Are Your Internet Connected Devices Vulnerable?

  • 0

are_your_internet_connect_113540_210118-150x150As internet devices go, PCs, laptops, and handhelds are all pretty secure, which may sound strange, given the number of successful hacks we’ve seen this year. They’re loaded with security features that make them relatively robust, and able to fend off a variety of attacks.

By comparison, the rapidly growing army of Internet objects are virtually, and often completely defenseless. These could be items such as health and fitness monitors, security cameras, baby monitors, kitchen appliances, video game systems, and just about any device that you connect to the Internet. Many of these simply have no security features at all and some of these objects use recycled encryption keys, meaning that if a hacker breaks into one, he can break into hundreds of thousands of other object sharing the same key.

It is estimated that by 2020, there will be somewhere in the neighborhood of 200 billion Internet-connected objects online, and the number will only explode from there. If your company has any Internet connected objects in its arsenal they’re much more vulnerable to attack than the PCs, laptops, and handhelds you’ve got connected. Any of these can be used as a potential point of entry for a hacker.

Recently, a new Google-powered search engine called Censys joined the Internet’s ecosystem. Its purpose? To track every vulnerable Internet object online, and it’s really good at its job. The array of devices you’ll find on the Censys list is both staggering and terrifying. On it, you’ll find everything from ATMs to an array of medical devices, computers embedded in modern automobiles, and even control systems for power plants that supply energy to thousands. Again, everything on this list appears because it is vulnerable. These devices lack even rudimentary security features, meaning that even a casual, hobbyist-level hacker can easily take control of them.

Anyone can use the search engine. The good news is, you can use it yourself to identify specific objects on your own company’s LAN to check for vulnerabilities.

The Internet of Things is still in its infancy, and the security measures we take for granted on our PCs simply haven’t caught up with the millions of objects we’re adding to the Internet. Until that happens, your level of vulnerability increases. Take precautions and research the security of devices that you are going to add to your network to minimize your risk and exposure.

Used with permission from Article Aggregator


Leave a Reply

Don’t even think about calling a computer consultant before you read this!

If you are a small business owner looking for computer support then it's critical that you get and read this small business advisory guide: What Every Business Owner Must Know About Hiring An Honest, Competent, Responsive And Fairly Priced Computer Consultant.

Testimonials

GCI Outdoor, Inc. was in the process of reviewing their technology plan for the next 5 years and were shopping local area IT providers to provide an effective and efficient solution based on our current and future needs. We were also looking to shift our internal IT responsibilities to a local provider as well. After reviewing 3 providers it was clear that Tech Net Computing was structured to really fit our needs. We have been working with Rob for 6 months now and are very pleased with his performance. The best way to describe the experience, for those that have worked with IT providers, is that Rob feels more like an employee of the company rather than some pool of ever changing customer support personnel and job tickets. Rob is  Knowledgeable, Personable, Responsive and a Great Value. I would highly recommend him to anyone looking to change or hire an IT provider/partner.

Bob LaRocco Director of Finance, GCI Outdoor, Inc. Haddam, CT

Dedicated to his client and is a very personable person. I would like to endorse Rob Lloyds work as IT support and administrator for one of our acquisition firms in East Hartford. Rob was instrumental in getting our ERP system running and resolved maintenance issues immediately and professionally. I worked with Rob for over a year and he has gone above and beyond just as an IT resource. Rob helped me with my Lean Six Sigma cost reduction projects that were well received by upper management and more importantly our customers. He was also instrumental in helping me get our company re certified as ISO 9001 Rev C by creating a customer database that was required by the ISO requirements. I would highly recommend Rob’s work experience and knowledge in the future if results are driving your company. It has been a pleasure working with Rob which was easy and has become a friend. I am currently working at another one of our acquisitions and ran across a problem and he made himself available to help me with my computer issue so I was not down long. He is dedicated to his client and is a very personable person

Nick Boehm, Director Quality Lean Six Sigma, Blackland LLC

TechNet has done a great job here for me. The changes you have made are very positive and I can see a difference. You have been VERY response to my needs, whether online, over the phone, or in person.
That is very important to me since I am virtually clueless regarding the actual tech stuff.

Vin Vizzo Vin Vizzo Adjusters LLC Essex, CT