A Strong Security Posture Is Crucial for IoT
Thu, January 27, 2022

A Strong Security Posture Is Crucial for IoT

Hackers love to target IoT devices / Photo Credit: vs148 (via Shutterstock)


Ravi Raj Bhat of data protection, privacy, and cybersecurity website CPO Magazine said IoT devices are the favorite target of hackers. They like it due to the sheer number of IoT devices today, with about 10 billion being deployed across the world, growing to over 25 billion in the next five years. Most IoT devices are deployed by consumers who may not be knowledgeable about online security risks or who do not exercise caution. These devices are usually left alone as soon as they are deployed. 

The easiest way for hackers to compromise IoT devices is through a brute-force trial-and-error method— logging into them using the most commonly used default usernames and passwords known to among IoT device manufacturers. The second most common way for hackers to access these devices is any known vulnerabilities resulting in an outdated firmware. Another is weak or no authentication of the IoT device. A favorite among hackers is a hidden backdoor, which is offered by device manufacturers for customer service purposes. To address these risks, you must change the default username and password before connecting your device to a network, monitor firmware updates released by the manufacturer, and deploy network policies that allow the IoT device to talk to a “limited set of services in the network.” You must also be aware of any backdoor and secure your device with either a strong authentication or shut it down. 

Malicious traffic from compromised IoT devices conscripted as botnets is a threat to the network and services it hosts. Hence, it is prudent to create a build a blacklist of things like IP addresses, web URLs, and the like that you need to take note of and filter them out when you encounter them. On the other hand, edge computing environments provide another layer of protection against cyber attacks originating from IoT devices. If you employ enough intrusion protection capabilities in the said environment, you can filter out most of the malicious traffic from the devices connected to the edge computing environment.