By 2020, the number of IoT devices reached 12.3 billion. Electronic devices that communicate with each other through the clouds, smart homes, and intelligent industrial systems are becoming our new reality. In the distant 90s, the first thing that could connect to the internet was the most ordinary toaster created by John Romkey.
After almost 30 years, the number of Internet of Things (IoT) class devices has exceeded the population of the planet. According to
By 2030, according to
The IoT landscape is glistening with the promise of a utopian future—a world where automation streamlines our processes, reduces material costs, and shaves off precious minutes from our routine tasks. But, let's not get lost in this techno-optimism. For every layer of convenience, these innovations provide, they also introduce a serious number of potential security vulnerabilities.
The entire IoT is made up of "turn on and forget" devices. And from the user's point of view, such actions are quite expected and logical, because sometimes many things seem completely safe, although this is far from the truth.
In theory, vendors should ensure the safety of their equipment, releasing timely updates and applying security during development. But often, due to cost-saving measures, vendors also adopt a “turn on and forget” approach. As a result, "smart" devices may not get updated. And even if updates are released, getting users to install them is another challenge.
A multitude of unprotected IoT devices, even those with low computational power, pose an easy target for hackers. By exploiting their weaknesses and vulnerabilities, cybercriminals create botnets for activities like launching DDoS attacks. The infamous Mirai botnet launched a record-breaking DDoS attack in 2016, prompting concerns about the future of the internet. Yet, this only marked the beginning of IoT-related threats.
According to a
Networks infected with millions of compromised devices pose a genuine threat, not just to businesses, but also to individual users. When a device that's been seized by a hacker enters a home network, chances are it's not only contributing to DDoS attacks but also collects a huge amount of information about its "owner": steals personal information, passwords, banking data, and intercepts traffic.
This looming problem calls for a solution in the form of IoT regulation. There's an urgent need for a fresh security approach towards all IoT devices. However, the quick-profit mindset of vendors, who often avoid costly development, may be at odds with the perspective of the professional community.
Regulators need to step in, building IoT security around smart-device protection standards, considering the significant risks IoT poses to users and businesses. In the case of the UK, the
The EU is
By now, it is up to users to control the safety of the data and equip themselves with precautions to defend against potential threats in the realm of smart devices.
It is necessary to keep your network "clean":
Keep in mind that similar measures should be taken not only for home networks but also for corporate ones.
The lead image for this article was generated by HackerNoon's AI Image Generator via the prompt "Internet of things".