i-PRO’s Internet of Things cybersecurity pillars to build a strong IoT security program

i-PRO joins with the U.S. department of homeland security cyber and infrastructure security agency (DHS CISA) to raise awareness around cybersecurity for NCSAM (national cyber security awareness month). The world has seen a significant increase in cyber-attacks aimed at critical infrastructure and security products in the last few years, with Industrial Internet of Things (IIoT) devices such as security cameras, becoming prime targets for hackers. According to a Kaspersky analysis of its telemetry from honeypots shared with Threatpost and extrapolated for all of 2021, there were over 3 billion IoT breaches, and that’s just the recorded number, the actual number is probably much higher, says Will Knehr, senior manager of information security and data privacy at i-PRO.

In an i-PRO poll of almost 100 LinkedIn users we asked, “Who is typically responsible for ensuring the cybersecurity of security systems in an organisation?” 55% of respondents said that the IT department was responsible, while 23% said that it was the device manufacturer. Only 13% said it was the system integrator, while 10% said it was the safety security department. While the answers vary based on the requirements of the installation, it’s clear that IoT and IIoT manufacturers must do more to help secure these devices and educate the market on security best practices. So, as part of cybersecurity awareness month, i-PRO is releasing our “Internet of Things cybersecurity pillars” to help educate the market on IoT security. The pillars focus on what we believe are the four core tenets that should be the foundation of any IoT security program. The four pillars are resiliency, cyber hygiene, product security, and proper configuration.

In this article, we will briefly explore each of these pillars, and over the next few weeks, we will release more detailed explanations of each pillar. We hope that you will join us on this journey and together we can work to make IIoT safer for everyone!

What is IoT and IIoT? Since we will be using these terms a lot throughout these articles, it’s probably best to go ahead and make sure that we are all on the same page. IoT is the Internet of Things, and it is typically defined as small computing devices, sensors, or software that communicate and exchange data over the internet. Still confused? No sweat, you interact with these devices every day and maybe don’t even realise it. These are devices like smart refrigerators, vacuums, dryers, thermostats, home security systems, wearable fitness and wellness tracking, light switches, and even healthcare devices like pacemakers. Unfortunately, most of these devices were not made with security in mind, they were just made to function and provide convenience to the consumer. IIoT is just like IoT but developed for an Industrial market. IIoT includes devices used in manufacturing, heating and cooling of commercial facilities, smart fire control systems, commercial security systems, and smart farm devices. These devices automate a lot of commercial processes which increase efficiency and often help to reduce costs, but they have also introduced a new set of vulnerabilities to organisations. To alleviate any confusion, for the rest of the article we will use the terms IoT and IIoT interchangeably.

Without any further ado, let us hop into these pillars and see what we can do as a team to make our IoT devices better.

Resiliency

The first pillar focuses on resiliency, which simply put, means that your IIoT device or security system will be there when you need it the most. Will your security system work during a power outage, severe weather, communication disruption (telephone or internet outage), or cyber-attack? These are the types of questions that will help your organisation determine if your devices are resilient. One of the toughest challenges in achieving true resiliency is marrying physical security and cybersecurity together.

Cyber hygiene

The best thing you can do to protect your IoT devices is put deodorant on them and wash them every day….just kidding, we aren’t talking about that kind of hygiene. What we are referring to is the care and maintenance of IoT devices. When was the last time you updated your IoT firmware or software? Do you have an inventory of all IoT devices on your network? Are you using strong passwords or authentication for your IoT devices? Did you ever change the default passwords on your IoT devices? These questions will give you a sense of your cyber hygiene. IoT devices need to be updated and inventoried just like any other device on the network, however, they are often overlooked or forgotten about once deployed.

Product security

Product security refers to the security features on the device itself. Many IoT devices, especially cheap ones or devices made by fly-by-night companies, don’t build security features into their devices. We recommended purchasing devices from reputable companies that will fix security flaws as they are reported. Some of the security features to look for in an IoT device are encryption (protecting usernames, passwords, and device traffic), authentication (does the device ensure that it only takes instructions from an authenticated source), and the support of secure network standards like 802.1x.

