Story image

Growing IoT adoption putting Australians at risk of cyber attacks

22 May 18

IoT adoption in the Australian consumer market has grown 55% in the last year, bringing the total market worth to $583 million, according to a recent Telsyte Australian IoT@Home Market Study 2018.

But that increased adoption is putting Australians at increased risk of cyber attacks – and security is still often an afterthought for the manufacturers who make the devices.

Sense of Security CTO Jason Edelstein says manufacturers are pushing connected devices to the market in such a rush that the lack of security is putting Australians’ information at risk.

Telsyte’s research found that the average Australian household has 17.1 connected devices in 2018 and is forecast to reach 37 by 2022 – a total of 381 million connected devices across the country.

According to Edelstein, it’s not just households at risk – particularly as a range of commercial industries adopt IoT technologies.

“Due to the increased efficiencies and convenience IoT provides, it is permeating many industries, ranging from healthcare to retail. It could be an employee bringing in an unsecure IoT device and connecting it to the network. It could be a connected air-conditioning unit in the office. Or, worse, it could be a connected healthcare device that enables doctors to monitor a patient's condition remotely,” he says.

Edelstein notes that hackers have successfully broken into pacemakers, baby monitors, share bikes, and even a casino aquarium. Any device can become a gateway for hackers.

“What we find to be the most common vulnerabilities are software defects, bugs and logic flaws. This clearly shows we are rushing devices to market with little thought to how we protect the users. ”

“To address the security flaws, it is important we start bringing a cybersecurity mindset into the planning and design phase, particularly as more products continue to be connected to the internet.”

He also believes that organisations should continuously use penetration tests and application security reviews to monitor the security of new products.

However, organisations can often miss devices that would generally not be considered threats because IoT is so pervasive.

“There’s already been reports of connected vending machines or air conditioning units being used as back doors into the business network,” Edelstein says.

“For this, Red Teaming, the process of conducting a real-life cyber attack from an attacker's perspective, can help unveil secret entry points you may have missed.”

“Today, IoT devices are a hacker’s dream. It’s everywhere, it’s largely unsecure and it’s providing easy access points to conduct malicious activity and access sensitive information, such as medical records, addresses and credit card details. We must take a proactive approach to securing IoT or risk becoming an easy target."

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Cisco dominates record-high Ethernet switch & router markets
While the market is flourishing, it’s tough-going as Cisco has increased its majority share of the pie.
SAP provides partners with free access to their cloud platform
“Now that over 3,700 SAP partners have joined our cloud strategy, the free resources will help them accelerate application development."
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Why the future of IT infrastructure is always on and always available
As more organisations embrace digital business, infrastructure and operations leaders will need to evolve their strategies and skills to keep up.
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.