Internet-connected “Things"

The phrase “the Internet of things” (IOT) has gained currency over the past several years as more devices aside from traditional computing devices ​are being connected to the Internet. The term was coined in a 1999 presentation on the use of radio-frequency ID (RFID) chips to track items in the manufacturing and delivery process. Since then it has become a major issue in technology circles and a subject of much concern regarding the security implications of such Internet-connected "things."

Many appliances and other devices are connected to
the Internet now, primarily in order to provide for remote control and/or monitoring. Common examples include security cameras, thermostats, door locks, automobile systems, medical devices, and home lighting control systems (indeed, whole-house control systems). The Nest thermostat (and later smoke detector and cameras) was perhaps the first highly-visible and widely-known Internet-connected “thing,” and its popularity helped bring the issue of IOT to the forefront of attention in technology (IOT was at the peak of Gartner’s “hype curve” in 2014). The security of these devices is of concern, as vulnerabilities in medical devices and cars have been revealed over the past year, raising alarm at the potential for real-world harm from IOT security problems (not to mention creepy tales of hacked baby monitors.)

The problem of security for the IOT is primarily on the shoulders of the creators of these items at this point, to build better security into their products. But there are some steps you can take to improve the security of your “things":
  • Where IOT devices have dedicated passwords, ensure that you set a unique and strong password.

  • Most IOT devices use Wi-Fi; ensure that your Wi-Fi is set up securely.

  • Read the instructions to see if there is a process for updating the software on your “thing,” and check for updates.

  • Read up on products before buying, specifically checking for reported security issues.

  • Consider implementing a virtual private network (VPN) and accessing your “things” in that way rather than allowing them to be contacted through your firewall.

  • Consider placing your IOT devices on a separate Wi-Fi network firewalled off from your general-purpose network (may require using a separate Wi-Fi access point, or an advanced access point that supports multiple networks).

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Critical Vulnerability Discovered in IIS 6.0 Web Services