Earlier, we told you about the reasons to get an ssl certificate. We even included links to godaddy ssl coupon websites so that you have everything you need to make your website as secure as possible. If you didn’t, then here’s another resource for a godaddy ssl coupon from VPS coupons. But even if you secure your website, is your TV safe? How about your DVD player? These new devices that have access to the internet are referred to as the ‘internet of things‘. And they have already demonstrated that they can be manipulated to wreak havoc on our daily life by hackers.
The IoT and Business Security: Is The Worst Yet To Come?
The Dyn attack of late 2016 was a wake-up call for Internet of Things security. It was a warning to the world that there really wasn’t any. Smart devices by and large have thus far been made with security specs that would be completely unacceptable on a mobile device or computer system. For example, default unchangeable factory-set passwords, an inability to receive firmware patches to address known exploits, and passing of data in plain text are all very much the norm on these devices.
The attack involved turning these devices into “zombies” and collectively harnessing their ability to request data in order to shut down other websites. While that’s certainly something that no one wants to happen, businesses may not have seen the immediate threat to their own devices being hacked. If business IoT devices are connected to either the business network or to individual computers, however, their lack of security represents a potentially easy infiltration point for hackers to further burrow into those systems.
Given the general state of IoT security, it’s actually surprising that there hasn’t been a large-scale high-profile attack comparable to the one on Dyn but with IoT devices as the doorway by which hackers breach a network and steal mass amounts of private data. This is a major security concern for all types of businesses, even those in the “small to medium” categorization. The lack of ability to patch or address vulnerabilities in these devices mean that hackers have a reliable open door once one is found.
Unfortunately, most of the solution to this issue is on the manufacturer’s end. Manufacturers simply have to commit to taking IoT device security more seriously, and both business and residential consumers can help move things along by being more selective of what they purchase. In the interim, if businesses absolutely need to use IoT devices that are lacking in necessary security protections, the best option is to keep them on a separate network that has no contact with the rest of the business systems.