How to secure IoT devices in business


How to secure IoT devices

The Internet of Things (IoT) has become a core part of business operations worldwide. However, the growth and increasing complexity of a global network of smart devices have brought new security problems. It is no longer possible to ignore the risks posed by IoT devices, but fortunately, solutions are readily available.

In this blog, we’ll look at how IoT devices potentially compromise cybersecurity performance and how to mitigate IoT risks with security protocols and the latest technology.

What are IoT devices?

IoT devices are physical devices with internet connectivity that operate at a distance from traditional networks. IoT equipment communicates wirelessly and usually gathers information from the external environment.

This information could include temperature, moisture, or movement data. However, IoT sensors also increasingly cover highly specialized tasks like monitoring body functions.

IoT devices tend to take the form of interconnected networks rather than stand-alone agents. They also use simpler hardware than standard computers, routers, or mobile phones. And as a result, they often lack on-board security software due to hardware limitations.

The Internet-of-Things operates in households, vehicles, workplaces, and even urban spaces. The IoT market has expanded rapidly, from $115 billion in 2016 to $478 billion in 2022, and could reach $2.4 trillion in 2029. 

Billions of devices already operate continuously as network endpoints, and the number is constantly rising. This growth also means that threat surfaces are rapidly expanding. Match that expansion with the security flaws inherent within IoT technology, and you have the perfect conditions for a cybersecurity storm.

Why is it critical to secure IoT devices?

Securing IoT devices is a vital component of modern network security. Companies could rely on massive networks of distributed sensors or use a few smart cameras to assist their on-premises operations. In any case, IoT security matters. Even devices as innocent as simple light sensors can bring heightened security issues. IT teams must include these risks in cybersecurity protocols.

Without proper IoT security practices, companies face new risks. For instance, hackers targeting smart devices could access resources far beyond their initial network entry point, potentially harvesting sensitive data or mounting debilitating attacks.

IoT risks are easy to overlook. Sometimes, security planners neglect to inventory every endpoint. Vendors may not be forthcoming with information about security features, vulnerabilities, or updates. And it’s easy to miss potential network connections from IoT devices to critical assets.

What are the major IoT devices threats and risks?

Here are the most common threats associated with IoT devices.

1. Lack of built-in security

IoT devices rarely include onboard tools to filter malicious agents or inspect traffic. They carry out a limited range of functions, with minimal interference in data as it passes through their sensors.

This lack of security settings creates a void that security teams must fill. Unfortunately, IoT vendors rarely assist, allocating limited resources to developing comprehensive firmware and keeping up to date with emerging threats.

IoT developers tend to stick to short-term production cycles and may not even be available to support within a few years of device deployment. It’s also common to create backdoors in IoT firmware, and developers may fail to patch these weak points as devices age.

Additionally, vulnerabilities in the web applications used to manage IoT equipment can lead to access control issues. 

These vulnerabilities make it essential for IoT users to create security strategies covering every deployed device and associated software tools.

2. Malware attacks

IoT devices can act as vectors for multiple malware attacks, potentially opening routes to central data centers, networked computers, or critical cloud resources. Attackers can use CNC scanning to find open ports before forcing entry via weak password security (if IoT devices are password secured).

After attackers compromise devices, they usually integrate them into far larger botnets, which leverage collective force to mount large-scale attacks.

Malware attacks could be relatively innocuous for the user. For instance, IoT devices can act as spam bots, spreading unwanted messages across the web. Or they could become part of crypto-mining networks. However, other malware attacks are more damaging.

Botnets can form the basis for Distributed-Denial-of-Service (DDoS) attacks which overwhelm networks and take websites offline. In other cases, “brickers” can render IoT devices permanently unusable.

3. Data loss

Data breaches are the number one cybersecurity risk for companies worldwide, and unsecured IoT endpoints are often the root cause when critical data is exposed.

In 2021, a joint study by Vietnamese communications company Vietel and Kaspersky Labs found that faulty IoT connections contributed to 16 major data breaches, compromising almost 100,000 financial accounts.

Exercise company Peloton also discovered that IoT connectivity could lead to information theft. Researchers found that weaknesses in the company’s fitness tools could leak data about the health, gender, and age of Peloton customers.

4. Physical security

Many companies rely on IoT technology in their physical security setups. For instance, they might use smart door access systems or locks for their server centers. These devices are just as susceptible to attacks as any other IoT product.

Poorly secured locks, cameras, heat sensors, and other physical security measures raise the risk of theft and damage. So the physical aspect of IoT tech must be considered when protecting the integrity of data networks and critical assets.

5. IoT misconfigurations

All devices are prone to misconfiguration, rendering their security functions irrelevant. IoT devices are no exception and often interface with corporate networks without consideration of setup issues like password integrity or firmware updates.

IoT devices almost always come with built-in default passwords, and these are known to hackers. In one typical incident, hundreds of thousands of GPS trackers shipped with 123456 as the default password, opening plenty of attack routes for attackers.

Older IoT technology may also depend on outdated firmware that developers haven’t updated to resolve known vulnerabilities. If security teams don’t apply updates when connecting devices, these weaknesses can remain over the long term.

