IoT Devices A High-Security Risk
Internet of Things (IoT) devices with high definition technology allow them to interact with the internet and can be managed remotely. These devices are integrated with technology like sensors and functional software that allows machine-to-machine interaction. Insecure IoT devices provide an easy gateway for cybercriminals to get inside the network. The enterprise use of IoT includes industry-specific devices used in healthcare and devices used in industries like smart security systems. This industrial IoT can involve a combination of sensors, Wi-Fi networks, big data, and data analytics to optimize processes.
Last week we read about IoT security challenges and efforts such as the OWASP Top 10 IoT Security project (2018), which provides basic-level guidelines for device manufacturers and developers to create secure solutions.
I looked at a couple of IoT security technologies in the market and tried to understand the foundation of those technologies. Below are e-InnoSec team thoughts in brief.
What foundational steps are needed to secure an IoT environment?
- Inventory - In order to secure the IoT environment, organizations need to know the inventory of devices and device types in use. This also means an automated way of identifying devices in the domain.
- Classification of inventory - Inventory is further classified by type and business function.
- Assess the risk - Risk assessment is the beginning of the process.
What devices show how the internet expands beyond computers?
Below is a list of a few devices that support the expansion of the internet beyond computers.
| Nest Smoke Alarm Nest Learning Thermostat Ring Doorbell Google Home Voice Controller Amazon Echo | August Doorbell Cam August Smart Lock Belkin WeMo Smart Light Switch Footbot Air Quality Monitor Philips Hue Bulbs |
Why are insecure IoT devices an easy gateway for attackers?
Organizations and individuals connect devices to their networks. But if a device is not secured properly and is discoverable on the network, it can become an easy gateway for hackers.
The enterprise use of IoT includes industry-specific devices used in healthcare and devices used in industries like smart security systems. This industrial IoT can involve a combination of sensors, Wi-Fi networks, big data, and data analytics to optimize processes.
One of the biggest issues with IoT is security, especially as sensors collect data and transfer it across networks and to manufacturers. The basic design of some IoT devices lacks security considerations such as encryption of data in transit and at rest. Risks of espionage, vandalism, theft, misuse, hacking, and fraud are higher when industrial machinery connects to IoT networks. Software flaws and limited patching capability can further increase risk. There is also compliance risk involving privacy and private healthcare data.
What are five infamous IoT hacks?
Below are the five infamous IoT hacks:
- The cyber attack related to the Mirai DDoS botnet
- A data breach related to a children's toy
- The Devil's Ivy Rube-Goldberg attack
- Wi-Fi baby hard monitors
- Virtual carjacking
What guidelines can organizations follow to deploy IoT devices more securely?
The OWASP Top 10 IoT Security project (2018) provides basic-level guidelines for device manufacturers and developers to create secure solutions (refer Figure 1). Consumers and organizations should also ensure security considerations are central while selecting and deploying devices. Here are some guidelines for organizations:
- Update BYOD policy to include IoT devices and provide a list of approved IoT devices
- Establish a research and approval process for IoT devices
- Use strong encryption for Wi-Fi
- Limit Wi-Fi use to approved IoT devices
- Use isolated networks for IoT systems
- Use strong, unique passwords and rename devices
- Harden devices following vendor instructions
- Update software immediately after release
- Avoid public Wi-Fi networks
- Use multifactor authentication when available
The 2018 release of the OWASP IoT Top 10 represents the top ten things to avoid when building, deploying, or managing IoT systems (OWASP Internet of Things Project).

Related Resources
Related Posts

IoT Devices a High-Security Risk Part II
IoT security observations covering inventory, classification, risk assessment, behavior analysis, operating system constraints, and anomaly-based protection.
Read More
How Secure Are Your Smart Doorbells and Cameras?
Secure smart doorbells and cameras with strong Wi-Fi controls, MFA, firmware updates, and fast response to compromise indicators.
Read More
Securing Cloud Data - What Are the Key Cloud Encryption Considerations? Part III
Cloud encryption strategy should combine data-at-rest and in-transit protection with clear key management ownership aligned to risk and compliance requirements.
Read More

GRC Insights That Matter
Exclusive updates on governance, risk, compliance, privacy, and audits — straight from industry experts.