IoT adoption in the Australian consumer market has grown 55% in the last year, bringing the total market worth to $583 million, according to a recent Telsyte Australian IoT@Home Market Study 2018.
But that increased adoption is putting Australians at increased risk of cyber attacks – and security is still often an afterthought for the manufacturers who make the devices.
Sense of Security CTO Jason Edelstein says manufacturers are pushing connected devices to the market in such a rush that the lack of security is putting Australians' information at risk.
Telsyte's research found that the average Australian household has 17.1 connected devices in 2018 and is forecast to reach 37 by 2022 – a total of 381 million connected devices across the country.
According to Edelstein, it's not just households at risk – particularly as a range of commercial industries adopt IoT technologies.
“Due to the increased efficiencies and convenience IoT provides, it is permeating many industries, ranging from healthcare to retail. It could be an employee bringing in an unsecure IoT device and connecting it to the network. It could be a connected air-conditioning unit in the office. Or, worse, it could be a connected healthcare device that enables doctors to monitor a patient's condition remotely,” he says.
Edelstein notes that hackers have successfully broken into pacemakers, baby monitors, share bikes, and even a casino aquarium. Any device can become a gateway for hackers.
“What we find to be the most common vulnerabilities are software defects, bugs and logic flaws. This clearly shows we are rushing devices to market with little thought to how we protect the users.
“To address the security flaws, it is important we start bringing a cybersecurity mindset into the planning and design phase, particularly as more products continue to be connected to the internet.
He also believes that organisations should continuously use penetration tests and application security reviews to monitor the security of new products.
However, organisations can often miss devices that would generally not be considered threats because IoT is so pervasive.
“There's already been reports of connected vending machines or air conditioning units being used as back doors into the business network,” Edelstein says.
“For this, Red Teaming, the process of conducting a real-life cyber attack from an attacker's perspective, can help unveil secret entry points you may have missed.
“Today, IoT devices are a hacker's dream. It's everywhere, it's largely unsecure and it's providing easy access points to conduct malicious activity and access sensitive information, such as medical records, addresses and credit card details. We must take a proactive approach to securing IoT or risk becoming an easy target."