The Internet of Things Makes the Future of Cybersecurity Much More Complicated (article)

The Internet of Things Makes the Future of Cybersecurity Much More Complicated (article)

Home /  Insights / Articles / Article Details

CBIZ assists with cybersecurity.Laptops and smart phones only scratch the surface of devices that connect to the internet. Wireless capabilities are showing up everywhere, from light bulbs to televisions and thermostats. Gartner, Inc. forecasts that 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020.

The Internet of Things (IoT) is a giant network of connected "things” and involves connecting any device with an on and off switch to the Internet (and/or to each other). This networked formed by every day devices connected to the internet makes the future of information security much more complicated for individuals and businesses. An increase in the number of internet devices means more entry points for cyber criminals and other hackers to access your data.  Notably in 2016, Internet of Things devices were involved in information security breaches. The Mirai attack used modems and cameras to gain unauthorized access to sensitive information. Symantec’s 2016 Internet Security Threat Report found that the number attempted attacks against IoT devices doubled from the year before.

One of the reasons for the increase in cybersecurity activity may lie in that fact that devices other than computers and cell phones may be easier to hack. Symantec estimates it takes two minutes for an IoT device to be compromised. An experiment by The Atlantic noted similar results.

Fortunately, many of the same rules that govern cybersecurity for severs and computers and mobile devices also apply to the multitude of IoT devices. Simple steps can keep you one step ahead of the future of cybersecurity.

Passwords

The very first thing you should do with an IoT device is change the default password. In the Atlantic experiment, hackers tried a variation of the default manufacturer password to hack a wireless toaster.  It’s especially important to change the password for your router, as hackers could potentially breach the router and have access to every device on its network.

Keep in mind that password standards have changed. You should have unique passwords for every device, but it’s less important to have a variety of numbers, symbols and cases in the password than it is to have something lengthy. 

Keep Devices Updated and Protected

Any device that connects to the internet is bound to have updates. It’s crucial that you don’t miss one, as many updates address potential access points for unauthorized users. WannaCry began with a missed Windows security patch. Where possible, make sure your device has the appropriate firewall or antivirus software installed.

Put IoT Devices on Their Own Network

Most routers, including the ones used in your home, can create multiple networks. To keep your computer and mobile phone devices safe, it is recommended you put the more hacker-vulnerable IoT devices on a separate network. That way, if the devices are compromised, hackers can’t get to the more valuable information on your computer and smart phone.

Be Cognizant of Where You’re Accessing Information

Breaches are increasingly coming from cloud software as well. If you’re in public, be cautious of what information you’re accessing, particularly if you’re using public Wi-Fi. Most public Wi-Fi access points are not encrypted, which means that anyone with the right tools can track your online activity and access that valuable information. Avoid entering in passwords to devices or cloud software. You should also not be online shopping on public Wi-Fi or doing anything that would involve you entering in credit card information.

If you’re accessing devices connected to a corporate network, be sure to use a Virtual Private Network (VPN). The VPN essentially creates an encrypted tunnel that helps protect your activity from unauthorized users. If not using VPN, look for encrypted websites, designated by “https”.  You may also want to consider using a mobile hotspot instead of the public Wi-Fi option.

Conclusion

The future of cybersecurity will require everyone to think like a hacker. Identify the devices that may be vulnerable to being attacked and take steps to secure them and also isolate them from where you’re keeping sensitive personal and financial information. For questions about how to improve your cybersecurity strategy, please contact us.

Related Reading


Copyright © 2017, CBIZ, Inc. All rights reserved. Contents of this publication may not be reproduced without the express written consent of CBIZ. This publication is distributed with the understanding that CBIZ is not rendering legal, accounting or other professional advice. The reader is advised to contact a tax professional prior to taking any action based upon this information. CBIZ assumes no liability whatsoever in connection with the use of this information and assumes no obligation to inform the reader of any changes in tax laws or other factors that could affect the information contained herein.

CBIZ MHM is the brand name for CBIZ MHM, LLC, a national professional services company providing tax, financial advisory and consulting services to individuals, tax-exempt organizations and a wide range of publicly-traded and privately-held companies. CBIZ MHM, LLC is a fully owned subsidiary of CBIZ, Inc. (NYSE: CBZ).

The Internet of Things Makes the Future of Cybersecurity Much More Complicated (article)Wireless devices may be the next big threat your information security....2017-10-13T13:56:00-05:00

Wireless devices may be the next big threat your information security.