Security Leaders Say Beware the Internet of Evil Things

By Ken Briodagh April 17, 2015

A new report released on April 15 by Pwnie Express, a remote security monitoring vendor, warns about the risks inherent in the so-called “Internet of Evil Things” (IoET) and defines the key factors and threats facing businesses today. It also offers a framework for a comprehensive defense against the IoET.

“This report underscores the need for increased visibility and actionable intelligence on all devices across the enterprise to enhance an organization’s ability to quickly identify and thwart an attack,” said Paul Paget, CEO, Pwnie Express. “It’s our hope that by offering a classification structure for high-risk devices, infosec professionals are empowered to mobilize and begin assessing their security systems’ readiness to defend business-critical infrastructure against the IoET threat.”

 Pwnie surveyed more than 600 security professionals for the report and some of the top findings were pretty interesting. More than 80 percent of the respondents said they were concerned that already have rogue or unauthorized devices operating undetected in their networks. They are perhaps concerned because almost 70 percent of them said they don’t have full visibility of all the wireless devices inside their networks. Scary. The last important thing is that the security folks said the most dangerous devices running today are rogue access points, MiFi and mobile hotspots.

“Cyber attackers seek the path of least resistance, often targeting devices and systems of branch locations, which are perceived to be less secure,” said Mark Arnold, Director Information Security, PTC. “It’s critical that enterprises implement innovative tools and policies across the entire organization to automatically detect the presence of unauthorized or mismanaged devices in real time, empowering security teams to respond quickly and effectively.”

Although it’s fun to refer to the IoT’s Evil Twin, the IoET isn’t a real thing yet. There have as of yet been no major breaches, remember. We’re at the beginning of an IoT-enabled world where these threats will become more likely, however. There is an emerging threat vector that will only grow as adoption of connected devices continues to expand.

The answer is simple: don’t freak out, and don’t be unprepared. 

Edited by Maurice Nagle

Editorial Director

Related Articles

IoT Time Podcast S.4 Ep.34 Innophase

By: Ken Briodagh    10/17/2019

In this episode of IoT Time Podcast, Ken Briodagh sits down with Tom Lee, VP Sales & Marketing, InnoPhase, to talk about the company's PolaRFusion Tal…

Read More

Sequans Announces Approval by Japan's Largest Mobile Operators

By: Ken Briodagh    10/14/2019

Sequans Communications recently announced that its Monarch SiP (system-in-package) and Monarch GM01Q module have been approved for use by Japan's thre…

Read More

Zephyr Project Announces New Member, New Release, New Developer Board

By: Arti Loftus    10/10/2019

Zephyr this week announced several milestones. The project aims to build a secure and flexible real-time operating system (RTOS) for the IoT.

Read More

Verizon and NEC Turn Fiber Into A New Information Superhighway

By: Juhi Fadia    10/9/2019

While we continue to wait for autonomous cars and "operating systems" on the city streets of the future, Verizon and NEC have partnered to create solu…

Read More

Easy Breezy: IoT Guarding Lung Health

By: Special Guest    10/4/2019

Medical IoT backed by enterprise mobile application development is an actively researched field where professionals are working to create the tools fo…

Read More