As IoT use ramps up, so do attacks on networks

 

Connecting state and local government leaders

As the internet of things expands, the number of devices that must be secured is skyrocketing.

While the public is increasingly aware of the internet-of-things technology all around them, many people remain blind to how vulnerable IoT leaves them to data theft. What’s even more concerning is that the threat landscape is maturing, faster than many network administrators can keep pace with.

That’s because the distributed denial of service attacks and highly disruptive network shutdowns that characterized IoT hacking in the past are becoming far more targeted and sophisticated.  This is especially concerning for major infrastructure projects that leverage IoT tools, as hacks into these networks can leave entire municipal data stores vulnerable to theft.

From “muscle-flexing” to financial gain

In 2016 and 2017, there were a rash of DDoS attacks targeting  IoT devices that really started giving cybersecurity experts pause about the rapid adoption of new connected devices.

The Mirai attack was one such DDoS operation that used an army of botnet-infected IoT devices to flood networks like Twitter, GitHub and PlayStation  -- just to name a few  --  with “loud” network traffic. This drowned out legitimate directives from network administrators attempting to mediate the attack, forcing the servers to shut down as traffic overwhelmed their operations.

Closed-circuit TV cameras -- used by both private and public entities -- were the top device compromised in these attacks.

While the Mirai attack caused headaches and ran up hefty bills for remediation at the companies affected, it was largely considered an exercise in showboating. Pras Jha, who pleaded guilty to orchestrating the attack alongside two classmates, was able to make vulnerabilities to IoT networks glaringly obvious. This opened the door up to a new generation of attackers to “one-up” Jha by attacking financial assets, taking advantage of readily available ransomware to exploit poorly secured IoT networks for big pay offs.

Forward-facing protections a must

Many IT teams and network security administrators are already taking exhaustive measures to future-proof their networks for tomorrow's advanced threats. While these teams may be taking stock of the mobile devices, branch offices and remote workers that need protection across their network, IoT devices will to increase the number of devices by a significant order of magnitude. Even if IT managers are dedicating separate networks for IoT, administrators must use the same diligence in making sure these networks are as manageable as possible. This includes assessing their hardware for security gaps, including weak encryption implementation or inadequate patching functions.

For instance, where encryption is involved, IT teams must ensure that data is encrypted while at rest and in motion. Just relying on full-disk encryption, for instance, will help secure data when a device or server is turned off.  But as soon as a user logs on or powers up the technology housing that content, anyone -- including bad actors who entered the network during downtime -- can access that previously encrypted data.

Rather, teams must use encryption at all times, employing solutions that leverage industry standards like SSL to ensure protections are up to date. Equally important -- if not even more so -- is ensuring that encryption keys are stored privately and offline – not within a server with access to the network.

Organizations must also ensure that they are putting defenses at network gateways to stop bad actors from accessing data stores to begin with. This requires teams to take a “defense-in-depth” approach to network security, putting as many layers of protections at network gateways as possible. Just relying on firewalls, for instance, won’t suffice as these protections only look at packets of data streaming past the perimeter -- not the whole file. Standard proxies, too, can complement the firewall protections, but they still have their limitations and usually require constant tweaking.

Instead, secure web gateways that fold a consortium of solutions into a single management console can help bring sanity and clarity to an otherwise messy network of interconnected devices. Firewalls, proxies and an array of active defense mechanisms -- from sandboxing to content filtering – can be combined into an effective network gateway to block bad actors from entering the network and leaving with valuable data.

Even the most extensive network security solutions can’t thwart every threat -- especially as IoT devices make network security more complicated than ever before. But with risks rapidly growing, organizations would be wise to explore the most extensive defenses possible.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.