Menu

IoT FEATURE NEWS

High-Tech Story to Watch in 2017: How to Secure the IoT

By

The most important high-tech story to watch in 2017 will be whether companies make substantial improvements in securing the Internet of Things ecosystem, which includes devices, networks, platforms and services.

This story will be so crucial because the market potential is enormous. More than 50 billion devices are predicted to be used by consumers by the year 2020, according to industry analysts and high-tech companies. But this won’t happen nearly as fast as projected unless more and better security is built into the entire IoT ecosystem.

New U.S. Department of Homeland Security Report
The seriousness and extent of these security concerns surfaced in a new U.S. Department of Homeland Security report titled, Strategic Principles for Security the Internet of Things, which says:

“The time to address IoT security is now. Many of the vulnerabilities in IoT could be mitigated through recognized security practices, but too many products today do not incorporate even basic security measures. There is a lack of incentives for developers to adequately secure products, since they do not necessarily bear the costs of failing to do so. While the benefits of IoT are undeniable, the reality is that security is not keeping up with innovation.”

The IoT market is as weak as its weakest link. A hacker who gains access to a corporate or home network could remotely control each of the connected devices to make them a part of an orchestrated attack. If the broader network is compromised, the hacker could also capture other sensitive data on the network such as peoples’ financial information.

Hacking surveillance cameras
A recent security attack underscores the severity of this problem. Dyn, a company that monitors and routes Internet traffic, was hit with a severe “distributed denial of service” attack in October that flooded its servers with so many fake requests for information that they could not respond to real ones, causing the servers to crash. Unknown hackers took down the company’s routing network, which allowed them to knock many popular websites such as Amazon, Twitter, and Netflix offline.

By hacking into unsecured IoT devices, mainly home surveillance cameras, hackers took control of these devices to attack other devices on the network, which served as gateway to take down the company’s routers and attack the entire corporate infrastructure including the popular websites.

These types of IoT devices are easily hackable because they are designed to be accessed over a local network and they come with unsecured, hard-coded default passwords, which can be easily compromised.

Security slowing shift from product to service businesses
Security has hastened the growth of the IoT market as companies pivot from product-focused businesses towards new service and software application business models. To do this faster and more effectively, the security issues need to be solved. Product and service application development, device and service testing, and platforms need to be as secure as the hardware devices and equipment. Connecting the security “dots” – digital, operations, technology and strategy – will be important to building secure IoT offerings.

A one-size-fits-all security solution for IoT devices and platforms does not exist. But the remedies for this problem need to account for attack risks and the costs of security failures.

Over the past two years, consumer purchases of IoT devices such as wearable health devices, connected vehicles, and home monitoring devices have not grown as quickly as once predicted. Security concerns are among the main reasons. An Accenture research report, Igniting Growth in Consumer Technology, finds that 18 percent of consumers decided to quit or terminate an IoT device or service until they were assured of its safety.

What’s next?
As this year unfolds, a specific IoT security story to track will be which companies are embedding security technologies during the design phase of products. Integrating security at the start of product design – a practice few companies do now -- tends to be easier and less expensive than after the product has been manufactured.

Companies should further consider the full lifecycle of deploying, provisioning, or updating devices. The recent attack at Dyn is a reminder that many organizations only consider the deployment of an IoT device, and are unable to effectively update the devices once it is deployed. Although security vulnerabilities are usually present in any products running software, IoT offerings are especially vulnerable.

Companies could also program IoT devices to require users to change passwords upon first use. This would have been helpful in preventing the Dyn attack.

Technology providers must urgently address these very real security concerns to enable continued growth of the Internet of Things.

About the Author: David Sovie is global managing director for Accenture’s Electronics & High-Tech Industry. He can be reached at [email protected].




Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]


SHARE THIS ARTICLE
Related Articles

LTIMindtree and Vodafone Partner for Smart IoT Solutions

By: Stefania Viscusi    4/25/2024

LTIMindtree announced a collaboration with Vodafone aimed at delivering connected and smart IoT solutions to drive Industry X.0 and digital transforma…

Read More

Securing Reliability in IoT: Memfault Highlights a Lack of Proactive Measures

By: Alex Passett    4/25/2024

New data released from IoT reliability platform Memfault just earlier this morning highlights the importance of proactivity when engineering IoT solut…

Read More

Spur Measurable IoT Growth through Viasat's ELEVATE Program - Registration for its ELEVATE Global Partner Event is Now Open!

By: Alex Passett    4/25/2024

Viasat's ELEVATE global partner event is right around the corner. From June 18-19 in Carlsbad, California, those interested in satIoT connectivity sol…

Read More

Assessing IoT Innovator LTIMindtree: Its 2023-24 Successes to Date and a Peek at What's Next

By: Alex Passett    4/24/2024

IoT Evolution World has presented a brief rundown of LTIMindtree's successes during FY24, as well as a peek at what's to come for the Internet of Thin…

Read More

Powering Adaptability in IoT: Telit Cinterion Reveals its First High-Precision GNSS Module

By: Alex Passett    4/22/2024

Telit Cinterion announced the launch of its SE868K5-RTK module, a high-precision Global Navigation Satellite System (GNSS) receiver capable of centime…

Read More