Are IoT devices allowing access to your data?

Does your business use “Smart” TVs, “Smart” Monitoring Systems, or any other type of  Internet of Things (IoT) “Smart” devices? Then be well aware, these devices may be spying on you and stealing your data!

A recent report from a Microsoft blog post stated, hackers have been taking advantage of web-enabled smart (IoT) devices to breach networks.  The hackers gain access to the IoT device and then use those devices to scan for other vulnerable devices on the same network.

Do you have a video enabled doorbell allowing you to see who is at the door by checking your smartphone?

How about a coffee maker which allows you to turn it off remotely?

How about web enabled cameras to monitor your property remotely?

These are other common examples of IoT devices, and there are more and more of them being made available everyday.  Unfortunately, just about any IoT device can also allow someone else access to your environment, which also includes sensitive Personally Identifiable Information (PII), medical, or banking information.

ITNS Consulting can help!  We can secure these devices by ensuring password complexity and/or segregating IoT devices to their own network ensuring that if the devices are ever breached, sensitive business data is not accessible through the device.

Have questions?  We’re here to help… just give ITNS Consulting a call at 608-563-1975 or visit us on the web at https://itnsconsulting.com and put your security fears to rest!

Sources and more information:
Microsoft
https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/

ArsTechnica
https://arstechnica.com/information-technology/2019/08/microsoft-catches-russian-state-hackers-using-iot-devices-to-breach-networks/

TechLinked
https://www.youtube.com/watch?v=SK71sgw0UEw

Ready to have a conversation?

We would really love to hear from you! Give us a call at 608-563-1975 or fill out the form below to start working with our team.

Fill out my online form.

Making Hybrid Work Environments Secure
The COVID-19 pandemic caused an unprecedented shift in the way people work. …
Defense in Depth (DiD): Think Like a Hacker
The current threat landscape is rapidly advancing, with cybercriminals constantly upgrading their …
Why Attacks on Critical Infrastructure Are Dangerous
Critical Infrastructure (CI) comprises physical and cyber assets vital for the smooth …
4 Reasons Cybersecurity Attack Surfaces Are Expanding
The COVID-19 pandemic impacted individuals and businesses all over the world in …
How Can Cyber Resilience Protect SMBs?
Small and Medium Businesses (SMBs) usually invest less in cybersecurity, making them …
How to Build a Security-First Culture That Empowers Your Hybrid Workforce
Tools are only as good as their users. This should be your …
Top 9 IoT-Related Security Threats Businesses Face
The Internet of Things (IoT) is rapidly changing the technology landscape as …
All You Need to Know About Least Privilege
In IT, the principle of least privilege (PoLP) refers to the concept …