Are Your Internet Connected Devices Vulnerable?

  • 0

Are Your Internet Connected Devices Vulnerable?

Category : Articals

are_your_internet_connect_113540_210118-150x150As internet devices go, PCs, laptops, and handhelds are all pretty secure, which may sound strange, given the number of successful hacks we’ve seen this year. They’re loaded with security features that make them relatively robust, and able to fend off a variety of attacks.

By comparison, the rapidly growing army of Internet objects are virtually, and often completely defenseless. These could be items such as health and fitness monitors, security cameras, baby monitors, kitchen appliances, video game systems, and just about any device that you connect to the Internet. Many of these simply have no security features at all and some of these objects use recycled encryption keys, meaning that if a hacker breaks into one, he can break into hundreds of thousands of other object sharing the same key.

It is estimated that by 2020, there will be somewhere in the neighborhood of 200 billion Internet-connected objects online, and the number will only explode from there. If your company has any Internet connected objects in its arsenal they’re much more vulnerable to attack than the PCs, laptops, and handhelds you’ve got connected. Any of these can be used as a potential point of entry for a hacker.

Recently, a new Google-powered search engine called Censys joined the Internet’s ecosystem. Its purpose? To track every vulnerable Internet object online, and it’s really good at its job. The array of devices you’ll find on the Censys list is both staggering and terrifying. On it, you’ll find everything from ATMs to an array of medical devices, computers embedded in modern automobiles, and even control systems for power plants that supply energy to thousands. Again, everything on this list appears because it is vulnerable. These devices lack even rudimentary security features, meaning that even a casual, hobbyist-level hacker can easily take control of them.

Anyone can use the search engine. The good news is, you can use it yourself to identify specific objects on your own company’s LAN to check for vulnerabilities.

The Internet of Things is still in its infancy, and the security measures we take for granted on our PCs simply haven’t caught up with the millions of objects we’re adding to the Internet. Until that happens, your level of vulnerability increases. Take precautions and research the security of devices that you are going to add to your network to minimize your risk and exposure.

Used with permission from Article Aggregator


Leave a Reply

Don’t even think about calling a computer consultant before you read this!

If you are a small business owner looking for computer support then it's critical that you get and read this small business advisory guide: What Every Business Owner Must Know About Hiring An Honest, Competent, Responsive And Fairly Priced Computer Consultant.

Testimonials

He took the initiative. Robert was in charge of maintaining the accounting software and although he never worked in the product, he was always able to troubleshoot an issue we were having. He took the initiative to get to the bottom of what happened and would somehow always find a way to fix it.

Kathy F. Accounting Waterbury, CT

We are a small non-profit organization that does it’s own IT and web design in-house. We first called on Technet Computing a few years ago when we wanted to upgrade our internal server network and have been customers ever since. We appreciate the knowledge owner Rob Lloyd delivers in a timely and friendly manner. If something goes wrong we know he’s just a phone call away and makes every effort to come to our office as quickly as possible. We highly recommend Technet Computing for all your office IT needs.

 

Staff of Connecticut Resource Conservation & Development Inc.

Rob Lloyd, TechNet Computing, has become a trusted asset for our company, Research & Design Innovations, LLC. Rob has been our sole IT Consultant for over eight years.

He has taken on the responsibilities of researching and recommending purchases for our computers, servers, telephone systems and software. He also interacts with our personnel to train them in the use of these products. Important to us is his immediate response to maintain our systems and meet the challenges we present him. We like working with Rob and respect him for his reliability and IT knowledge. During the last eight years, we have grown confident that if we have a problem, Rob will have an immediate solution. We recommend Rob and TechNet Computing without reservation.

 

 

Don Allen, President Research & Design Innovations, LLC. Branford, CT