{"id":1684,"date":"2019-02-28T07:00:27","date_gmt":"2019-02-28T07:00:27","guid":{"rendered":"http:\/\/investspectrum.com\/uma\/?p=1684"},"modified":"2020-05-15T12:34:37","modified_gmt":"2020-05-15T12:34:37","slug":"iot-internet-of-things","status":"publish","type":"post","link":"https:\/\/investspectrum.com\/uma\/iot-internet-of-things\/","title":{"rendered":"IoT (Internet of Things)"},"content":{"rendered":"<p><strong>\u201cAugmenting the human experience with a connected world\u201d<\/strong><a href=\"#_edn1\" name=\"_ednref1\"><strong>[i]<\/strong><\/a><\/p>\n<p>\u201cOh! Sorry I didn\u2019t see you sitting there. It\u2019s my morning break here at work, so I was checking a few things at home. Making sure that I locked the front door and checking to see if we had eggs in the fridge. Looks good. And the dog\u2019s behaving.<\/p>\n<p>So, do you remember back in 2019 when IoT was new and security was sketchy? I figured I didn\u2019t have a lot to lose by installing that smart front door lock. After all, it was nice for the door to unlock when I pulled into the driveway, and then have it auto-lock when I left for work. I could even unlock it for my daughter who dropped by unannounced from out of town. Nice.<\/p>\n<p>At that time, some people weren\u2019t comfortable with the level of cybersecurity in IoT, so they stayed away. Others\u2026they did their homework and only went with devices that were designed from the ground up for security. Smart.\u201d<\/p>\n<h2>What\u2019s Involved?<\/h2>\n<p>IoT (Internet of Things): \u201cthe interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.\u201d So, many \u201csmart\u201d things are in this category: locks, thermostats, lights, alarms, toys, automobiles, garage doors, sprinklers, IP cameras, refrigerators, or your home DVR. Convenience and utility.<\/p>\n<blockquote><p>IoT can make your home more secure from burglars by automatically locking your front door when you leave, alert you to someone at your front or back door, make your coffee, turn your lights on and off, etc., etc. What\u2019s not to like, right?<\/p><\/blockquote>\n<p>This transformational technology is growing geometrically and is poised for an explosion. IHS Market (a London-based global information provider) predicts that by 2025 there will be 73 billion IoT devices installed<a href=\"#_edn2\" name=\"_ednref2\">[ii]<\/a>. That\u2019s more than 9 per person on earth! With all these devices connected to the Internet, the bad guys are constantly attempting to gain access in order to steal information and steal your stuff.<\/p>\n<h2>Are they secure?<\/h2>\n<p>With all these advantages, the question becomes what is the risk of installing a smart device? It turns out that there is a lot NOT to like, IF you are not careful. Alas, most IoT manufacturers have no program for disclosing and reporting security issues. A December 2018 report explains that \u201c90% Of Consumer IoT Vendors Don&#8217;t Let Researchers Report Vulnerabilities\u201d<a href=\"#_edn3\" name=\"_ednref3\">[iii]<\/a>. That could mean that if you are not technically inclined or are not willing to do the homework, you may want to wait until IoT technology is more mature and secure.<\/p>\n<p>Here are some of the issues and possible consequences:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"312\"><strong>Issue<\/strong><\/td>\n<td width=\"312\"><strong>Possible Consequence<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"312\">No security updates<\/td>\n<td width=\"312\">Device could be vulnerable<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Weak credentials that can\u2019t be changed<\/td>\n<td width=\"312\">Device is vulnerable<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">A hacked IoT device<\/td>\n<td width=\"312\">Allows access to your other accounts on your network, identify theft<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Remote (unattended!) enablement of stoves, cookers, microwaves<\/td>\n<td width=\"312\">Safety hazard<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Self-driving car vulnerabilities<\/td>\n<td width=\"312\">Theft, safety concern<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<blockquote><p>\u201cAs an example, an IoT thermostat very likely communicates to a cloud server to provide updates and to control the device remotely,\u201d Jett [Justin Jett, director of audit and compliance for Plixer] says. \u201cIf the IoT security is robust, but the cloud security is significantly lacking, the entire system is vulnerable.\u201d<a href=\"#_edn4\" name=\"_ednref4\">[iv]<\/a><\/p><\/blockquote>\n<h2>What can you do?<\/h2>\n<p>For those who want to enjoy the benefits of current IoT tech, this may be a good time to do a little online research and get a smart lock for your front door or smart LED lights that turn on at sundown and can be controlled from anywhere in the world.<\/p>\n<p>If you decide to take a step into the Internet of Things, remember that your smart device will be part of your local network. So, here\u2019s what you should do.<\/p>\n<ul>\n<li>Choose your IoT devices not just based on convenience, but also on security.\n<ul>\n<li>Smart locks are very convenient, and they are as secure as traditional locks IF well designed and supported.<\/li>\n<li>Make sure the manufacturer is actively supporting the device.<\/li>\n<li>Keep a \u201cgood ol\u2019 fashion\u201d key handy when the keyless remote entry fails.