K
Kathleen Martin
Guest
The world is becoming more digitalized each day. Tasks that once took hours, or even days, when performed manually, are now completed within seconds thanks to technology. The Internet of Things (IoT) is one of the latest advancements in the world’s digital revolution. With greater efficiency, it is no surprise that, in the average enterprise, more than 30 percent of all network-connected endpoints are IoT devices – with this figure predicted to grow… Yet, as IoT devices become ingrained in our daily lives, cybercriminals have also found value in these nifty tools; in just the first six months of 2021, IoT attacks increased by 100 percent. As the attack surface expands, it’s safe to say that IoT security needs serious attention. But first, why are these devices so commonly targeted?
Dollars In Data
IoT devices collect data. This is how they function. They collect corporate data, personal data, and financial data. You name it! IoT devices gather it. While this might make the device more accurate, the wealth of data collected by IoT devices makes them highly sought after by bad actors. To attackers – most of whom are financially motivated – data means money, and IoT devices are the slot machines. Whether the device collects valuable data itself or simply acts as a gateway to profitable information, IoT devices are an appealing target for greedy cybercriminals.
A Virtual Pandemic
As the cyber domain becomes the new battlefield, IoT devices can be useful in cyber warfare efforts. Be it, state-sponsored adversaries or terrorists, malicious cyber actors can use IoT devices to cause significant damage to the victim. The connectedness of IoT devices makes launching a botnet attack extremely easy, with the consequences potentially being disastrous. Botnets execute ransomware or distributed denial of service (DDoS) attacks, both of which disrupt operations. While this is damaging to any victim, operational disruption to critical infrastructure will be detrimental to national security. And as critical infrastructure continues to adopt IoT, hostile actors are finding great value in these smart devices.
IoT Attack Surface With No Boundaries
Enterprises’ vulnerabilities increase with the use of IoT devices. By incorporating IoT devices, enterprises become more accessible. Today, there are around 10 billion IoT devices in use, all of which provide a point of entry to the network. Further, as the attack surface expands, it becomes more dispersed as IoT devices get used for various day-to-day activities. The widespread use of IoT devices is especially beneficial for hardware-based attacks – which IoT devices are highly susceptible to – due to the need for physical access. For instance, a smart coffee machine in an enterprise lobby is easily accessible and enough to provide a hardware attacker with network access to allow for further attacks to take place.
Continue reading: https://www.iotforall.com/are-iot-devices-an-advantage-or-being-taken-advantage-of
Dollars In Data
IoT devices collect data. This is how they function. They collect corporate data, personal data, and financial data. You name it! IoT devices gather it. While this might make the device more accurate, the wealth of data collected by IoT devices makes them highly sought after by bad actors. To attackers – most of whom are financially motivated – data means money, and IoT devices are the slot machines. Whether the device collects valuable data itself or simply acts as a gateway to profitable information, IoT devices are an appealing target for greedy cybercriminals.
A Virtual Pandemic
As the cyber domain becomes the new battlefield, IoT devices can be useful in cyber warfare efforts. Be it, state-sponsored adversaries or terrorists, malicious cyber actors can use IoT devices to cause significant damage to the victim. The connectedness of IoT devices makes launching a botnet attack extremely easy, with the consequences potentially being disastrous. Botnets execute ransomware or distributed denial of service (DDoS) attacks, both of which disrupt operations. While this is damaging to any victim, operational disruption to critical infrastructure will be detrimental to national security. And as critical infrastructure continues to adopt IoT, hostile actors are finding great value in these smart devices.
IoT Attack Surface With No Boundaries
Enterprises’ vulnerabilities increase with the use of IoT devices. By incorporating IoT devices, enterprises become more accessible. Today, there are around 10 billion IoT devices in use, all of which provide a point of entry to the network. Further, as the attack surface expands, it becomes more dispersed as IoT devices get used for various day-to-day activities. The widespread use of IoT devices is especially beneficial for hardware-based attacks – which IoT devices are highly susceptible to – due to the need for physical access. For instance, a smart coffee machine in an enterprise lobby is easily accessible and enough to provide a hardware attacker with network access to allow for further attacks to take place.
Continue reading: https://www.iotforall.com/are-iot-devices-an-advantage-or-being-taken-advantage-of