Proper configuration

Will Knehr

In the previous pillar, we focused on the security features that an IoT device has, but those security features are pointless if they aren’t configured or set up properly. Proper configuration focuses on ensuring the devices have the security features turned on and turning off any features that aren’t in use, but it also includes making sure that the network is set up properly. Often these IoT devices are hacked because attackers can get to the devices in the first place, one way to help with that is by ensuring that your IoT devices aren’t visible from the internet. This can be done by properly configuring the network and using network security best practices such as network segmentation.

The author is Will Knehr, senior manager of information security and data privacy at i-PRO.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

Aeris to acquire IoT business from Ericsson

Posted on: December 8, 2022

Ericsson and Aeris Communications, a provider of Internet of Things (IoT) solutions based in San Jose, California, have signed an agreement for the transfer of Ericsson’s IoT Accelerator and Connected Vehicle Cloud businesses.

Read more

Telenor IoT passes milestone of 20mn SIM cards

Posted on: December 8, 2022

Telenor, the global IoT provider and telecom operator, has experienced rapid growth over the last years and ranks among the top 3 IoT operators in Europe and among the top IoT operators in the world. The positive development is due to an accelerated pace of new customers combined with a successful growth of existing customers’

Read more
FEATURED IoT STORIES

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

Talking Heads: The M2M Doctor is in the House

Posted on: December 26, 2013

Mobile health is M2M at its most rewarding. So says, Dan MacDuffie CEO of Wyless (left). And he should know, his managed services company has achieved 50% yearon- year growth recently and a growing portion of that is in mHealth and Wellness services. He’s certain we’re standing on the threshold of a new generation of health services that cut delivery costs, extend the reach

Read more

Talking Heads: mHealth gains ground as one-stop shops and M2M with ‘wired safety net’ bring efficient patient monitoring

Posted on: December 23, 2013

For years analysts have touted mobile healthcare as a huge opportunity for those offering machine-to-machine communication (M2M) services. Truth be told, the progress so far has been patchy, at best. So M2M Now asked Alexander Bufalino, SEVP Global Marketing at Telit, to describe the hurdles in the way of M2M mHealth, how they are now being overcome and what

Read more

Unlocking the total value of M2M

Posted on: December 19, 2013

Do you ever wonder why people and organisations invest in machine-to-machine communications (M2M) and the Internet of Things (IoT), asks Fred Yentz? Reasons may differ somewhat across industry segments but in most cases they fall in one or more of three categories: To make money, to save money or to be compliant. ILS Technology is squarely focused on helping

Read more

Paving the way to the Internet of Things

Posted on: December 17, 2013

Combining the ARM computing engine with location-awareness and wireless connectivity It’s set to be the Perfect Storm: The rapid growth of high-speed cellular networks and the introduction of IP version 6 which has enough IP addresses for every grain of sand on Earth. Add to this mix the proliferation of the ARM embedded computing architecture, now the de facto global

Read more

What’s the ‘real deal’ on the Internet of Things?

Posted on: December 16, 2013

The ‘Internet of Things’ buzzword appears to have picked up steam during the past several months as large players such as GE and Cisco have touted their stories on the growing number of connected devices. But, as Alex Brisbourne of KORE asks, how different, if at all, is the Internet of Things when compared with other connected device markets,

Read more

M2M Now Magazine December 2013 Edition

Posted on: December 5, 2013

M2M Now magazine explores the evolving opportunities and challenges facing CSPs across this sector. Our exclusive interviews pass on some key lessons learned by those who have taken the first steps in next gen Machine to Machine (M2M) services. In the latest issue: TALKING HEADS: Alexander Bufalino of Telit tells how one-stop shops and M2M with a ‘wired

Read more