Channels

01:30 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Internet Of Things: 3 Holiday Gifts That Will Keep CISOs Up At Night

If you think BYOD policies will protect your infrastructure from the January influx of mobile hotspots, fitness trackers, and Bluetooth, think again.

The Internet of Things (IoT), a term that was first coined back in 1999, has become a mainstream buzzword, and there is no sign of slowing in terms of most hyped technology (Gartner) and sales, which IDC predicts will grow from $1.3 trillion in 2013 to $3.04 trillion in 2020 -- and a whopping 30 billion devices.

In an attempt to capitalize on this exploding market, developers are racing to make every possible appliance and device “smart,” with little to no regard for the personal, organizational, and national security risks of doing so.

Even if security is a concern, there are currently zero (0) IoT regulations or standards for developers. As a result, the IoT is invading the mass-market at a rapid pace, with consumers buying up the latest gadgets like Fitbits, Google Chromecast, and GoPros. In addition, many of America’s largest corporations, and even some small businesses, are now deploying thousands of IoT devices, such as connected HVAC systems and smart light bulbs, to improve operational efficiencies and boast employee productivity and wellness.

Most companies mistakenly believe that their bring-your-own-device (BYOD) policies act as sufficient protection from threats affecting the IoT. However, these policies were built specifically for laptops and mobile phones, and do not protect personal devices such as hotspots, fitness trackers, Bluetooth devices, or the thousands of other IoT devices now on the market.

So, what will be coming into your organization after the New Year? Unfortunately, you will have no idea. There is currently no concept of intrusion detection, network access control, or vulnerability assessment in the IoT. In other words, IT security professionals do not have any visibility into what is coming in and out of the corporate airspace. What’s worse is that many IoT devices create their own mesh networks that can act as new paths into an organization’s most critical data.

According to a PwC report, one in three corporations experienced economic crime in 2014, with cybercrime making up 24 percent of the total reported frauds. With the proliferation of insecure and unregulated IoT devices, I predict cybercrime will be among the leading causes of data theft as early as next year.

Here are just a few examples of how organizations are making it easy for even amateur hackers to access critical data.

Employee wellness programs
Gyms, diet clinics, and fitness tracking providers love January. It’s that time of year when everyone begins their New Year’s resolutions of getting into shape. Corporations are joining in on this movement, too. Nearly 80 percent of organizations with more than 1,000 employees provide fitness tracking devices as part of their employee wellness programs, according to a 2012 survey by Automatic Data Processing.

Read the rest of this article on Dark Reading.

Chris Rouland is a 25-year veteran of the information security industry and one of Atlanta's most respected technology entrepreneurs. Most recently, he founded Bastille, the only company focused exclusively on providing intrusion detection and vulnerability assessment for the ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly22
50%
50%
Kelly22,
User Rank: Author
12/10/2014 | 2:50:35 PM
'Tis the season for IoT
Too many devices, not enough security. I hadn't really thought about how the holiday season could cause a spike in the amount of IoT devices in the workspace, but that does pose a very real danger. It's scary to know that businesses have no way of knowing the devices that enter/exit corporate airspace, and that they're also making it easy for hackers to access data.
Register for Insurance & Technology Newsletters
White Papers
Current Issue
Insurance & Technology Digital Issue
Innovation? Check. Core modernization? Check. Security? Check. Today's insurance IT challenges don't stump this year's Elite 8.
Slideshows
Video