to the Internet each second, it should come as no surprise that estimates place their numbers at around 75 billion in total by 2025. This means that there are plenty of new opportunities for a cybercriminal to find and exploit a vulnerability… both in commercial IoT devices and in the devices classified as the Industrial Internet of Things.

There are already too many examples of how Internet-connected devices have been used to a hacker's advantage. In 2017, the UK's National Health Service was hobbled by a ransomware attack that affected, amongst other things, Internet-connected medical equipment. Video doorbells often stream data without any protections, and other smart home devices have been found to store Wi-Fi passwords in a similar fashion. 

As the IoT continues to grow, it only stands to reason that efforts to take advantage of such weaknesses will increase along with it.

What Can Be Done to Secure the IoT?

Fortunately, things are already in motion to help ensure the IoT is made to be more secure. For example, the signing of the Internet of Things Cybersecurity Improvement Act of 2020 in the US and the Australian government's introduction of an IoT industry-specific voluntary code of practice shows that governments are starting to pay attention to the issues that the IoT has the potential to open up. However, this doesn't mean that businesses can sit back and relax.

On the contrary, there are a few things that a business can and should do to help mitigate IoT-based attacks:

Encrypt Data

There are relatively few IoT devices out there today that feature encryption as one of their standard security protocols. Implementing encryption on a network level makes it so that your data is effectively indecipherable while in transit, rendering it more or less worthless to the cybercriminal targeting it.

Change Default Passwords on IoT Devices

Of course, ALL default passwords should always be changed, but the IoT makes this an even more important practice for a business. Take the few moments required to come up with a more secure password than the device is equipped with initially.

Use Devices from Security-Conscious Manufacturers

One other way your business and your users can help make a change while protecting your own assets is to try to deal exclusively with devices manufactured by companies that take a security-first approach. Voting with your dollars can quickly make a change if enough people do it. Otherwise, it may be wiser to stick with the "dumb" option if it serves your needs just as well.

There is little doubt that the IoT will have an increased presence in modern life in the years to come. Time will only tell if that presence is a secure one. In the meantime, you can trust us to help you ensure that your business is as secure as possible. Give us a call at (502) 473-9330 to find out what we can do for you and your operations.

Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, May 16 2022

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Hackers Network Security Privacy Software Internet Data Business Innovation Hosted Solutions Google Malware Efficiency IT Services Hardware User Tips Email Disaster Recovery Data Backup Microsoft Backup IT Support Computer Mobile Devices Cybersecurity Workplace Tips VoIP Communication Business Management Data Recovery Small Business Ransomware Business Continuity Managed IT Services Phishing Miscellaneous Smartphone Upgrade Users Outsourced IT Productivity Android Internet of Things Windows 10 Saving Money Managed IT Services Windows 10 Tech Term Passwords IT Support BDR Windows Covid-19 Network Office 365 Mobile Device Management Apps Automation Social Media Server Gadgets Remote Workplace Strategy Virtualization Cybercrime Managed Service Provider Employer-Employee Relationship Save Money Spam Office Data Security Alert Remote Work Data Management Firewall Office Tips The Internet of Things Retail Proactive IT Printer Video Conferencing Time Management End of Support Smart Devices Troubleshooting Manufacturing Supply Chain Computer Repair Managed Services RMM Infrastructure Solutions Scams Going Paperless Benchmarks Windows 11 Remote Working Business Telephone Procedure Fiber Optics Videoconferencing Managed Services Provider Workstation Reviews Azure Authentication Net Neutrality Organization Windows Server 2008 Streaming CRM PCI DSS Facebook Privacy Cybersecurty Cabling Telework Leadership Inventory Active Directory Windows 8.1 Cost Holidays Computer Tips AI Regulations Compliance Window 10 Bitcoin Communitications Myths Environment Audits Windows Server Voice Outsource IT Copiers Copier Online Storage Finance Hosted Desktop Threats Processor Internet Service Provider Innovations Voiceover Internet Protocol Work Workstations Policy eCommerce Workplace Strategies

Recent Comments

No comments yet.