IoT Device Security: Risk Assessment, Hygiene Are Key

As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.

5 Min Read
IoT Device Security: Risk Assessment, Hygiene Are Key
Getty Images

With IoT devices at the edge of the network continuing to proliferate, IT pros could be forgiven for comparing their efforts to a game of whack-a-mole.

As one device emerges with known vulnerabilities, there may be several more lurking, unbeknownst to IT, that are vulnerable to attack. According to F-Secure, cyberattacks on IoT devices increased 300% in 2019.

By 2022, there will be some 25 billion devices at the edge – all of which will vie for attention on the global network, according to the Telecommunications Industry Association. More than two-thirds – or some 18 billion – will be IoT devices. Survey data also suggests that enterprises will spend an average of 30% of IT budgets on edge cloud computing over the next three years, according to “Strategies for Success at the Edge, 2019,” a report by Analysys Mason.

In conjunction, these data points suggest that enterprises will move key compute resources to the edge to enable processes such as video surveillance, performance monitoring of industrial equipment and real-time data analytics.

According to new data released by Cybersecurity Insiders, 72% of organizations experienced an increase in endpoint and IoT device security incidents in the past year, while 56% anticipate their organization will likely be compromised due to an endpoint- or IoT-originated attack with the next 12 months.

Preventing Cybersecurity Attacks on IoT at the Edge

The keys to contending with these encroachments on enterprise security, say experts, are greater knowledge about an enterprise’s IoT profile and key security hygiene steps that many enterprises neglect.

“The biggest issue is trying to work out what is in your estate and how it gets there,” said Alex Leadbeater, head of global obligations and futures, BT Security at ETSI, in the panel discussion “Mitigating and Managing Risk with IoT – Securing your Device and Managing Infrastructure” at the IoT Security Summit in early December.

Leadbeater said shadow IT – whereby a business unit introduces an unsecured (and unknown to IT) connected device because it satisfies an unmet need – isn’t malicious but contributes greatly to enterprise cybersecurity vulnerabilities.

“IoT slowly creeps in,” said Leadbeater. “Call it ‘the march of IoT’ into segments that originally didn’t have it: hospitals, critical national infrastructure. They simply don’t have policies for [these IoT devices] because they didn’t realize that they were there until they realize they have a security vulnerability,” he said.

Health care organizations have experienced this shadow IT problem in high relief, said panel participant Seth Fogie, director of information security at Penn Medicine, as demand has increased in the wake of COVID-19 for remote care and digitized services.

“There has been a really big push to take the medical device out to the patient,” Fogie said. This “consumerization” of patient care with connected devices augments IoT device vulnerabilities, providing entryways to attack other parts of the enterprise. “Special-interest groups will want to learn more about their specific niche and want to put an IoT piece on the network to run a quick pilot,” and those demos can threaten network safety. “It’s a real challenge we deal with on an ongoing basis,” he said.

Fogie noted that Penn Medicine had installed a temperature monitoring system to gauge the temperature of refrigerators for drugs and food. “If something went wrong there – drugs and food can go bad – it can impact patient care,” Fogie recalled. “But it was pulled off the internet, with default passwords that came right off the internet,” he said. That kind of password exposure is a simple fix for IT pros, but also a surprisingly common mistake, Leadbeater said.

Further, Fogie noted, the temperature monitoring device was vulnerable enough to become a launching point, where malicious attackers could hop from that system to the back end. “The answer is to segment things off,” Fogie said, whereby IoT device networks are cordoned off from other key IT data networks.

Lack of Visibility Into IoT Devices on the Network

Within the health care industry, the move toward digital health care and remote monitoring of patients – with patients and practitioners using pacemakers, glucose monitors and other devices – has exacerbated the shadow IT problem.

Fogie emphasized that with trends like digital medicine having exploded in 2020, the attack surface has increased and created new attack points for malicious actors.

But IoT device security requires taking a solid inventory of these shadow IT devices so malicious actors don’t access them first. 

Steps to IoT Device Security at the Edge

There are three key steps in addressing vulnerabilities in an IoT estate, said Russell Schafer, head of product marketing, security platforms, at Check Point Software, during the panel discussion.

  1. Discovery. During this stage, IT pros should take a comprehensive inventory of the components of their IT environments. They should assign a risk profile to each device, noting operating system, patches and known vulnerability attacks.

  2. Policy and segmentation. Malicious actors exploit holes in organizational security by jumping from device to device. Given the risk profile, IT should automate security policies that dictate communications that the organization allows and those it blocks. For example, an MRI machine might be allowed to send an image to a particular database but not communicate with other devices.

  3. Monitoring and threat prevention. IT should use software to look at connections between devices and the network to detect anomalies in traffic and behavior.

No Quick Fixes for IoT-at-the-Edge Vulnerabilities

While the panelists indicated there are no speedy remedies to the problem of malicious attackers infiltrating IoT devices at the edge, they noted a few tactics that could help. One is the notion of building in security by design. While many industrial devices as well as consumer devices were not built for constant updates and patching, the panelists noted that more development efforts now incorporate security upfront – and before building devices.

Yet another, Fogie said, is the prospect of enlisting vendors’ “bug bounties.” Google and Microsoft, for example, actively enlist researchers to test systems and identify vulnerabilities before malicious forces do.

“If I knew a device went through that level of exploration, I would be more likely to [use it],” Fogie said. Ultimately, though, experts said that IoT device security is devoid of quick fixes.

“There [is] no ‘We’re going to fix this in two days’ kind of a fix,” Leadbeater said.

Read more about:

IoT World Today

About the Author(s)

Lauren Horwitz

Senior content director, Informa

Lauren Horwitz is a senior content director on Informa's Channel Futures, Channel Partners and IoT World Today websites.

IoT World Today

IoT World Today, a sister site to DCK, connects IoT decision-makers and implementers, including those in the C-suite, IT and line-of-business managers. We inspire them by providing the latest news and analysis and case studies about technologies used in the Internet of Things, such as infrastructure, security, analytics and development tools. We capture the stories of IoT leaders imbuing intelligence across vertical industries. In addition, we are the exclusive content outlet for the IoT World trade show and conference series -- the world’s largest IoT events -- and feature advice and best practices from the subject matter experts who drive those events.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like