Why the Internet of Things (IoT) is a Risk to Your Organization

The Internet of Things (IoT) is the connectivity and networking of devices and other items with network connectivity capability. This network connectivity allows the devices (things) to collect, transmit, analyze, and exchange data. The devices include hardware, software, data, and service and can be controlled and managed remotely across an existing network infrastructure.

There are three main sectors of use of IoT devices, enterprise, home, and government, with the Enterprise Internet of Things being the largest. Complex distributed computing and applications will result in a large number of devices connected to the Internet. The ability to connect devices with CPU, memory, and processing capabilities are a risk to your organization as these devices can perform actions, not just sense activity and actions.

A variety of communication technologies can be used to connect to devices to networks. These include Wi-Fi, Wi-Fi Direct (peer to peer without the need for a wireless access point), Bluetooth low energy, Light-Fidelity (uses light), wired Ethernet, and other technologies.

Internet of Things Risks

Many organizations adopt IoT devices without fully recognizing privacy issues, risks involved, security challenges, and regulatory requirements. Traditional security concepts (e.g. vulnerability management, patch management, change management, etc.) that apply to network infrastructures are not sufficient and need additional controls when implementing IoT devices.

To keep costs down, many IoT manufacturers do not embed enhanced security features in their devices.  As such, they may be subject to attacks on the device or the devices themselves could be used to launch attacks on other devices or the network.

IoT risks include:

Action Plan

Organizations should first prepare a formal Risk Assessment, Risk Analysis, and Risk Treatment Plan for IoT devices. Knowing the risks allows the organization to identify preventive, detective, and corrective security controls that mitigate or reduce risks to acceptable levels. The Risk Assessment also helps the organization implement defense in depth with layers of security instead of single points of failure.

Full disclosure is important and users should be aware of any data sharing that occurs.  In addition, in the event of a security breach, the organization must inform the individuals if their personally identifiable information (PII) is compromised.

Organizations should collect a minimum amount of user data required.  In addition, the data should only be retained for the time period required by the organization.

Formal and documented policies ensure a top down approach to managing risks.

Security Blog
verified If You Want a "Security Audit"
You Need a Certified Auditor.
Certified Information Systems Auditors

Unlike a security consultant, Altius IT is certified as a Certified Information Systems Auditor to perform a security audit of your environment and issue reports and recommendations to secure your systems. After your audit, Altius IT's Auditor Opinion Letter and Secure Seal let your clients and prospects know you meet security best practice/compliance requirements.

See our In the News page for video clips of our experts on national television as well as over 40 publications featuring Altius IT. In addition to our auditor certifications we hold many security, technical, and project management credentials. More information is available on our About Us page.

Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your information systems, applications, and network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets