Story image

Growing IoT adoption putting Australians at risk of cyber attacks

22 May 2018

IoT adoption in the Australian consumer market has grown 55% in the last year, bringing the total market worth to $583 million, according to a recent Telsyte Australian IoT@Home Market Study 2018.

But that increased adoption is putting Australians at increased risk of cyber attacks – and security is still often an afterthought for the manufacturers who make the devices.

Sense of Security CTO Jason Edelstein says manufacturers are pushing connected devices to the market in such a rush that the lack of security is putting Australians’ information at risk.

Telsyte’s research found that the average Australian household has 17.1 connected devices in 2018 and is forecast to reach 37 by 2022 – a total of 381 million connected devices across the country.

According to Edelstein, it’s not just households at risk – particularly as a range of commercial industries adopt IoT technologies.

“Due to the increased efficiencies and convenience IoT provides, it is permeating many industries, ranging from healthcare to retail. It could be an employee bringing in an unsecure IoT device and connecting it to the network. It could be a connected air-conditioning unit in the office. Or, worse, it could be a connected healthcare device that enables doctors to monitor a patient's condition remotely,” he says.

Edelstein notes that hackers have successfully broken into pacemakers, baby monitors, share bikes, and even a casino aquarium. Any device can become a gateway for hackers.

“What we find to be the most common vulnerabilities are software defects, bugs and logic flaws. This clearly shows we are rushing devices to market with little thought to how we protect the users. ”

“To address the security flaws, it is important we start bringing a cybersecurity mindset into the planning and design phase, particularly as more products continue to be connected to the internet.”

He also believes that organisations should continuously use penetration tests and application security reviews to monitor the security of new products.

However, organisations can often miss devices that would generally not be considered threats because IoT is so pervasive.

“There’s already been reports of connected vending machines or air conditioning units being used as back doors into the business network,” Edelstein says.

“For this, Red Teaming, the process of conducting a real-life cyber attack from an attacker's perspective, can help unveil secret entry points you may have missed.”

“Today, IoT devices are a hacker’s dream. It’s everywhere, it’s largely unsecure and it’s providing easy access points to conduct malicious activity and access sensitive information, such as medical records, addresses and credit card details. We must take a proactive approach to securing IoT or risk becoming an easy target."

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.