Blogs

More haste, less speed – minimise the risks of IoT security

August 10, 2016

Posted by: George Malim

Thomas Fischer, Digital Guardian

From smart thermostats to fitness trackers the race is on for companies to put out the next big connected product. However, during this foundation stage it’s essential that the companies developing or selling IoT technologies don’t take shortcuts when it comes to security protocol and ensure that the products they are selling do not pose any risk to the user’s security, writes Thomas Fischer, the principal threat researcher at Digital Guardian.

You don’t have to look far for examples of how this could potentially occur. Take a well-established IoT technology such as smart home meters or thermostats for instance. These offer a convenient way for people to remotely manage energy consumption in their homes via the internet. However, if criminals are able to access the network these devices communicate through, they can quickly establish usage patterns to ascertain when the house is/isn’t occupied and plan a break-in accordingly.

The time and cost pressures on competing organisations to get their latest IoT products to market first can be a major contributor towards security flaws. Overly stringent cost control leads to simplified hardware that hinders basic principle of integrity and failover in the devices. In addition, the drive towards user friendliness means many IoT devices are often either memory constrained or input constrained, allowing for simple functionality, but leaving little room for robust security.

Time and again rushed release dates, overzealous cost-control and a blinkered approach to user convenience produces IoT devices not fit for purpose at launch. Companies that attempt to add protection retrospectively will have a task of enormous magnitude ahead of them, and there’s a much higher chance mistakes will be made and vulnerabilities missed.

Six steps to reducing IoT security risk

So what can organisations do to reduce IoT security risks in their products and services? Below are six areas for consideration:

In their haste to be first to market, many organisations are overlooking some very basic IoT security principles that are putting users at risk. The advice here is plain and simple by spending just a little more time and incorporating robust security protocols into their products, as opposed to retrofitting them after the event, organisations will protect themselves and their users from the very real and growing threat of cyber criminals out there, just waiting to pounce.