{"id":22932,"date":"2019-02-11T14:57:46","date_gmt":"2019-02-11T12:57:46","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=22932"},"modified":"2023-08-08T14:45:33","modified_gmt":"2023-08-08T12:45:33","slug":"cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/","title":{"rendered":"Cybersecurity Risks in the Internet of Things (and How to Solve Them)"},"content":{"rendered":"<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/02\/Slot_31_Q4_banner_970x300px-1.jpg\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/02\/Slot_31_Q4_banner_500x278px-1.jpg\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>The digital age has entirely reshaped how we create, enjoy, and share information around the world. If you find yourself needing to know almost anything, the answer is at your fingertips\u2026 but this has caused some new security concerns to arise too.<\/p>\n\n\n\n<p>The most obvious security concern on top of everyone\u2019s mind is: bad passwords. Despite our awareness of using easy-to-hack passwords, the second most used password in 2018 was shockingly \u201cpassword\u201d,<sup>1<\/sup>&nbsp;a fact made more frightening when you find out that over 3.3 billion records were stolen in the first half of 2018 (making clear just how vulnerable we all are).<sup>2<\/sup> But it goes far deeper than that when you start investigating it. This is the trouble with the freedom of information and connection that the Internet of Things (IoT) has brought, because the IoT is reshaping the cybersecurity landscape.<sup>3<\/sup><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the Internet of Things?<\/h2>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/02\/Slot_31_Q4_infographic_desktop_970px-1.jpg\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/02\/Slot_31_Q4_infographic_desktop_400px-1.jpg\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>To understand what security threats you might be open to, first it\u2019s important to understand exactly what the Internet of Things (IoT) is. The answer? Put simply, it\u2019s everything you own that\u2019s connected to the Internet.<\/p>\n\n\n\n<p>Matthew Evans, the IoT programme head at techUK, explains that \u201cthe Internet of Things is made up of devices \u2013 from simple sensors to smartphones and wearables \u2013 connected together.\u201d<sup>4<\/sup> Evans means that the IoT is a network of devices and technology that are connected to each other through the Internet, able to communicate with one another and pass information between each other. As technology evolves, the IoT grows and becomes larger, its network expanding to increase more devices and more people\u2019s information, and so opening itself up constantly to new types of security threats.<sup>5<\/sup><\/p>\n\n\n\n<p>That is why IoT security is so important, and becoming increasingly more so as the world tends towards more reliance on digital technology. Much like cybersecurity, IoT security is comprised of systems and tools that you can use to protect yourself against attacks or hacks into your IoT network. Instead of being an entirely different sector of security, IoT security is what you might call a \u201cdepartment\u201d of cybersecurity, as it deals only with the safeguarding of connected private or public networks.<\/p>\n\n\n<div class=\"related-programme-block\">\n<div class=\"related-programme\" onclick=\"window.open('https:\/\/www.getsmarter.com\/products\/mit-sloan-internet-of-things-business-implications-and-opportunities-online-short-course', '_blank')\">\n    <div class=\"row\">\n        <div class=\"col-12 col-md-11\">\n            <div class=\"related-programme__school-logo-container\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/massachusetts-institute-of-technology\" target=\"_blank\" class=\"related-programme__school-logo-link\">\n                <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/09\/blog_related_courses_logos_MIT_Sloan.png\" alt=\"School Logo\" class=\"related-programme__school-logo\">\n            <\/a>\n            <\/div>\n            <div class=\"related-programme__copy\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/massachusetts-institute-of-technology\" target=\"_blank\" class=\"related-programme__school-name\">\n                MIT Sloan School of Management            <\/a><br>\n            <a href=\"https:\/\/www.getsmarter.com\/products\/mit-sloan-internet-of-things-business-implications-and-opportunities-online-short-course\" target=\"_blank\" class=\"related-programme__programme-name\">\n                Internet of Things: Business Implications and Opportunities            <\/a>\n            <\/div>\n        <\/div>\n        <div class=\"col-md-1 related-programme__chevron-column\">\n            <div class=\"related-programme__icon-container\">\n                <img decoding=\"async\" class=\"add-btn\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/themes\/blog\/assets\/icn_arrow-circle_right.svg\" alt=\"Read More Icon\">\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Security concerns in the Internet of Things<\/h2>\n\n\n\n<p>Business leaders might find themselves wondering how to secure their existing IoT systems, or how to implement new IoT systems safely. The best protection when in this situation is to gain awareness of the common security threats that you might find when managing or setting up an IoT system, and how to work through or around them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4 common security concerns in the Internet of Things:<\/h3>\n\n\n\n<p><strong>1.Transport layer weakness:<\/strong> This is when the applications that manage your data don\u2019t take any measure to protect it, or even poor measures. Unfortunately, this leaves your data unencrypted and open to a hack (quite literally, the layers of protection surrounding your data whilst in transport through the network are weak).<sup>6<\/sup> To help avoid this being the case in your IoT network, you will need to keep your security certificates up to date, keep your protocols up to date, and employ encryption technology to encrypt the data that you want kept within a private network only. Some examples of encryption technologies that could be used are Cisco, HPE, or Symantec.<\/p>\n\n\n\n<p><strong>2. Vulnerability to account compromise:<\/strong> This is a broad term meaning that a system has poor account authentication or registration present. If your system doesn\u2019t have strong passwords or account lockouts in place for users, you leave it open to brute force attack. You can automate a lot of these solutions for yourself by making use of an authentication technology like Covisint, Gemalto or Baimos Technologies.<\/p>\n\n\n\n<p><strong>3. Shared and default secrets:<\/strong> Everyone does it, but it\u2019s not a good idea for all your devices and different accounts to share the same login names and passwords. It does make it easy for you to remember them, but it also makes it easy to hack your entire IoT network.<sup>9<\/sup> Keep login information varied and as random as possible to avoid vulnerability in this area.<\/p>\n\n\n\n<p><strong>4. Device specific concerns:<\/strong> There are always security concerns that are specific to the kind of devices or technology that you\u2019re using in your IoT network.<sup>10<\/sup> It\u2019s always a good idea to research the companies, brands, models, and software that you\u2019re using to understand where you might be vulnerable. Some of these device-specific concerns include debug services enabled (an enabled debug service interface creates \u201ca rich attack surface to dump firmware, steal secrets, and otherwise compromise devices provided they have physical access\u201d), missing patches (many systems do not automatically update, which means that often a security system can be so out of date that it is easily attacked), and insecure updates (many system attackers gain access by injecting damaging code into unverified updates that users unknowingly install \u2013 always make sure your system asks to verify updates before installing them).<sup>11<\/sup> Vigorous research into your IoT network devices and software, and making sure everything is always up to date, is how you can make sure to avoid these issues.<sup>12<\/sup><\/p>\n\n\n\n<p>Burying your head in the sand certainly won\u2019t solve any problems, because the Internet of Things is only growing. The world is asking it to grow. As everyone constantly seeks more data to allow for more opportunities, this also continually opens up their systems to more risk.<sup>13<\/sup> In today\u2019s digital business era, IoT cybersecurity is as important as your physical security, but, thankfully, with the freedom of information comes solutions in how to handle cybersecurity threats. The final answer is to stay on your toes, and keep learning.<\/p>\n\n\n\n<div id=\"accordion\">\n<div class=\"card\">\n<div id=\"headingOne\" class=\"card-header\">\n<h6 class=\"mb-0\"><button class=\"btn\" style=\"background-color: transparent;\" data-toggle=\"collapse\" data-target=\"#sources\" aria-expanded=\"true\" aria-controls=\"sources\"> <strong>Click here to view sources<\/strong> <\/button><\/h6>\n<\/div>\n<div id=\"sources\" class=\"collapse\" aria-labelledby=\"headingOne\" data-parent=\"#accordion\">\n<div class=\"card-body\">\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>1<\/sup> Rense, S. (Dec, 2018). \u2018The top 25 passwords in 2018 are an embarrassment to humankind\u2019. Retrieved from <a href=\"https:\/\/www.esquire.com\/lifestyle\/a25570880\/top-passwords-2018\/\" target=\"_blank\" rel=\"noopener\">Esquire.