Endpoint

1/11/2018
02:00 PM
Ryan Barrett
Ryan Barrett
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

Privacy: The Dark Side of the Internet of Things

Before letting an IoT device into your business or home, consider what data is being collected and where it is going.

There's a lot of buzz about the Internet of Things (IoT), but people aren't quite sure what to think of it. Back in fall 2016, there was a big attack on an Internet service provider in which a bunch of IoT devices became a botnet and made much of the Internet unavailable. It was a big moment that made people question the security of IoT. And although security risks are getting the headlines right now, and should certainly be considered, the bigger risk with IoT is privacy.

It is going to be so cheap and so easy for manufacturers to put Wi-Fi-connected chips into practically every device we use in our homes and businesses that IoT will become hard to avoid. Combine low costs with the incentives that companies have to collect data on user behavior, and things start to feel creepy. For example, imagine your oven, your refrigerator, or your microwave has data-collecting chips in it, purporting to provide a benefit to you if the device is connected to the Internet (your incentive). The cost is next to nothing for the manufacturer to collect the usage data, from the time of day you use it to how long you use it or what's being prepared, and combine it with information you may have voluntarily provided when you signed up, such as what city you live in and your household income. People aren't going to take notice of this until something bad happens — and I predict that it will.

While these connected devices are collecting all this data without you knowing it, or how it's being used, most people are thinking about features and colors. People aren't thinking about the privacy component, and that's a problem.

The Risk to Business
The potential risk is even greater for businesses that bring IoT devices into their companies. Consumers might get creeped out to think about their personal devices monitoring them and listening to their conversations, but businesses aren't really thinking about the risks from this perspective. Before deploying connected devices within your organization, pause and think about what kind of data is being collected and where it is going. For businesses that value their privacy, this can be a real liability. 

The owners of the corner coffee shop are purchasing home-security-grade devices to better monitor and protect their business. Almost instantly, the system is connected to their Wi-Fi network. But the business owners aren't thinking about the potential ramifications should they lose control over that device, if it isn't secure. If the device is hacked, cybercriminals can monitor customer traffic and flow, and even zoom in on credit card numbers if the camera is near the cash register.

The risk doesn't end with small businesses. From the midsize perspective, these businesses are utilizing things such as smart TVs. Often smart TVs are connected to a Wi-Fi network to display analytics and statistics, but you'd be surprised at how often those TVs are connecting back to their manufacturers to gather advertising information and your usage statistics. Some of the new TVs have webcams on them with incorporated microphones. And then there are cameras in the lobby. All this private business data about when and where people are coming and going and what they are doing is being recorded in the cloud, protected only by a password.

Think First
I am not saying that you shouldn't let IoT devices into your home or business. I'm point is that people need to think about a few things first before they invite these devices into their lives, and make a conscious, risk-aware decision.

Weigh the benefits against the risks when it comes to purchasing Internet-connected devices. Is the risk worth it if the data got into the wrong hands? If the data is stored in the cloud, make sure you are using long and strong passphrases and enable two-factor authentication everywhere you can. Keep the devices secure, keep their software updated, and protect the data they produce (if you can).

Lastly, be aware of what information you are giving away, by reading the privacy policies of the manufacturers of the IoT device. If they are collecting your data, they legally have to disclose it.

The prospects of IoT are undeniably vast. No one knows where the industry is going to go or what is going to happen. My advice? Venture into this exciting new world with eyes wide open.

Related Content:

Ryan Barrett, VP of Security and Privacy at Intermedia, has more than a decade of experience in data security and IT leadership. Prior to Intermedia, Barrett has been integral in security with enterprises such as Qualys and WebEx, where he helped build out the original ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
ArlenWilliams
50%
50%
ArlenWilliams,
User Rank: Apprentice
1/12/2018 | 12:55:58 PM
What if?
What if violating our privacy were one of the primary reasons for the IOT in the first place?

Whose technology was the Internet in the first place?

Why would we think they ever let go of it?

"#DOD #USIC #NSA #DIA #CIA #DOJ #MashUp"

 
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15504
PUBLISHED: 2018-08-18
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
CVE-2018-15505
PUBLISHED: 2018-08-18
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 a...
CVE-2018-15492
PUBLISHED: 2018-08-18
A vulnerability in the lservnt.exe component of Sentinel License Manager version 8.5.3.35 (fixed in 8.5.3.2403) causes UDP amplification.
CVE-2018-15494
PUBLISHED: 2018-08-18
In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.
CVE-2018-15495
PUBLISHED: 2018-08-18
/filemanager/upload.php in Responsive FileManager before 9.13.3 allows Directory Traversal and SSRF because the url parameter is used directly in a curl_exec call, as demonstrated by a file:///etc/passwd value.