Internet of Things [IoT]

Today almost any appliance or gadget you can think of has gone “smart”. At the store and can’t remember if you have milk? Pull out your smartphone and ask your refrigerator. Need to adjust the temperature before you get home? Open an app and adjust your thermostat. The Internet of Things (IoT) refers to all the various technology now connected to the internet and can include:

  • Smartwatches
  • Refrigerators
  • Microwaves
  • Televisions
  • Washer and Dryers
  • Smart speakers
  • Home security systems
  • Voice-activated assistants
  • And many other devices

internet of things

It’s rising popularity is understandable. Smart devices make everyday tasks easier to accomplish, and it’s so simple to set up and connect in minutes. Yet this ease of setup is part of what makes all this new technology so precarious.

Several risks come from the Internet of Things, many of which we are only just starting to discover.

The Rise of the Botnet

Despite its sci-fi sounding name, the botnet is a very real and rapidly growing threat.

Thanks to lax security on many internet-connected devices, hackers can take control of thousands or even millions of smart devices.

They then orchestrate a Distributed Denial of Service (DDoS) attack.

A DDoS attack instructs compromised devices to all try to access the same website at once, overloading its servers and putting it out of commission for hours or even days.

See Also: Methods to protect from DDoS attack

Limited Security

Most consumers know to protect their computers with antivirus software. Even smartphones now offer virus protection apps.

Yet few people imagine hackers attacking their microwave or dishwasher. Anything with an internet connection could be a target, however, and many manufacturers offer little security.

Too often devices come with simple, preset passwords easy to guess.

They connect to nearby networks automatically with no authentication required. While this makes setup easy for consumers, it also makes access easy for hackers.

Worse, lots of internet-connected devices are not designed with automatic software updates in mind, if any.

Unlike your smartphone, your new smart speakers may not update automatically when a security patch is released, and some devices might never see an update to their firmware or software.

Lack of Privacy

The Internet of Things is still in its infancy, and that means a lack of regulations.

Devices collect personal data with little oversight on the storage and sharing of data.

A hacker could gain access to your name, address, phone number, email address, and potentially even social media accounts, credit card info and other sensitive financial information.

Manufacturers are less than forthcoming about data collection, storage, and transmission when using their products.

See Also: Facial recognition technology for privacy concern

How Hackers Use Your Info

Why exactly would a hacker care about breaking into your smart microwave?

The answers may surprise you.

Even a simple device connected to the internet can do a lot of damage, including the following:

  • Give out personal information. Many devices store information about you and potentially your wireless network, such as its password.
  • Hack into other devices and accounts. Once a hacker has breached one device in your house, they may access other devices such as your home computer or smartphone. All it takes is one weak link for someone to get access to everything in your otherwise secure network.
  • Hold your smart devices for ransom. Known as a ransomware attack, hackers typically use this to lock a computer until the user pays them money to unlock it.
    This idea has spread to smart devices, with hackers disrupting your use of the item until you pay them to release it.
  • Attack others. If your device is compromised, you may not even know it. In a DDoS attack, mentioned earlier, hackers use compromised devices to target a website and shut it down. The Mirai botnet attack in 2016 did exactly this and left large portions of the east coast of the U.S. without the internet.

internet of things

Health Concerns from Wireless Networks

Given how new wireless technology is, some people are worried about how the emissions from wireless and 5G networks might affect our bodies.

Long-term studies have not been conducted because the technology has not been around long enough.

As more and more devices connect to the internet, wireless and 5G networks will grow.

Protecting Yourself from the Risks of the Internet of Things

But can you do anything to protect yourself against the dangers of the Internet of Things that seems to be taking the world by storm?

The good news is: yes!

  • An accepted way to protect your sensitive devices, like computers or phones, from attacks is to set up two separate home networks: one for your important devices and one for smart devices.
    That way if a smart device is hacked, hackers won’t be able to get access to your home computer because it’s on a separate network.
  • For devices that allow you to change your password, update it to something secure. Never use the default password!
  • Also, never use the same password across multiple devices.
  • Be sure your router has a strong password as well to help keep hackers out.
  • Disable Universal Plug and Play (UPnP) on your router. Searching for your specific model of the router should tell you how to find this setting. This will prevent devices from connecting automatically to your network without permission.

Conclusion

Even if you take steps to protect yourself, however, the current lack of regulations and information about the IoT makes it dangerous.

As technology continues to expand at a rapid pace, manufacturers will need to step up security to better protect their customers, and customers should keep in the loop on the latest security threats and developments so they can ensure they are as safe as possible.

Author:

Michelle

Michelle works as a VA for small businesses. She is a professional writer who loves talking business, technology, and productivity, and share her experience with others. Outside her keyboard, she spends time immersed in her Kindle library or binge watches Silicon Valley. Her superpower? Vinyasa flow! Talk to her on Twitter.

Leave a Reply