Breaking News

Is the Internet of Things Bad for Your Business?

Is the Internet of Things Bad for Your Business

Internet things are a useful network of affiliated devices that leave more than ever. However, these devices are delivered with some serious risks.

  • The Internet is common for objects (IOT), connected with large and small devices in most companies.
  • IOT connected devices include large dictionaries with desource that should plan small businesses.
  • This guide includes tips on how to protect your IOT devices, so you can pick up your owners without opening.
  • This article refers to small entrepreneurs who want to protect their associated devices and their IOT networks of Cybertaker.– In our homes, the internet compatible refrigerator can tell you what the food is before its expiration date. You may already have a smart meter – a dedicated display provides real-time information that you use energy and how much it issues.

In the business world, oil companies can now optimize production and efficiency of individual wells with the network sensor that automates microbial adjustments to pumps. Retailers and food restaurants should reduce the financial, social and ecological effects of their waste with their waste containers. These devices show the Internet (IOT) things and more than our laptop, our desktop and mobile. Safety equipment, cars, electronic devices, business environments, security cameras, speaker systems and car sales devices are part of the IOT.

These devices send and receive data and the ability to speak together is to manage our lives.

IOT will grow soon in the next 10 years. The era of connected devices will grow an important business opportunity as IoT networks with size and performance. But the Internet of Things also poses a major threat to businesses in the form of cyber attacks.[Read related article: Small Business Guide to Cyber​​Security]

Why are IoT devices vulnerable to cyber attacks?

IoT devices are attractive to cyber attackers for four main reasons:

  1. Most of them use wireless connections, which are inherently weak.
  2. Partly due to the wireless connection, a persistent attack often goes unnoticed.
  3. IoT security is like a blind spot for both consumers and businesses. Digital security experts below half of the two studied companies can discover IoT violations, and NordVPN did not take measures to protect the IoT device from attacks by 25% of the consumer.
  4. Some manufacturers put shortcuts to the security protocols that must be installed on the product. In other words, the device leaves plants with a defect that can be used directly in a cyber.

Among all wireless connection options, the mobile network provides the largest protection due to digital encryption in the technology infrastructure, but is not possible.

Most Wi-Fi connections are not secure. In 2017, Mathieu Vanhoff, professor of computer science at KU Leuven, Belgium, cracked the WPA2 protocol used in most Wi-Fi systems. By doing so, they found that all Wi-Fi connections that use the WPA2 protocol have been hacked.

Bluetooth, despite being a mature technology, has 16 distinct security holes. RFID, which is used in logistics and retail, also has a number of specific problems. Experts in the IT community have expressed concerns about the security of existing Zigbee products. LPWAN (Low Power Network, used mostly by enterprises) sends data to and from IoT devices such as sensors using low-bit long-distance wireless communication, but with a simpler encryption method. There is also a vulnerability because it uses . However, to save power, all of these faults can be rectified, as explained later in this article.

What can cyber attackers get by hacking IoT devices?

IoT devices connect to home and corporate computer systems. Heating systems, smart refrigerators, smart thermostats and other smart devices connect to customer databases and corporate networks similar to POS systems.

But why should a cybercriminal attack a connected refrigerator? It’s not because they want to control your refrigerator. You want access to your corporate network, and your refrigerator is often less secure than your wireless router. Once they have access to your company network, they try to control it. When you get control, you can install ransomware to run your company’s Klackmail or Cryptocorrence malware.

Give yourself your power to access sensitive customer information and start a rejection attack on your website or refuse your business, and your company and your conversation via e-mail among your customers can do it.

In 2021, the McAfee software security company discovered a lack of IOT practice wheel produced by the Peroton market reader. This defect can steal the Peloton’s customer database, including the birthday, user’s sex, birthday, age, age, age, for disability bees. Users of popularity of chastity attractions also lose their ability to manipulate them as a $ 270 junior to regain their control. lesson? A cyber attacker can access any connected device and exploit it in a variety of ways.

What are the risks to a company?

The economic and reputational costs of a cyberattack are also important for large enterprises, but for small businesses, cyberattacks can mean business closures.

“Overall, the benefits of the Internet of Things are enormous and exciting,” said Kevin Haley, director of Symantec Security Response. “We look at all these different applications, but as safe safety, I really hurried to these things, even if there are no people who don’t think about their impact and safety aspects, it is understood that

Pirates can also access SME networks by hacking a security system.

“Now, everyone has an internet connection and some hack skills can also show your most expensive things.”

Roel Shenberg has been approved by the main protection researcher of Kaspersky Lab. “All these new smart devices have new weaknesses. However, people working in small businesses can usually take full advantage of their existing skills. Things get even more difficult when you add new, complex devices to your equations.

When it comes to the Internet of Things, small businesses need to worry about hackers being able to access their networks through connected devices. Read the best VPN reviews to protect your employees.