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>2<\/sup> (Oct, 2018). \u2018Data Breaches Compromised 4.5 Billion Records in First Half of 2018\u2019. Retrieved from <a href=\"https:\/\/www.gemalto.com\/press\/Pages\/Data-Breaches-Compromised-3-3-Billion-Records-in-First-Half-of-2018.aspx\" target=\"_blank\" rel=\"noopener\">Gemalto.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>3<\/sup> Blech, R. J. (May, 2018). \u2018How IoT is reshaping the cybersecurity landscape\u2019. Retrieved from <a href=\"https:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/How-IoT-is-reshaping-the-cybersecurity-landscape\" target=\"_blank\" rel=\"noopener\">IoT Agenda.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>4<\/sup> Burgess, M. (Feb, 2018). \u2018What is the Internet of Things?\u2019. Retrieved from <a href=\"https:\/\/www.wired.co.uk\/article\/internet-of-things-what-is-explained-iot\" target=\"_blank\" rel=\"noopener\">WIRED.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>5<\/sup> Burgess, M. (Feb, 2018). \u2018What is the Internet of Things?\u2019. Retrieved from <a href=\"https:\/\/www.wired.co.uk\/article\/internet-of-things-what-is-explained-iot\" target=\"_blank\" rel=\"noopener\">WIRED.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>6<\/sup> (Nd). \u2018Insufficient Transport Layer Protection\u2019. Retrieved from <a href=\"https:\/\/www.veracode.com\/security\/insufficient-transport-layer-protection\" target=\"_blank\" rel=\"noopener\">Veracode.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>7<\/sup> (Nd). \u2018The 8 Biggest IoT Security Mistakes and How to Avoid Them\u2019. Retrieved from <a href=\"https:\/\/p16.praetorian.com\/downloads\/report\/The_8_Biggest_IoT_Security_Mistakes_and_How_to_Avoid_Them.pdf?mkt_tok=eyJpIjoiWkRFNVlUSTBOamN3WlRobSIsInQiOiJXd2Z1RmlXcjdSejZPM29PMjE1NlwvYUJmd1hVXC93Vkd0eHBQd1RpZ0NNbDlKSklEbE1HQVNjWEhVRWVrUFpqNTB1TDVrMm1UYVlRdXUwNHgyUzg4SFdURXBFeFFCbnJuVzdiamMrc09HTEpTalwvK0JpbStVbmVvVk4zVlRJVVVISSJ9\" target=\"_blank\" rel=\"noopener\">Praetorian.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>8<\/sup> (Nd). \u2018The 8 Biggest IoT Security Mistakes and How to Avoid Them\u2019. Retrieved from <a href=\"https:\/\/p16.praetorian.com\/downloads\/report\/The_8_Biggest_IoT_Security_Mistakes_and_How_to_Avoid_Them.pdf?mkt_tok=eyJpIjoiWkRFNVlUSTBOamN3WlRobSIsInQiOiJXd2Z1RmlXcjdSejZPM29PMjE1NlwvYUJmd1hVXC93Vkd0eHBQd1RpZ0NNbDlKSklEbE1HQVNjWEhVRWVrUFpqNTB1TDVrMm1UYVlRdXUwNHgyUzg4SFdURXBFeFFCbnJuVzdiamMrc09HTEpTalwvK0JpbStVbmVvVk4zVlRJVVVISSJ9\" target=\"_blank\" rel=\"noopener\">Praetorian.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>9<\/sup> Gerber, A. (Nov, 2017). \u2018Top 10 IoT security challenges\u2019. Retreieved from IBM Developer.<\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>10<\/sup> Reif, A. (Jul,2017). \u2018PKI vs shared secret as authentication mechanism in IoT\u2019. Retrieved from <a href=\"https:\/\/medium.com\/@alex.raif86\/pki-vs-shared-secret-as-authentication-mechanism-in-iot-smarthome-smart-business-solutions-90da1032d841\" target=\"_blank\" rel=\"noopener\">Medium.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>11<\/sup> (Nd). \u2018The 8 Biggest IoT Security Mistakes and How to Avoid Them\u2019. Retrieved from <a href=\"https:\/\/p16.praetorian.com\/downloads\/report\/The_8_Biggest_IoT_Security_Mistakes_and_How_to_Avoid_Them.pdf?mkt_tok=eyJpIjoiWkRFNVlUSTBOamN3WlRobSIsInQiOiJXd2Z1RmlXcjdSejZPM29PMjE1NlwvYUJmd1hVXC93Vkd0eHBQd1RpZ0NNbDlKSklEbE1HQVNjWEhVRWVrUFpqNTB1TDVrMm1UYVlRdXUwNHgyUzg4SFdURXBFeFFCbnJuVzdiamMrc09HTEpTalwvK0JpbStVbmVvVk4zVlRJVVVISSJ9\" target=\"_blank\" rel=\"noopener\">Praetorian.<\/a><\/li>\n<\/ul>\n<ul class=\"mx-0\" style=\"list-style: none;\">\n<li class=\"mb-4\"><sup>12<\/sup> Gerber, A. (Nov, 2017). \u2018Top 10 IoT security challenges\u2019. Retreieved from <a href=\"https:\/\/developer.ibm.com\/articles\/iot-top-10-iot-security-challenges\/\" target=\"_blank\" rel=\"noopener\">IBM Developer.<\/a><\/li>\n<li class=\"mb-4\"><sup>13<\/sup> (Nd). \u2018Cyber risk in an Internet of Things world\u2019. Retrieved from <a href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/technology-media-and-telecommunications\/articles\/cyber-risk-in-an-internet-of-things-world-emerging-trends.html\" target=\"_blank\" rel=\"noopener\">Deloitte.