The problem represented by the Internet of Things is that devices are no longer isolated.
Nowadays, everything is becoming “smarter.”
First it was smartphones, allowing users to access the internet on the go. Then, other devices gained Wi-Fi capability and smart programming, from TVs to refrigerators to home security systems. The network of these smart devices, known collectively as “the Internet of Things,” can at its best make life easier and more convenient. But according to a recent study from Hewlett-Packard, the Internet of Things also has a downside: It is extremely hackable.
Indeed, the HP study found that devices on the Internet of Things have a troubling lack of security and encryption. For instance, 80 percent of phones failed “to require passwords of sufficient quality and length,” while 70 percent did not use encryption when connecting to local internet networks, and 60 percent did not use encryption when downloading software updates.
In isolated instances, these percentages are worrisome enough. Without passwords or encryption, hackers can easily break into smartphones or other devices, collecting the personal information – including names, addresses, birthdays, and more – stored on those devices.
The problem represented by the Internet of Things is that devices are no longer isolated. A hacker who can break into one device can feasibly find his or her way into everything on a victim’s network of devices. For example, a hacker might be able to use poor network encryption to break into a smartphone. That smartphone is connected to a cloud service that holds a high concentration of sensitive information, from Social Security Numbers to bank account information. By using the smartphone to access the cloud network, the hacker could conceivably invade his or her victim’s entire life, stealing data and perhaps even identity in the process.
So how can the vulnerability of the Internet of Things be solved? Ultimately, smart device manufacturers will become wise to the weaknesses of their products and design more sophisticated encryption and security models to keep their customers safe. Until then, users can protect themselves by avoiding unsecured networks, using complex passwords on their devices, and also password-protecting their mobile apps or cloud services
Leave a Reply