<\/li>\n<\/ul>\n<\/li>\n<li>Insist on strong security and check your devices\u2019 configurations.<\/li>\n<li>Keep your computer and smart phones updated; they usually share the same network at your home.<\/li>\n<li>Install computer virus and malware <a href=\"https:\/\/www.techradar.com\/best\/best-antivirus\" target=\"_blank\" rel=\"noopener noreferrer\">protection<\/a><\/li>\n<li>Use multifactor authentication when possible.<\/li>\n<li>Don\u2019t use public Wi-Fi without <a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjM39qUxPDfAhUCwFkKHdL5B6gQFjAAegQICxAB&amp;url=https%3A%2F%2Fwww.cnet.com%2Fbest-vpn-services-directory%2F&amp;usg=AOvVaw08ZAGC1SyVMAXG798Nrav6\" target=\"_blank\" rel=\"noopener noreferrer\">VPN<\/a>.<\/li>\n<li>Only use known devices. E.g., if you don\u2019t know where a USB thumb drive has been, leave it alone.<\/li>\n<\/ul>\n<p>Here\u2019s an excellent <a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/747624\/Consumer_Guidance_for_Smart_Devices_in_the_Home_Oct_2018.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">consumer guide<\/a> for smart home devices, developed by the UK government.<\/p>\n<h1>The Future<\/h1>\n<p>California has enacted the first law covering IoT and this may drive future federal regulations. \u201cThe short IoT bill requires IoT manufactures to equip devices with \u201creasonable\u201d security measures, appropriate to the function of the devices and to the information they collect or transmit.\u201d<a href=\"#_edn5\" name=\"_ednref5\">[v]<\/a> The move is toward more security and accountability, which is good for the industry and for consumers\u2026like you.<\/p>\n<h1>Spectrum IT<\/h1>\n<p>The IT Team at Spectrum works behind the scenes to ensure that your investment and personal information is kept safe and secure. We also strive to make sure that Spectrum\u2019s other teams have access to the information they need, enabling them to make the best timely decisions possible for you.<\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[i]<\/a> &#8220;The next chapter of IoT is just beginning as we see a shift from digitally enabling the physical to automating and augmenting the human experience with a connected world,&#8221; says Carrie MacGillivray, IDC. <a href=\"https:\/\/www.idc.com\/getdoc.jsp?containerId=US44390618\">https:\/\/www.idc.com\/getdoc.jsp?containerId=US44390618<\/a><\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[ii]<\/a> IHS Markit, <a href=\"https:\/\/cdn.ihs.com\/www\/pdf\/IHS-Markit-2018-Top-Transformative-Technology-Trends.pdf\">The top transformative technologies to watch this year,<\/a> 2018 (PDF, 16 pp., no opt-in)<\/p>\n<p><a href=\"https:\/\/www.marketwatch.com\/story\/7-ways-to-keep-your-smart-home-from-being-hacked-2016-10-17\">https:\/\/www.marketwatch.com\/story\/7-ways-to-keep-your-smart-home-from-being-hacked-2016-10-17<\/a><\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[iii]<\/a> <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2018\/12\/13\/the-silence-of-the-brands-90-of-consumer-iot-vendors-dont-let-researchers-report-vulnerabilities\/#4f60977d9c88\">https:\/\/www.forbes.com\/sites\/daveywinder\/2018\/12\/13\/the-silence-of-the-brands-90-of-consumer-iot-vendors-dont-let-researchers-report-vulnerabilities\/#4f60977d9c88<\/a><\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\">[iv]<\/a> <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/lightly-secured-cloud-with-a-chance-of-iot-attacks\/\">https:\/\/www.scmagazine.com\/home\/security-news\/lightly-secured-cloud-with-a-chance-of-iot-attacks\/<\/a><\/p>\n<p><a href=\"#_ednref5\" name=\"_edn5\">[v]<\/a> <a href=\"https:\/\/www.scmagazine.com\/home\/opinions\/californias-new-iot-security-law-is-not-nearly-enough-we-need-a-gdpr-for-iotnow\/\">https:\/\/www.scmagazine.com\/home\/opinions\/californias-new-iot-security-law-is-not-nearly-enough-we-need-a-gdpr-for-iotnow\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cAugmenting the human experience with a connected world\u201d[i] \u201cOh! Sorry I didn\u2019t see you sitting there. It\u2019s my morning break here at work, so I was checking a few things at home. Making sure that I locked the front door and checking to see if we had eggs in the fridge. Looks good. And the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[65,94],"class_list":["post-1684","post","type-post","status-publish","format-standard","hentry","category-news-you-can-use","tag-online-safety","tag-security"],"_links":{"self":[{"href":"https:\/\/investspectrum.com\/uma\/wp-json\/wp\/v2\/posts\/1684"}],"collection":[{"href":"https:\/\/investspectrum.com\/uma\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/investspectrum.com\/uma\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/investspectrum.com\/uma\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/investspectrum.com\/uma\/wp-json\/wp\/v2\/comments?post=1684"}],"version-history":[{"count":6,"href":"https:\/\/investspectrum.com\/uma\/wp-json\/wp\/v2\/posts\/1684\/revisions"}],"predecessor-version":[{"id":1699,"href":"https:\/\/investspectrum.com\/uma\/wp-json\/wp\/v2\/posts\/1684\/revisions\/1699"}],"wp:attachment":[{"href":"https:\/\/investspectrum.com\/uma\/wp-json\/wp\/v2\/media?parent=1684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/investspectrum.com\/uma\/wp-json\/wp\/v2\/categories?post=1684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/investspectrum.com\/uma\/wp-json\/wp\/v2\/tags?post=1684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}