<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The digital age has entirely reshaped how we create, enjoy, and share information around the world. If you find yourself needing to know almost anything, the answer is at your fingertips\u2026 but this has caused some new security concerns to arise too. The most obvious security concern on top of everyone\u2019s mind is: bad passwords. [&hellip;]<\/p>\n","protected":false},"author":74,"featured_media":22940,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[117],"tags":[120],"article-format":[],"class_list":["post-22932","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-market-trends","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Risks in the Internet of Things (and How to Solve Them) - GetSmarter Blog<\/title>\n<meta name=\"description\" content=\"Discover some of the cybersecurity risks and concerns that have arisen through the continued adoption and growth of the internet of things (IoT).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Risks in the Internet of Things (and How to Solve Them)\" \/>\n<meta property=\"og:description\" content=\"Discover some of the cybersecurity risks and concerns that have arisen through the continued adoption and growth of the internet of things (IoT).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-11T12:57:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-08T12:45:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/02\/Slot_31_Q4_banner_500x278px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shameel Mohanlal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\\\/\"},\"author\":{\"name\":\"Shameel Mohanlal\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/#\\\/schema\\\/person\\\/527df7e5676f2bfa7c943e1653764bff\"},\"headline\":\"Cybersecurity Risks in the Internet of Things (and How to Solve Them)\",\"datePublished\":\"2019-02-11T12:57:46+00:00\",\"dateModified\":\"2023-08-08T12:45:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\\\/\"},\"wordCount\":1121,\"image\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Slot_31_Q4_banner_500x278px.jpg\",\"keywords\":[\"Systems &amp; technology\"],\"articleSection\":[\"Market Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Slot_31_Q4_banner_500x278px.jpg\",\"contentUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Slot_31_Q4_banner_500x278px.jpg\",\"width\":500,\"height\":278},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Risks in the Internet of Things (and How to Solve Them) - GetSmarter Blog","description":"Discover some of the cybersecurity risks and concerns that have arisen through the continued adoption and growth of the internet of things (IoT).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Risks in the Internet of Things (and How to Solve Them)","og_description":"Discover some of the cybersecurity risks and concerns that have arisen through the continued adoption and growth of the internet of things (IoT).","og_url":"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/","og_site_name":"GetSmarter Blog","article_published_time":"2019-02-11T12:57:46+00:00","article_modified_time":"2023-08-08T12:45:33+00:00","og_image":[{"width":500,"height":278,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/02\/Slot_31_Q4_banner_500x278px.jpg","type":"image\/jpeg"}],"author":"Shameel Mohanlal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/#article","isPartOf":{"@id":"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/"},"author":{"name":"Shameel Mohanlal","@id":"https:\/\/www.getsmarter.com\/blog\/#\/schema\/person\/527df7e5676f2bfa7c943e1653764bff"},"headline":"Cybersecurity Risks in the Internet of Things (and How to Solve Them)","datePublished":"2019-02-11T12:57:46+00:00","dateModified":"2023-08-08T12:45:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/"},"wordCount":1121,"image":{"@id":"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/02\/Slot_31_Q4_banner_500x278px.jpg","keywords":["Systems &amp; technology"],"articleSection":["Market Trends"],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/02\/Slot_31_Q4_banner_500x278px.jpg","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/02\/Slot_31_Q4_banner_500x278px.jpg","width":500,"height":278},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/cybersecurity-risks-in-the-internet-of-things-and-how-to-solve-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]}},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/22932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=22932"}],"version-history":[{"count":22,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/22932\/revisions"}],"predecessor-version":[{"id":50366,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/22932\/revisions\/50366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/22940"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=22932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=22932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=22932"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=22932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}