Story image

IoT: The nexus for change

The internet of things (IoT) has been a captivating topic for audiences around the globe as the ways we stay connected has evolved in countless ways – and continues to evolve. Devices, such as home routers and wireless IP cameras, are no longer restricted to interactions in silos but instead across a multitude of networks. 

While IoT is an avenue into a connected future, it is also the ideal target for cyber-attacks and data breaches. And though hackers are not directly targeting device owners under IoT, hackers can use a connected device as a launch pad for attacks against an alternate target.

Who can forget the Mirai attacks in 2016 which used IoT devices to attack internet infrastructure? The attack involved an estimated 100,000 malicious endpoints and resulted in downtime for numerous users – with some of them reportedly losing upwards of $300,000 to the botnet. While the worst of the Mirai attacks might be over, IoT security continues to be a pressing concern. 

Just two months ago, experts reported the Mirai source code continues to spawn botnet with the unchangeable code proving to be a robust foundation for future malware. Listed below are the major concerns currently present in IoT and ways in which these challenges can be overcome.

Inconsistency in Technical Advancements

IoT issues stem from the vulnerability of the collective technology as opposed to the individual. In the long run, enterprises must develop end-to-end solutions, as hackers can use a single point method to penetrate an entire technology bundle. There is also the possibility for cross-overs of data, where an individual's personal data could be utilised to inform service providers that they aren't subscribed to. 

As a best practice, securing endpoints means implementing a layered mechanism that requires attackers to circumvent various hurdles created to protect the device, and its data, from unsanctioned entry and use.

It is imperative to integrate security into foundational processes. The best way to secure an IoT device, application or a network is to build security into the base. For example, when developers write code, you can write secure libraries for what they are using. This means security measures are baked into the device, which is far more effective than network firewall tools or assessment tools. 

Standardisation for Better Integration

Currently, IoT needs standardisation when it comes to how the different parts of the larger ecosystem should interact with each other. Large players use their internally developed solutions while smaller players utilise recondite standards which might not be universally applicable. 

To overcome this, governing bodies need to establish certifications which award minimum safety standards for component security, this must be the bedrock upon which platforms should be developed.

The Presence of Legacy Infrastructure

The more organisations look to increase the use of data generated by IoT, the greater the threat they will face in transferring and storing these vast volumes of data securely. Organisations need to find and actualise a system that is proficient in not just assembling the data but also extracting, inferring and then removing or archiving it at speed and scale. 

One way to solve the vast volume of data problems is a gradual approach. This means the first analytics stage takes place locally on the router, and if an anomaly is found, the relevant data is sent to the cloud for a thorough analysis.

IoT security should be treated as the foundation upon which enterprises should base themselves upon. However, beyond filling Protection Gaps, companies should also fill Availability Gaps.  

Only by doing so will enterprises be able to provide services without disruption and eliminate unplanned downtime – saving an average of $21.8 million per year. 

In the long run, IoT will become the first level informer that will propel the intelligence over what should happen within the environment, rather than being reliant on people. This will take a paradigm shift in outlook and confidence in leading-edge technology.

Article by Raymond Goh, Head of Systems Engineering, Asia & Japan at Veeam Software 

Stepping up to sell security services in A/NZ
WatchGuard Technologies A/NZ regional director gives his top tips on how to make a move into the increasingly lucrative cybersecurity services market.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Chch crypto-exchange Cryptopia suffers breach
Cryptopia has reportedly experienced a security breach that has taken the entire platform offline – and resulted in ‘significant losses’.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.
Carbon Black: What does cybersecurity have in store for 2019?
Tom Kellerman has shared five insights for the year ahead, including a particularly bold one.
Hands-on review: The Ekster Wallet protects your cards against RFID attacks
For some time now, I’ve been protecting my credit cards with tinfoil. The tinfoil hat does attract a lot of comments, but thanks to Ekster, those days are now happily behind me.
Report on SingHealth breach condemns poor security practices
The 2018 Singapore SingHealth data breach was poorly managed and riddled with vulnerabilities from the start.
Tesla wants people to hack its Model 3
Tesla is offering white hat hackers what could be the chance of a lifetime – the opportunity to hack one of its Model 3 vehicles.