Sales: (877) 516-0218
General: (678) 695-5500

Are Smart IoT devices vulnerable to hackers?

purple overlay over circuit board

There have always been some questions about whether smart devices are vulnerable to hackers.  They typically don’t have screens, have limited functions, and we usually don’t think about managing them.  But last week, the Wall Street Journal reported that “Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks.”  The article by Drew Fitzgerald went on to say, “the assaults raised eyebrows among security experts both for their size and for the machines that made them happen. The attackers used as many as one million Chinese-made security cameras, digital video recorders and other infected devices to generate webpage requests and data that knocked their targets offline”, including the internet security site Krebsonsecurity.com.

Smart devices and IoT devices in fact can become hacking targets because they fit the target profile of either zombie assets that are typically plugged in and forgotten, without routine updates and patches, or rogue/ unauthorized devices, which are not managed as network assets and many times are still using the factory default passwords.  The recent attacks primarily used cameras and video recorders from a specific Chinese manufacturer because of their widespread use and a particular firmware vulnerability.  Other devices such as consumer wifi routers are also increasingly being hijacked because they still use the factory default passwords which can be found with a simple google search.

The best approach to protect your smart devices or IoT devices is the same managed security approach Onepath recommends you take with any other device on your network:

  1. Define and enforce good policies and procedures, including strong passwords and regular patches and firmware upgrades
  2. Conduct regular risk assessments, including penetration testing and scanning for rogue devices and unauthorized devices
  3. Utilize a layered defense strategy to prevent attacks, identify intrusions and then manage/mitigate any attacks when they do occur.

smart-device-vulnerability

Just because it doesn’t have a screen doesn’t mean it isn’t vulnerable and you shouldn’t manage it…

To read the full article “Hackers Infect Army of Cameras, DVRs for Massive Internet Attacks”, click here.

To learn more about how Onepath’s Managed Security services, go to www.1path.com/managed-services or call 678.695.5600.

Free Cybersecurity Quiz

RECENT POSTS

SHARE ON SOCIAL MEDIA

Share on facebook
Share on twitter
Share on linkedin

SUBSCRIBE TO OUR NEWSLETTER

Join 30K Business & IT Professionals by signing up for our email list to receive updates on IT and Cybersecurity directly in your inbox.

RFP for IT Template
Perfect AV eBook

NAVIGATE TECHNOLOGY
WITH CONFIDENCE.
CONTACT US.