Understanding IoT Security

BehrTech Blog

Understanding IoT Security

An Interview with Dick Wilkinson CTO, Supreme Court of New Mexico


The dramatic surge of IoT devices has transformed how we interact on a day-to-day basis. From industrial sensors for environmental monitoring and asset tracking to smart home sensors for lighting and leak detection, a plethora of IoT devices connected to networks are helping drive innumerable benefits for users. While the benefits of IoT are undeniable, security remains a primary concern for individuals and businesses. This week on the blog we interview cybersecurity expert, Dick Wilkinson to provide insight on risks, prevention and predictions surrounding IoT security.

What is IoT security and what industries are most vulnerable to security threats?

I define IoT security as the process of making sure smart or connected devices only do what you want them to do, and they always work when you expect them to work. If you can achieve that, then you have secured your IoT devices. Of course, that is much easier said than done, even simple devices can harbor multiple serious threats to your overall network or environment.

Every industry is at risk from IoT threats. The highest risk of a headline grabbing catastrophic failure exists in the critical infrastructure and medical fields. The most vulnerable, meaning likely to be attacked, products are the more accessible devices like home consumer or smart city devices that sit out in the open to collect information or provide surveillance through data and sensors. The risk from smart devices exists on a fluid spectrum and each use case presents unique threats with a different risk profile, even if the device itself is not changed from scenario to scenario.

What are the biggest security challenges in an IoT deployment?

People worry about the high number of devices and assume asset identification and management will be the hardest challenge. I would argue that monitoring and inspecting the traffic from these devices to know when you have an anomaly is a much harder and more valuable to challenge to take on. Identifying anomalous, and possibly threatening, behavior from 200 devices is harder than just keeping track of them and where you put them.

What steps can companies take to better protect their IoT systems and devices?

My suggestion is to make a detailed deployment or use plan and identify all of the capabilities and possible configuration options of your new device(s). Do not take the device out of the box and immediately put it in service on your production environment. Just because the device is simple or serves a simple function does not mean that it is secure by design. Security features may exist and be disabled by default to ensure your new tech works easily the first time. Check every configuration option and disable functions or features you know you don’t need. Every input on the device is a possible attack vector, don’t leave open doors to your network, even if the doors are tiny or invisible.

How can companies better communicate their IoT security efforts to reassure stakeholders?

Right now, most stakeholders will be satisfied to know you are even thinking about security around your IoT devices. IoT security has been neglected and too much trust has been offered to these devices. Being aware that smart devices pose new risks and being able to communicate how you are assessing those risks is probably a great starting point to reassure any kind of stakeholder.

What predictions do you have for IoT security in the next 3-5 years?

IoT use is already exploding in almost every industry. I believe the trust that consumers have offered to these devices is quickly fading away. Both product consumers and government regulators are increasing scrutiny of smart devices and new cybersecurity standards will be published very soon. The market appeal of selling verified secure products and the government drive to regulate security into the production of smart devices will help drive down the risk of using IoT. Product verification for cybersecurity threats, not just functionality or safety, will become a standard requirement to enter the market with a new IoT product. Consumers will not tolerate insecure devices existing on the market 3-5 years from now.

IoT Security

Dick Wilkinson

CTO, Supreme Court of New Mexico

Dick Wilkinson is the Co-founder and CTO of Proof Labs inc. He is also a retired Army Warrant Officer with 20 years of experience in the intelligence and cyber security field. He has led diverse technical missions ranging from satellite operations, combat field digital forensics, enterprise cybersecurity as well as cyber research for the Secretary of Defense.  


Subscribe to Our Monthly Blog Roundup

[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%26amp%3Boffset%3D0%22%7D” unique_id=”5e147370″ pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%2BPGFydGljbGUgY2xhc3M9InZjZS1wb3N0cy1ncmlkLWl0ZW0taW5uZXJ7e2N1c3RvbV9mZWF0dXJlZF9pbWFnZV9oYXNpbWFnZV9jbGFzc19uZXdzX3Bvc3RfZ3JpZF9pdGVtfX0iPjxkaXYgY2xhc3M9InZjZS1wb3N0LWRlc2NyaXB0aW9uIHZjZS1wb3N0LWRlc2NyaXB0aW9uLS10aXRsZS1jb2xvci1iLTQ3LTQ3LTQ3IHZjZS1wb3N0LWRlc2NyaXB0aW9uLS1leGNlcnB0LWNvbG9yLWItNDctNDctNDcgdmNlLXBvc3QtZGVzY3JpcHRpb24tLWF1dGhvci1jb2xvci1mZmNlMDAgdmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtY29sb3ItZDdkZmU0Ij48ZGl2IGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0taW1hZ2UiIHN0eWxlPSJiYWNrZ3JvdW5kLWltYWdlOnVybCh7e2ZlYXR1cmVkX2ltYWdlX3VybH19KSI%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij48L2E%2BPC9kaXY%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWNvbnRlbnQiPjxwIGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0tbWV0YSI%2BPHNwYW4%2BUG9zdGVkIDwvc3Bhbj48c3BhbiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtZGF0ZSI%2Bb24gPHRpbWUgZGF0ZXRpbWU9Int7cG9zdF9kYXRlX2dtdH19Ij57e3Bvc3RfZGF0ZX19IDwvdGltZT48L3NwYW4%2BPC9wPjxoMyBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLXRpdGxlIj48YSBocmVmPSJ7e3Bvc3RfcGVybWFsaW5rfX0iPnt7cG9zdF90aXRsZX19PC9hPjwvaDM%2Be3tzaW1wbGVfcG9zdF9kZXNjcmlwdGlvbl9leGNlcnB0fX08L2Rpdj48L2Rpdj48L2FydGljbGU%2BPC9kaXY%2B[/vcv_posts_grid]

Build Scalable and Flexible Networks with the mioty BLE Dual Stack

Leave a Reply