Are Your Internet Connected Devices Vulnerable?

  • 0

are_your_internet_connect_113540_210118-150x150As internet devices go, PCs, laptops, and handhelds are all pretty secure, which may sound strange, given the number of successful hacks we’ve seen this year. They’re loaded with security features that make them relatively robust, and able to fend off a variety of attacks.

By comparison, the rapidly growing army of Internet objects are virtually, and often completely defenseless. These could be items such as health and fitness monitors, security cameras, baby monitors, kitchen appliances, video game systems, and just about any device that you connect to the Internet. Many of these simply have no security features at all and some of these objects use recycled encryption keys, meaning that if a hacker breaks into one, he can break into hundreds of thousands of other object sharing the same key.

It is estimated that by 2020, there will be somewhere in the neighborhood of 200 billion Internet-connected objects online, and the number will only explode from there. If your company has any Internet connected objects in its arsenal they’re much more vulnerable to attack than the PCs, laptops, and handhelds you’ve got connected. Any of these can be used as a potential point of entry for a hacker.

Recently, a new Google-powered search engine called Censys joined the Internet’s ecosystem. Its purpose? To track every vulnerable Internet object online, and it’s really good at its job. The array of devices you’ll find on the Censys list is both staggering and terrifying. On it, you’ll find everything from ATMs to an array of medical devices, computers embedded in modern automobiles, and even control systems for power plants that supply energy to thousands. Again, everything on this list appears because it is vulnerable. These devices lack even rudimentary security features, meaning that even a casual, hobbyist-level hacker can easily take control of them.

Anyone can use the search engine. The good news is, you can use it yourself to identify specific objects on your own company’s LAN to check for vulnerabilities.

The Internet of Things is still in its infancy, and the security measures we take for granted on our PCs simply haven’t caught up with the millions of objects we’re adding to the Internet. Until that happens, your level of vulnerability increases. Take precautions and research the security of devices that you are going to add to your network to minimize your risk and exposure.

Used with permission from Article Aggregator


Leave a Reply

Don’t even think about calling a computer consultant before you read this!

If you are a small business owner looking for computer support then it's critical that you get and read this small business advisory guide: What Every Business Owner Must Know About Hiring An Honest, Competent, Responsive And Fairly Priced Computer Consultant.

Testimonials

I would highly recommend TechNet Computing. TechNet has always been our computer support company. Rob is not only extremely efficient,attentive and reliable but he is very helpful on pointing our firm in the right direction of what is most beneficial to us in order to make our office run smoothly. I would highly recommend TechNet Computing to anyone looking for a IT Support company!

Andrea D’Aurio-Lemieux Paralegal Middletown, CT

On Tuesday, November 11, 2014, I arrived at my office to begin my day.  When I sat down at my computer, my screen was BLUE and filled with old DOS prompts….I immediately inquired as to whether anyone had been using my computer and the response was no…..

As I tried to reboot, I soon realized that something was drastically wrong. We had recently hired a computer consulting company to oversee our network. I was told someone would get back to me as the head technician was in Las Vegas at a seminar. No one got back to me and I sat unable to do very much.

The next day I was told that my machine had been hacked into with an encryption virus and I had to pay a ransom to get all of my encrypted files unlocked! Our computer consulting company suggested we pay the ransom and move on!! After doing some research, I discovered that this was not the solution and I obviously needed to find a new computer consultant!

On Friday, November 14th, a friend referred me to TechNet Computing. I spoke with Rob Lloyd, who did not know anything about my firm, but he graciously said he would do his best to stop by. I really did not hold out much hope that I would ever hear from him again as he explained he was on his way to a client in Bridgeport. Much to my surprise, he contacted me in the early afternoon and was in our office at 3:30 p.m. He took my computer with him and worked on it over the weekend. Although, the news was not good, he gave us great advice. His prompt response to my calamity was in and of itself enough for me to sign on with TechNet Computing.

By mid-December, I had a new computer, Rob was able to restore my files from an old off-site backup and I was back to where I was! Rob also uncovered several problems with our network and resolved each and every one.

We now have a monthly contract with TechNet Computing. Any problems that we might have with our computers are addressed by Rob Lloyd almost immediately and always within an hour or two either in person or by remote. He is extremely easy to talk to and you can even understand the answer to any question you might have. He always makes a point to speak to you in layman’s terms and not in a computer guru’s terms! I would recommend Rob Lloyd and TechNet Computing to anyone who is in the market for an excellent reliable computer consulting company!!

Jean Anderson, Office Manger Law Offices of Michael F. Dowley Middletown, CT

Tech net is our hero I We were hacked and it was a devastating and scarey feeling. We were lucky enough to be recommended to TechNet as our current IT people had not made our system secure enough and were unable to help us properly. Rob Lloyd came in with his superman cape and got us back on track. He helped us through the crisis and worked tirelessly on our behalf. He helped us survive and rebound after the hack. We feel more secure now with the safeguards Rob installed. Without Tech net, we would not be where we are today.

He has been with us since that time. He is fantastic! He is always pleasant, responsive and smart. He gets us through the day to day issues which may arise. We could not be happier with Rob’s service and feel lucky to have him on board. We would recommend him to anyone who is looking for great, reliable IT service.

Marie Dowley Law Offices of Michael Dowley MIddletown, CT