Menu

IoT FEATURE NEWS

SimpleWAN Exec Explains Why the Time is Now for IoT Security

By Paula Bernier January 27, 2016

When it comes to security problems, the hits just keep coming. The vulnerabilities will only multiply as the Internet of Things expands. That’s why Erik Knight of SimpleWAN is sounding the alarm.

“Hey, wake up,” he said during an interview today at ITEXPO/IoT Evolution Expo. “Look at it. It’s bad. Just be aware.”

SimpleWAN is an SD-WAN solution provider, and cybersecurity is a big part of its strategy. Businesses that leverage SD-WAN to see and control their networks in real time get a better handle on what’s happening at each of their sites and can see and act on attacks as they happen.

Knight said there were several security problems revealed in just the past few weeks. One involved the reveal of the fact that 100 percent of the Linux base had a kernel vulnerability from 2012 code, and someone just found it last week, he said. In another, it was found that Adobe Flash has a vulnerability that allows hackers to remotely execute code on a machine, he added.

Yet while we have all become painfully aware of such security issues and the problems that vulnerabilities can create, players in the IoT arena are rushing to bring things to market so fast that they’re not taking the necessary steps to secure their solutions, he said. Meanwhile, there’s an army of hackers out there just waiting for the opportunity to expose these vulnerabilities, benefit from them and/or share them with their fellow techies.

That becomes a real problem, he noted, when people’s lives are on the line such as related to a connected car or medical device. Gaining remote control of a washing machine, he added, could potentially enable a hacker to keep the water running and flood a home or business. Hacks to the IoT could also create havoc if a bad actor were to take control of multiple connected devices and turn them on at the same time, creating overload of the power grid, he said.  

To improve security, SimpleWAN is making a big push for two-factor authentication. In fact, it will require it for all clients within six months, Knight said. Because dashboards and servers are centralized in a cloud architecture, he added, when outsiders get unauthorized access to these assets, they can control everything.

“As a cloud provider we realized that is our biggest risk,” he said.  “We’re making a big push for that, and everyone’s excited. But we expect big pushback on that.”

That’s because although people want things to be secure, they don’t want to make the extra effort to ensure security, he said. Security today is a checkbox, he added, but in the future Knight thinks security will move more front and center for IoT solutions providers and users.




Edited by Kyle Piscioniere

Executive Editor, TMC

SHARE THIS ARTICLE
Related Articles

IoT Time Podcast S.2 Ep.33 Trusted Computing Group

By: Ken Briodagh    6/22/2017

On this episode of the IoT Time Podcast, Ken Briodagh sits down with Steve Hanna, chair of TCG's embedded systems and IoT work groups, and principal a…

Read More

IoT Time Preview: The Cloud

By: Ken Briodagh    6/22/2017

In this weekly series, we'll be previewing chapters of "IoT Time: Evolving Trends in the Internet of Things" for you to read in the hopes that you'll …

Read More

IoT Evolution Speakers: Lee Gruenfeld Speaks Out

By: Ken Briodagh    6/22/2017

Lee Gruenfeld is Managing Partner of the Cholawsky & Gruenfeld SaaS/IoT consulting firm, and is a Principal with the TechPar Group in New York, a bout…

Read More

IoT Evolution Speakers: Jeff Liebl Speaks Out

By: Ken Briodagh    6/22/2017

Jeff Liebl is President of Anaren IoT Group, which designs, manufactures and sells custom high-frequency solutions and standard components for the wir…

Read More

IoT Evolution Speakers: Israel Alguindigue Speaks Out

By: Ken Briodagh    6/22/2017

Israel Alguindigue is SVP, Industrial Practice, Uptake, a developer of products that solve industry pain points and enable new data-driven business mo…

Read More