The Internet of Things or IoT has become a buzz word these days. It refers to increased integration of physical world with computer or digital based smart devices. The key feature of this technology is that it can enable communication between two devices without human intervention. This technology has become an integral part of devices like wearables (fitness tracker), security camera, smart lighting and most important of all Smart TVs & Smart Cars. So, if you are using any of these devices, you have knowingly or unknowingly become a part of ‘Internet of Things’.
That said, how these devices operate? Well, The Internet of Things (IoT) consists of all the devices that are web-enabled. These web-enabled devices can collect or send data they acquire from their surrounding environments via embedded sensors, processors, and communication hardware.
Many IoT devices which feature sensors can register changes like, change in temperature, movement, etc. These sensors are manufactured the same way as microprocessors, through a lithography process and form a part of a device category called a microelectromechanical system (MEMS).
When it comes to the use of IoT, they have a wide range of applications in industries and are fast gaining acceptance on account of its convenience as it automates most of the time-consuming activities.
The IoT opens up a lot of opportunities. For instance, big vendors have embraced this standard in Engineering. An IoT device in an engineering plant can anticipate an impending failure and alert maintenance personnel instantly, thereby averting a breakdown.
The Internet of Things is here to set to shape our near future!
Is IoT completely safe and secure for general use?
There’s no single best answer for this. We have been observing the evolution of the Internet of Things (IoT) for quite some time now. Some people do not view this advancement as a welcome change and point out to the dangers of Internet of Things.
But Data scientists and analysts have different views on this subject. For instance, some are ready to embrace the IoT for all the benefits it has to offer to society like connected society while some are alarmed by it, pointing to the potential dangers of these connected ‘things’ and their potential issues with cyber security. They believe that the escalating trend of connectivity where all chip-enabled devices can interact with one another will widen the scope of the attacks and increases vulnerabilities exponentially with each new unsecured device that is connected to the internet. There have been many high-profile incidents which have shown just how vulnerable, connected devices are to hackers.
Take a look at some of the recent incidents where IoT devices were hacked:
- A connected toilet seat controlled via an Android app was hacked by researchers, causing the toilet to repeatedly flush, raising the water usage
- Researchers discovered a flaw in smart TV transmissions and launched something called a red-button attack,’ in which the smart TV data stream was hacked and used to take over apps shown on the TV. One Ransomware hit an Android Smart TV and demanded $500.
- A number of security researchers have shown how smart cars can be hacked and controlled, ranging from killing the brakes to making the car swerve from left to right.
- Cybercriminals managed to penetrate the thermostats of a state government facility and a manufacturing plant in New Jersey and were able to remotely change the temperature inside the buildings
- There have been a number of incidents in the US in which internet-connected baby monitors have been hacked. The hacker has then screamed at the child to wake up, or posted video feeds of the child onto the internet.
This is a worrying trend since a hacker with access to your devices like a router would also have access to your network and any web enabled devices. Sensitive data such as banking details, passwords, browsing history and other personal information could then be found and used for a number of illegal activities.
Hackers have come up with many ingenious ways to find out who your internet provider might be based on the name of your network along with the type of router being used, so it’s very likely that they could also guess your default password.
Whatever the case may be, the big winners in an IoT world would always be consumers as organizations harvest the big data generated by these electronic devices to better serve their customers.
Secure Internet of Things & IoT devices
Every smart device or gadget needs to be secured so that it is not easily available to hackers. In the case of the toaster, you can use a password to secure it. The password again should be a strong one. Experts suggest different passwords for different devices. In my opinion, it will be hard to remember passwords if you have your entire house connected to the main computer that controls central heating system, fire alarm sensors and other devices via Bluetooth or other wireless techniques. The best method would be to use a good hardware firewall device for the entire collection. You may or may not be able to add a firewall to each and every device, but you sure can make sure the firewall on the central computer is good enough to protect your devices from being hacked. You may also consider buying Bitdefender BOX to protect your IoT devices.
There are four basic things you need to do with your IoT device:
- Set up a key lock on your Smartphone
- Change the default password on your router or any IoT device
- Change the wireless password to something strong
- Keep your firmware and operating system updated at all times.
The first thing you need is the IP address of your router. If this wasn’t noted down or bookmarked during initial setup, you’d need to find out what it is.
To find the IP address, open CMD, type ipconfig and hit Enter. You will see your IP Address for your router in front of the line that begins with ‘Default Gateway’. Once you have your router’s IP address, type it into any web browser & bookmark this address to access it easily at a later time.
Your wireless password is even more important than your router password. By default, most ISPs provide users with a simple password. It’s therefore always better to change the password to something simple and easy to remember. If a hacker can guess your wireless password, they can access your personal WiFi network, and as you know, this may allow them to view and control attached devices, exploit network vulnerabilities, open ports and gain access to your files and operating system. So, change the Wi-Fi password.
Before proceeding further, make sure WPA2 (AES) is selected as the preferred security option. This is the most recent, and most secure, standard. Next, enter a new wireless key, ensuring that it’s not easy to guess, and apply the new settings to complete your wireless password change.
By completing these steps, you’ve ensured that your smartphone, router, and wireless network are well protected from hackers and outside parties.
For more information on this topic, you can download this PDF file Consumer Guide to Internet of Things (IoT) from BullGuard.
This Infographic on IoT Security challenges and threats from Microsoft shows some interesting facts. You might want to take a look at it.