IoT
10/25/2018
12:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Explosive IoT Growth Slowed by 'Early Adopter Paradox'

Extensive multi-year F-Secure consumer survey finds the consumers most excited about connected home devices are also most aware of the privacy risks

Helsinki, Finland — October 24, 2018: Adoption of the internet of things (IoT) continues to explode but it could be even more transformative, a new F-Secure survey finds. The consumers most eager to purchase new connected devices tend to delay or avoid new IoT purchases due to privacy or security concerns. This “Early Adopter Paradox” is creating an opportunity for operators who are already uniquely positioned to secure connected homes. 

F-Secure has conducted nearly 20,000 consumer interviews in the United States and Europe over the last 5 years.* The research finds:

  • Early adopters love the IoT: 9 out of 10 say that they’re excited about the technology.
  • Privacy concerns, however, hold back new investments in smart home devices: 74 percent of early adopters say they’re looking to purchase connected home devices, but  two-thirds have delayed an IoT purchase because of privacy concerns.
  • Early adopters connect more: 38 percent of U.S. internet users spend more than 4 hours online a day; this rises to 45 percent for early adopters
  • Cyber security savvy rises: 62 percent of U.S. consumers know what ransomware is compared to 37 percent in 2015
  • Users shift to mobile: the share of Americans using desktop PCs has fallen 6 percent since 2015 as the percent that uses Android smartphones has increased 10 percent and iPhone use is up 9 percent
  • Homes are getting “smarter:” Nearly one in four U.S. homes, 22 percent, use a digital assistant such as Amazon Alexa or Google Home, a category that didn’t exist in 2015; this is almost double the 12 percent of Europeans who use such devices 

“U.S. consumers are moving to connected devices by choice to enhance their lives and by necessity, given that it’s almost impossible to find a TV that isn’t considered ‘smart’ today,” says F-Secure Operator Consultant Tom Gaffney. “But these numbers might be even higher if consumers, especially the consumers most open to considering new technology had more confidence in the IoT.”

There’s a considerable threat to consumers due to inadequate regulations regarding security and privacy on the IoT.

“Early adopters’ worries about protecting their personal data are valid, considering the current issues challenging devices that stay online all the time yet aren’t normally secured in the way the most PCs and many smartphones are,” says Gaffney.

In March of this year, Interpol, the International Criminal Police Organization, warned, “All devices which can connect to the Internet – collectively called the ‘Internet of Things’ or IoT – are potentially at risk of a cyberattack.”*** In early August, the FBI warned that cyber actors illegally use IoT devices for malicious activities that could spike consumers’ internet service bills and threaten the reliability of their internet connection.****

F-Secure’s international network of decoy “honeypot” servers used to track the latest cyber threats network continues to find that variations of Mirai are the most prevalent malware in circulation.***** Mirai targets IoT devices, including cameras and routers, and was used in 2016 to carry out one of the largest denial of service attacks against internet services in history.

“The good news is that there is a simple solution to securing connected home devices and it comes from a source consumers already invite into their living rooms,” says Gaffney. “As the average household moves toward the use of dozens of connected devices at one time, the demands on service providers will only increase. F-Secure is delivering a comprehensive router-based solution that protects the entire home so that our partners are ready for what we know is coming next.”

 

*Source: F-Secure surveyed 19,200 consumers in January and February of 2014, 2015 and 2018.

**Source: https://fsecureconsumer.files.wordpress.com/2018/01/f-secure_pinning-down-the-iot_final.pdf

***Source: https://www.interpol.int/News-and-media/News/2018/N2018-007 
****Source: https://www.ic3.gov/media/2018/180802.aspx

*****Source: https://blog.f-secure.com/world-cup-malware/

 

 

More information

F-Secure Blog: Privacy Concerns Cooling IoT Adoption in the U.S. and Europe

 

 

About F-Secure

Nobody knows cyber security like F-Secure. For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people. With unsurpassed experience in endpoint protection as well as detection and response, F-Secure shields enterprises and consumers against everything from advanced cyber attacks and data breaches to widespread ransomware infections. F-Secure’s sophisticated technology combines the power of machine learning with the human expertise of its world-renowned security labs for a singular approach called Live Security. F-Secure’s security experts have participated in more European cyber crime scene investigations than any other company in the market, and its products are sold all over the world by over 200 broadband and mobile operators and thousands of resellers.

 

Founded in 1988, F-Secure is listed on the NASDAQ OMX Helsinki Ltd.

 

f-secure.com twitter.com/fsecure | facebook.com/f-secure

 

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19355
PUBLISHED: 2018-11-19
modules/orderfiles/ajax/upload.php in the Customer Files Upload addon 2018-08-01 for PrestaShop (1.5 through 1.7) allows remote attackers to execute arbitrary code by uploading a php file via modules/orderfiles/upload.php with auptype equal to product (for upload destinations under modules/productfi...
CVE-2008-7320
PUBLISHED: 2018-11-18
** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.
CVE-2018-19358
PUBLISHED: 2018-11-18
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig...
CVE-2018-19351
PUBLISHED: 2018-11-18
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHand...
CVE-2018-19352
PUBLISHED: 2018-11-18
Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely.