Cybersecurity and the Internet of Things (IoT)

Chera Pupi
Author: Chera Pupi Date: 12/26/2019

It’s a parent’s nightmare for the 21st century. As The New York Times and others reported, a hacker harassed a child through a Mississippi family’s security camera set up in her bedroom. In Florida, hackers harassed a couple in their own home until they pulled the batteries out of their Ring camera. 

Internet of Thing devices–like smart toasters or even toilets–are often found to be easily hacked. But the risk is not just for homeowners and consumers – it’s real for businesses as well.  As small and medium sized business increasingly rely on smart devices in order to do business in the Internet-enabled world, these kinds of vulnerabilities can have serious implications.

In fact, a report from the security company Gemalto found that 48% of companies that use IoT devices in the workplace don’t have mechanisms in place to detect if any of their devices have been compromised. As the number of connected devices grows–the report found that the world is on track to deploy 20 billion IoT devices by 2023–hacking networked devices becomes a serious and immediate threat.

You Are the Threat

The hackers who hijack a cloud-based service are obviously the criminal element, but the real culprit behind these attacks is often the end user. The uncomfortable truth is that the end user is often to blame for not using safe password practices to protect themselves and the services they use. Too often, device owners or users didn’t use strong passwords or a password manager to control and protect access to their networked devices. 

The other issue is that once an individual or organization is compromised, poor password practices mean criminals can probably access all your devices and accounts, as most people are prone to reuse the same password combinations over and over. As soon as your email address and password is compromised and put on the dark web, it is impossible to recover it or prevent its reuse. 

What You Can Do

Businesses are vulnerable to these threats which can do irreparable damage to brand reputation, finances, legal action and employee trust. However, they can be mitigated in a straightforward approach:

Work with your MSP and vCIO to ensure:

  • Darkweb monitoring is in place
  • Employees are provided regular security awareness training as part of an organizational policy
  • Use Multi-factor authentication (MFA) on every cloud-based system that can support it.
  • Upgrade your security software to include Endpoint Detection and Response (EDR).    

One practice every organization needs to embrace is MFA, or multi-factor authentication. Most cloud systems have this feature built in, but many organizations fail to use it. Multi-factor authentication is a feature that requires you to have more than just your username and password to log in to an account. After you enter your username and password it also requires a second piece of information – like a one-time code texted to your phone. 

Breaches generally happen when a hacker got a hold of an employee’s credentials and hacks into a device or system. If a company requires MFA, the hacker would have entered the stolen username and password and then would have been asked for a second form of authentication. This would trigger an alert to be sent to the actual user’s phone or email asking them to authenticate. Since the hacker would not have access to that second piece of information, they would not have been able to log in and the breach could possibly have been prevented.  

We recommend organizations deploy endpoint detection and response solutions (EDR) and System and Organization Controls (SOC) services that provide cybersecurity insight and awareness. EDR empowers an IT team to identify malicious activity among normal user behavior. By collecting behavioral data and sending it to a central database for analysis and applying analytic tools, EDR solutions are able to identify patterns and detect anomalies. These can then be submitted for further investigation or remediation. SOC reports can help an organization identify risks and take actions to prevent attacks.

For any business today, the real question is “what’s my risk” and “how much risk am I willing to take on?”  There’s a business decision to make and clients need a vCIO to help them identify the risk and determine the investment needed. Reach out to the Gordon Flesch Company today for a free cybersecurity risk review.

New call-to-action

Topics: Cybersecurity

Leave a Comment

Written by Chera Pupi

Chera Pupi is the Managed IT Sales Manager for Elevity. She is a veteran Managed IT services sales expert, named to The Cannata Report’s Young Influencer List in 2018. Before joining GFC and Elevity, Chera helped Continuum and its partners improve sales performance through cybersecurity and sales training, new product launches, and the development of collaborative action plans.

Need More Information?

We’re ready – and eager – to help you solve your technology challenges.