“Every device or device that enters the corporate network needs protection,” says Schouwenberg. “All of these scenarios need attention because the attacks were targeted rather than targeted at small businesses.”

Specific threats facing SMEs

Small businesses are particularly vulnerable to security risks because they usually do not have a dedicated security officer. Sophos chief security adviser Chester Wisniewski says if you’re lucky, people who pay for their computer work understand and care for them.

However, most do not provide this protection, leaving small businesses vulnerable to attacks.

“The best thing you can do is either disable all connected devices, or at least know what the risks are,” Wisniewski said. “I see planters tweeting when they need water. We connect everything to the internet. The safest approach is to do what I do and does not connect these things. †

Part of the security risk comes from the industrial control systems of these devices, which are often designed by people who are doing very well. For example, a system can be designed by a person who knows a lot about the fridge or thermostats and designed the software so that the device or device is confronted with all kinds of interesting things, “said Wisniewski.

“The question is that they have a security expert who had participated in these things to understand what to do to maintain security? What’s going on when it’s time to take care of your refrigerator? How do you know? you should have the fridge to adjust? ”

If you place the refrigerator or intelligent thermostat on your Wi-Fi network, you are vulnerable because the computer code always has flaws, added Wisniewski. For small businesses, these are usually smart devices or devices on the same network that hold customer and credit card information.

“It’s a way for someone to gain a foothold in the network and not follow through, because I never think it’s the case (like a refrigerator) to steal data from the network,” Wisniewski said. “The more things related to the area in which you do business, the worse.”

According to Schoenberg, any device that can interact with something electronically is at risk of misuse. “All of these elements must be designed with safety in mind. This is very important given the slow life cycle of most of these devices. I hope security will be a competitive advantage for smart device manufacturers. ”

Protect your IoT devices

There are multiple ways to protect your IoT devices, your network, and the data stored on your network.

1. Create subnets.

Schouwenberg said it is next to impossible for a small business to protect all of its assets, so he suggested that they list the most important assets and then do whatever it takes to avoid network security threats.

“Work from there,” he told her. “Separate your network. The Internet of Things and Bring Your Own Device (BYOD) can be closely related, so it’s a good idea to consider policies in those areas. Many new smart appliances, such as refrigerators and televisions, work perfectly as plug devices. It is best not to contact unless you have a very effective feasibility study. ”

2. Collect only the amount of data needed for the transaction.

JayRadcliffe, chief security analyst at InGuardians, says small businesses should also limit the confidential information they collect. “If you don’t do anything with names and addresses, and your system collects this information by default, don’t collect it. The tendency of sellers and people who spread the Internet of Things is to perform all these things. It’s like going to a restaurant and order every dish when you really only need one thing.”

3. Avoid WiFi where you can.

Wisniewski agreed that one way small businesses can protect themselves is by not using Wi-Fi.

“Do you know what’s connected to your network?” he said. “Do not allow employees to bring their laptops and connect to the network that handles credit cards.”

According to Wisniewski, if you want your employees to use Wi-Fi during breaks, you’ll need to use only Wi-Fi to run another network. “We provide free Wi-Fi, but don’t connect it to the same location where you perform all your important tasks.”

If you cannot physically connect to your IoT device and rely on Wi-Fi, consider switching to a new network that uses the WPA3 protocol instead of the currently compromised WPA2. All Wi-Fi devices manufactured after July 1, 2020 must be WPA3 certified, but please check with your seller before making a purchase.

Cybersecurity while traveling is another concern. Use 3G, 4G, or 5G whenever possible. Cybercriminals’ favorite trick in open spaces and hotel lobbies is to create alternative Wi-Fi networks that look real.

4. Choose the right manufacturer and download the patch.

Printers can also be vulnerable, so check what you plan to connect to your network before you buy anything.

Haley said some of the security responsibility should rest with the manufacturers of these connected devices.

“I think the creators need to address that, but unfortunately [for anything to change] there has to be a bigger event. But for now, SMEs have some work to do. You need to ask yourself what your internet connection is and what the risks are. … [I] If you have these security cameras, check for vulnerabilities and fix them if any. Also, if you are using a business router, make sure you have the correct password set. “Also, if there is a vulnerability, be sure to update the latest patch.”

5. Take cybersecurity seriously from top to bottom.

Human error is the main reason for successful cyber security attacks in any business. From choosing strong passwords to downloading patches on release day, every company should take cybersecurity seriously. Teach your employees what types of attacks are, how to identify them, and what to do if they think they are the target.

Clear top-down leadership as well as staff training and monitoring is critical to cyber security in any business.

Check Also

How to Write a Debt Collection Letter

How to Write a Debt Collection Letter

This guide includes information about how to write a debt collection letter and pursue outstanding …

Leave a Reply

Your email address will not be published. Required fields are marked *