{"id":15741,"date":"2018-07-16T09:55:48","date_gmt":"2018-07-16T09:55:48","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=15741"},"modified":"2023-08-08T09:04:31","modified_gmt":"2023-08-08T07:04:31","slug":"the-challenges-of-securing-the-internet-of-things","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/the-challenges-of-securing-the-internet-of-things\/","title":{"rendered":"The Challenges of Securing the Internet of Things"},"content":{"rendered":"<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/Blog_Banner_Desktop-1.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/Blog_Banner_Mobile-1.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>The IoT is growing more pervasive every day, as it becomes increasingly difficult to avoid interacting with an interconnected web of smart devices. By 2017, the number of interconnected devices on the IoT already exceeded the world population at 8.4 billion, and analyst firm Gartner estimates that number to grow to 20.4 billion devices by 2020.<a href=\"https:\/\/www.zdnet.com\/article\/iot-devices-will-outnumber-the-worlds-population-this-year-for-the-first-time\/\" target=\"_blank\" rel=\"noopener noreferrer\"><sup>1<\/sup><\/a><\/p>\n\n\n\n<p>From one perspective, this is a highlight of contemporary innovation &#8211; our lives are becoming easier and more streamlined through the use of technology. However, the IoT brings with it a host of new challenges in the realm of cybersecurity.<\/p>\n\n\n\n<p>Those sensors in your running shoes can also be used to track your movements, revealing your exact location to anyone with access to the code. A hacker could open your smart front door remotely, or take the wheel of your driverless car. With a malicious coder behind the keyboard, even your trusty Alexa could start making some very questionable Amazon orders on your behalf.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Balancing the Potential and Pitfalls of IoT<\/strong><\/h5>\n\n\n\n<p>To be fully equipped for a future of IoT, you have to consider that every device in the network can execute code, and can therefore be hacked and used to execute malware.<\/p>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/PullQuote1_Desktop-1.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/PullQuote1_Mobile-1.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>As the IoT becomes more integrated with our daily lives, it builds a growing cache for massive amounts of sensitive information, making the IoT an attractive target for would-be cyber criminals. Because the network is always online, it\u2019s available day and night to malbots, constantly scanning for vulnerabilities and unlocked doors in your cybersecurity system. This year, Gartner estimated that 20% of organizations experienced at least one IoT attack in the past three years.<a href=\"https:\/\/www.techrepublic.com\/article\/iot-security-spending-to-hit-1-5b-in-2018-as-targeted-cyberattacks-grow-rampant\/\" target=\"_blank\" rel=\"noopener noreferrer\"><sup>2<\/sup><\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Geolocational Data Breaches<\/strong><\/h5>\n\n\n\n<p>Through geolocation data technology, your exact location can be pinpointed and shared in the blink of a keystroke.<\/p>\n\n\n\n<p>In 2017, inadequate security measures in Amazon\u2019s S3 cloud storage service resulted in a massive data leak, where more than 540,000 GPS tracker devices\u2019 data was found to be available online. Along with personal information like usernames and passwords, the leak also released vehicle license plates and GPS logs, revealing a full location history for each affected vehicle on the network.<\/p>\n\n\n\n<p>Monitoring app mSpy is a modern parent\u2019s dream, allowing them to keep tabs on their children\u2019s location and internet activities. However, poor security compounded by a lack of end-to-end encryption-based protection lead to a massive data leak in 2015. Hundreds of gigabytes of sensitive data were leaked, affecting more than 400,000 customers.<a href=\"https:\/\/threatmodeler.com\/2016\/07\/26\/collateral-damage-geolocation-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\"><sup>3<\/sup><\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Developing a strategy of Cyber Resilience<\/strong><\/h5>\n\n\n\n<p>The architects of the IoT network have the difficult task of predicting these vulnerabilities before a cybercriminal does. To ensure the safety of businesses and consumers, cybersecurity must be thought of as an integrated aspect of product design, not an afterthought implemented at the end of the design process.<\/p>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/PullQuote2_Desktop-1.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/PullQuote2_Mobile-1-1.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>Alex Drozhzhin observed that developers of IoT devices \u201cface realities of a brand new world they know nothing about,\u201d and don\u2019t recognize the need for security. \u201cFor an average user, a connected microwave is still just a microwave. A user would never imagine it is a fully equipped, connected computer which has means of influencing the physical world.\u201d<a href=\"https:\/\/blog.kaspersky.com\/internet-of-crappy-things\/7667\/\" target=\"_blank\" rel=\"noopener noreferrer\"><sup>4<\/sup><\/a><\/p>\n\n\n\n<p>Cybersecurity experts need a holistic approach to the security strategies protecting the Internet of Things. Being cyber secure doesn\u2019t stop with a good security system, but builds over time into cyber-resilient strategies that can dynamically reshape to meet the challenges of new cyber threats as they appear.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\">The Harvard Cybersecurity online short course equips cybersecurity professionals with the skills to design, implement, and maintain a holistic cyber security strategy in any organization.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a class=\"button large postcta\" href=\"https:\/\/www.getsmarter.com\/courses\/us\/harvard-cybersecurity-online-short-course\" target=\"_blank\" rel=\"noopener noreferrer\">REGISTER NOW<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you ready for the security risks that come with the Internet of Things?<\/p>\n","protected":false},"author":74,"featured_media":19550,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[117],"tags":[120],"article-format":[],"class_list":["post-15741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-market-trends","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v26.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Challenges of Securing the Internet of Things - Career Advice<\/title>\n<meta name=\"description\" content=\"The Internet of Things is spreading to make homes, businesses, and cities more connected. Are you equipped for the security risks that come with it?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/the-challenges-of-securing-the-internet-of-things\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Challenges of Securing the Internet of Things\" \/>\n<meta property=\"og:description\" content=\"The Internet of Things is spreading to make homes, businesses, and cities more connected. Are you equipped for the security risks that come with it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/the-challenges-of-securing-the-internet-of-things\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-16T09:55:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-08T07:04:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/Thumbnail-1-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shameel Mohanlal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.getsmarter.com\/blog\/the-challenges-of-securing-the-internet-of-things\/#primaryimage\",\"url\":\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/Thumbnail-1-1.png\",\"contentUrl\":\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/Thumbnail-1-1.png\",\"width\":500,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.getsmarter.com\/blog\/the-challenges-of-securing-the-internet-of-things\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.getsmarter.com\/blog\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Challenges of Securing the Internet of Things - Career Advice","description":"The Internet of Things is spreading to make homes, businesses, and cities more connected. Are you equipped for the security risks that come with it?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/the-challenges-of-securing-the-internet-of-things\/","og_locale":"en_US","og_type":"article","og_title":"The Challenges of Securing the Internet of Things","og_description":"The Internet of Things is spreading to make homes, businesses, and cities more connected. Are you equipped for the security risks that come with it?","og_url":"https:\/\/www.getsmarter.com\/blog\/the-challenges-of-securing-the-internet-of-things\/","og_site_name":"GetSmarter Blog","article_published_time":"2018-07-16T09:55:48+00:00","article_modified_time":"2023-08-08T07:04:31+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/Thumbnail-1-1.png","type":"image\/png"}],"author":"Shameel Mohanlal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/the-challenges-of-securing-the-internet-of-things\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/Thumbnail-1-1.png","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/07\/Thumbnail-1-1.png","width":500,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/the-challenges-of-securing-the-internet-of-things\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]}},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/15741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=15741"}],"version-history":[{"count":6,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/15741\/revisions"}],"predecessor-version":[{"id":50158,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/15741\/revisions\/50158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/19550"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=15741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=15741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=15741"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=15741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}