Posts Tagged Internet Of Things

Considerations For Mitigating Risk In IoT Devices

March 28, 2016

With the exponential growth of Internet of Things (IoT) devices, the security risks associated with them have also increased manifold. Each device, including TVs, refrigerators, home automation systems, air conditioning units etc., which is connected to the internet has an in-built operating system, making it vulnerable to the prevalent online threats. This, ultimately, puts the end-users’ privacy and security at stake.

Here are some factors that must be considered to mitigate security risks in IoT devices:

Keep devices updated

Keep all the IoT devices and routers updated to the current versions of the software applications. This will provide protection against any minor security flaws in the software which may make the device vulnerable to a hacking attack.

Change default login credentials

You must create unique and difficult usernames as well as passwords for all your IoT devices. If you do not change the default login credentials, hackers can easily gain access to your personal internet network by breaching your IoT accounts. Make sure the password you create is complex enough to be cracked.

Limit the data you provide to the IoT service or device

Provide only a limited amount of information that is absolutely required for the IoT device to function efficiently. Avoid giving in sensitive personal information and if possible, enter a nickname instead of your full name. This will protect you against a potential identity theft.

Be careful when selling or purchasing used IoT devices

When you buy a used IoT device, it is quite possible that it has a malware or backdoor that can provide hackers an access to your internet connection. With this, they can infect your network, track your online activity and steal other important information. If you need to sell off your IoT device, make sure you restore it back to the factory settings to delete all the personal identifiable information (PII) stored in it.

Set up a different network for IoT devices

Some internet routers allow the users to create a separate network for different devices. You can make all your IoT and wireless devices operate on a network other than your home’s internet connection. Therefore, even if any of your devices are compromised, the hackers will not be able to access your entire network.

We, at Centex Technologies, can help to safeguard your IoT devices against common cyber security threats. For more information, you can call us at (855) 375 – 9654.

, ,

No Comments

Internet Of Things: Security Risks And Challenges

November 9, 2015

The term – Internet of Things (IoT) essentially refers to a uniquely identifiable network of physical objects, such as wearable gadgets, smart phones, TVs, electronic appliances, cars etc., that are rooted with software, sensors and internet connectivity. These devices are able to connect and share information without requiring a machine-to-machine or human-to-machine interaction. While they can be a game changer in terms of the way we live our daily lives, being in nascent stage, IoT devices are still quite vulnerable to hacking attacks.

Here are some of the security risks associated with Internet of Things:

  • Data Breach: With the lack timely updation of security software, IoT devices can be at risk for exposing sensitive information to cybercriminals that can be used for malicious purposes. Hackers can stalk the different devices in an IoT network and steal the data shared between them. Data breaches can be a serious threat to the virtual security of individuals and organizations that use such devices.
  • Botnets: These are a group of remote computers, smart appliances and network connected electronic gadgets working together to achieve an illegal goal. The bots are usually transferred to these devices through insecure internet ports or spam downloads. A malicious code is used to infect the IoT devices and exploit the software on which they operate.
  • Cross-Device Access: IoT devices generally connect to a computer system, Wi-Fi network or smartphone to operate. This provides an additional route hackers can take to gain access to the information stored on all systems connected with the IoT device. By installing a malicious program or code on an IoT device, the attacker can get hold of entire network and system files. It also makes users vulnerable to a man-in-the-middle attack where hackers can intercept or modify information shared between two IoT devices.
  • Dos Attacks: A Denial of Service (DoS) attack involves using the bandwidth, network resource, CPU time etc. of a malware infected computer. The hacker attempts to flood the infected computer network with a huge amount of traffic that causes its functioning to cease. With Internet of Things, the hackers are easily able to access a number of interconnected devices through a single path.
  • Ransomware: This is malware based attack that limits or restricts the user’s access to an infected device unless he pays a certain sum of ransom to the hacker. With the increasing use of interconnected IoT devices, the risk for ransomware attacks has also escalated manifold.

We, at Centex Technologies, provide complete cybersecurity solutions to the business firms in Central Texas. For more information, you can call at (972) 375 – 9654.

,

No Comments