• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  3 Key Security Challenges for IoT
Security challenges for IoT
27 July 2017

3 Key Security Challenges for IoT

Written by Seqrite
Seqrite
Security
Estimated reading time: 3 minutes

Internet of things (IoT) is no more just ‘the next big thing’ but has already started entering our lives in different forms. Today there are billions of devices from consumer products (e.g. Fitbit) to Industrial products (Industrial sensors) that are deployed to make life easy and many of them are based on concepts of IoT. It is being touted as the technology that will turn the sci-fi world of fiction into reality. While IoT is surely achieving its objectives of making devices smarter, its security is often overlooked.

The cyber breaches in IoT based systems have already started happening. The Stuxnet attack sabotaged Iran’s nuclear enrichment facility leading to destruction of almost 1000 centrifuge machines. In 2014, hackers shut down an offshore oil rig which took authorities 20 days to make it seaworthy again. On consumer side, in 2016, cyber criminals shut down the heating system of 2 buildings in Finland dropping their temperature to dangerous levels. Similarly, in 2015, many toasters, freezers, and fridges were shut down in the UK due to an IoT attack. This may seem comical but the threat of security breach of IoT devices is real and dangerous. IoT is vulnerable to hacks hence security of IoT systems should be a priority for companies.

The Top 3 Challenges in Securing IoT

1. Innumerable points of vulnerability– Internet of Things means that every device is connected to each other. Subsequently, every device becomes an entry point into the system and each of them can be a target of a cyber attack. For example, in an industrial setting, every sensor along the hundred kilometers oil or gas pipeline is a potential target for cyber attack. Multiply this with the industrial sensors connected to each other all over the world to get the idea of the scale of the threat. At home, a smart TV, a smart fridge, and smart lighting control are all connected to the Internet. Each of these can be a potential target to hack a home automation network, bringing down all devices inside your home. In a nutshell, every device connected to the Internet anywhere in the world is a potential target for attack. With the number of connected devices consistently increasing, the risk is also rapidly increasing.

2. The many software versions– IoT is a fast paced and competitive industry. Companies, entrepreneurs, and innovators are rushing out their products without proper security testing. While the devices are relatively ‘hack-proof’ when they are first released, as time passes by their vulnerabilities begin to show up. This becomes a problem due to multiple reasons.

  • The companies are busy creating the next IoT device and pay little attention to the security problem of existing devices. After a few security patch releases, they stop supporting the device leaving it vulnerable to attacks.
  • Imagine a smart house where TV, refrigerator, oven, heating, lighting system and even the toaster is smart. As a house owner, one needs to constantly update each of these devices with security patches as they are released. Many home users don’t perform security updates on their home computer. Even one device with an open vulnerability can bring down all the connected devices.

3. Data protection– IoT is built to connect devices to sense and collect data. This data is sent to the main computers for further processing. These computers will generally be hosted by a corporation. This leads to a massive challenge of trust. How much can one trust corporations with their personal sensitive data? When does it become a breach of privacy for the IoT user? For example, British Petroleum distributed Fitbits to its employees so that they can track their health and get better rates for their Insurance. This essentially meant that the company was monitoring its worker’s health 24×7. Now that could be a breach of privacy. Another company RadioShack tried to share such data with other companies which is a clear misuse of data obtained from IoT devices.

IoT is making life easier. Smart solutions are making their way into homes and offices because they increase productivity. However, they are difficult to secure, owing to their design and limited computing ability. While it may not be possible to always secure every individual IoT device, securing the network that is hosting such devices can prevent the security breaches. Further, monitoring of the data that is transmitted from these devices over the network can help in detecting suspicious activities and stop further transmission. Gateway security solutions such as Seqrite Terminator can protect offices, and industries from the attack on their IoT devices and keep them safe and secure.

Seqrite helps businesses simplify IT security and maximize business performance. To know more about our products and services visit our website or

seqrite_cta1

 Previous Post5 Security Threats in Healthcare Industry – INFOGRAPHIC
Next Post  Data Loss Prevention (DLP): Comprehensive control over business d...
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Zloader: Entailing Different Office Files

    March 23, 2021
  • Is your Router exposed to cyber threats

    Is your router exposed to cyber threats? Here is how to safeguard it.

    July 30, 2020
  • Snake ransomware stings to spread its venom in the veins of enterprise networks.

    Snake Ransomware brings impending doom to enterprise networks

    July 10, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form March 22, 2021
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • How to avoid dual attack and vulnerable files with double extension?

    How to avoid dual attack and vulnerable files with double extension?

    April 9, 2021
  • Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    April 4, 2021
  • Zloader: Entailing Different Office Files

    Zloader: Entailing Different Office Files

    March 23, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (10) Bitcoin (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (284) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (14) EPS (9) Exploit (12) firewall (11) GDPR (10) IoT (10) malware (59) malware attack (23) malware attacks (12) MDM (25) Network security (18) Patch Management (12) phishing (17) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite Workspace
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.