How can businesses secure IoT Devices?

IoT devices face a number of urgent security vulnerabilities and represent a significant risk to companies that use them. However, this is not a reason to abandon IoT tech. In any case, many companies depend on the IoT in day-to-day operations. Eradicating IoT altogether is not an option.

The challenge is finding workable IoT security solutions without compromising performance. Here are some recommendations that could be part of an IoT security strategy:

1. Focus on Device Discovery and Complete Visibility

When securing IoT networks, the first step is creating a map of connected IoT devices. Security teams must know the precise number of devices in use alongside manufacturer IDs, serial numbers, hardware, and firmware versions.

Record any specialist features that attackers could exploit. For example, many IoT products use communication protocols such as NFC, Bluetooth, LoRA, or nRF24. Note down any devices that rely on GPS communication as well.

Automated scanning tools can map connected devices. Enter the data generated into a regularly updated inventory alongside a risk profile for every device. Make devices a security priority if they interact closely with critical resources and data centers or if they process high-value data.

The device map and risk profiles can feed into other security strategies such as network segmentation, ensuring that IoT endpoints are separate from core data assets.

2. Apply network segmentation

Network segmentation is the process of dividing networks into discrete sections. Users can access portions of the network provided they possess sufficient privileges or contained if they do not have the required permissions.

Segmenting networks reduces the attack surface available to hackers, meaning that cybersecurity incidents are localized and do not ripple throughout the entire network. In the IoT context, this allows security teams to separate insecure connected devices from data centers or applications.

3. Prioritize IoT updates

IoT vendors may not offer automated updates or even provide customer alerts when firmware updates become available. Security teams should never assume that IoT software is current and capable of meeting emerging threats. Instead, an active updates strategy is required.

Administer any required security patches for IoT equipment at the installation stage. Vendor websites should provide the latest versions. Avoid any devices without recent updates if possible. Disabling features that aren’t essential is also a good idea, as is avoiding Universal Plug and Play connectivity. UPnP may be convenient, but when used across networks, it makes it much easier for cybercriminals to map potential attack routes.

Additionally, schedule update audits to renew firmware throughout the lifecycle of IoT tools. Ideally, vendors will collaborate with companies to ensure up-to-date protection, but proactive investigation of security patches may also be necessary.

4. Use secure password practices

As noted earlier, IoT products often ship with default passwords. These passwords are easy to guess but may not be changed when companies install devices, creating a simple entry point for attackers.

Make strong passwords to protect IoT devices. Every device should have a unique password, and this password should change regularly. An enterprise-wide password manager can help automate updates and avoid human error.

Some devices, such as physical locks or cameras, also support multi-factor authentication (MFA). MFA adds another layer of access control above simple passwords.

5. Employ real-time IoT monitoring

Combine device visibility with monitoring to track traffic across IoT nodes and detect unusual activity before crises emerge. Modern network security management systems provide tools to monitor network traffic continuously, including every connected device.

Monitoring tools also allow security teams to set a baseline for normal network functioning. This baseline acts as a standard to detect anomalies and can be used to optimize network performance alongside threat detection.

6. Router security and encryption

Few IoT products come with embedded encryption, but companies can add cryptography above devices as an additional security measure.

Having a secure router is also essential. Set IoT router encryption to the highest level compatible with network performance. Configure IoT routers with a secure password, pick device and network names that differ from defaults, and separate routers from other assets via network segmentation.

Complete separation may not be possible. However, robust barriers between an IoT network and standard network architecture help to contain threats if they arise.

Combine IoT device security with Zero Trust & SASE

Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) provide a way to synthesize many of the solutions suggested above.

ZTNA is a set of ideas based on the principle of least privilege. Users are never trusted until verified, while resources are locked down until evidence is provided that users have the required privileges.

SASE is a suite of cloud-based technologies that provides in-depth network edge protection. Identity Access Management (IAM) and network micro-segmentation guard against malicious intruders, including agents entering networks via IoT endpoints.

SASE includes the ability to automate device scanning and traffic monitoring - both major benefits when managing large numbers of IoT devices. Security policies for each IoT device can be delivered automatically, and a centralized console allows for real-time threat surveillance.

SASE and ZTNA work together to ensure that rogue IoT endpoints are separated from the wider network while enabling legitimate traffic to flow unimpeded. It’s the ideal option for companies reliant on the IoT.

How NordLayer can help you achieve IoT security

NordLayer offers a range of IoT security solutions to implement Zero Trust-based IoT protection

Our SASE networking products allow for granular controls, in-depth monitoring, easy device management, and optimized traffic speeds. Inventory all connected IoT equipment, manage updates, and make it easier to spot threats before they cause critical issues. And use simple Identity Access Management (IAM) tools to authenticate every user before they can access core resources.

IoT tech doesn’t have to be a security minefield. Contact our team today to discover how to protect against IoT threats and safeguard core network assets.

Share article

Copied

Copy failed

Protect your business with cybersecurity news that matters

Join our expert community and get tips, news, and special offers delivered to you monthly.

Free advice. No spam. No commitment.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.