IoT: The Nexus for Change
By Raymond Goh, Head of Systems Engineering, Asia & Japan, Veeam Software
Who can forget the Mirai attacks in 2016 which used IoT devices to attack internet infrastructure? The attack involved an estimated 100,000 malicious end points and resulted in downtime for numerous users – with some of them reportedly losing upwards of $300,000 to the botnet. While the worst of the Mirai attacks might be over, IoT security continues to be a pressing concern. Just two months ago, experts reported the Mirai source code continues to spawn botnet with the unchangeable code proving to be a robust foundation for future malware. Listed below are the major concerns currently present in IoT and ways in which these challenges can be overcome.
Inconsistency in Technical Advancements
IoT issues stem from the vulnerability of the collective technology as opposed to the individual. In the long run enterprises must develop end-to-end solutions, as hackers can use a single point method to penetrate an entire technology bundle.
In the long run, IoT will become the first level informer that will propel the intelligence over what should happen within the environment
It is imperative to integrate security into foundational processes. The best way to secure an IoT device, application or a network is to build security into the base. For example, when developers write code, you can write secure libraries for what they are using. This means security measures are baked into the device, which is far more effective than network firewall tools or assessment tools.
Standardization for Better Integration
Currently IoT needs standardization when it comes to how the different parts of the larger ecosystem should interact with each other. Large players use their internally developed solutions while smaller players utilize recondite standards which might not be universally applicable. To overcome this, governing bodies need to establish certifications which award minimum safety standards for component security, this must be the bedrock upon which platforms should be developed.
The Presence of Legacy Infrastructure
The more organizations look to increase the use of data generated by IoT, the greater the threat they will face in transferring and storing these vast volumes of data securely. Organizations need to find and actualize a system that is proficient in not just assembling the data but also extracting, inferring and then removing or archiving it at speed and scale. One way to solve the vast volume of data problems is a gradual approach. This means the first analytics stage takes place locally on the router, and if an anomaly is found, the relevant data is sent to the cloud for a thorough analysis.
IoT security should be treated as the foundation upon which enterprises should base themselves upon. However, beyond filling Protection Gaps, companies should also fill Availability Gaps. Only by doing so will enterprises be able to provide services without disruption and eliminate unplanned downtime – saving an average of $21.8 million per year.
In the long run IoT will become the first level informer that will propel the intelligence over what should happen within the environment, rather than being reliant on people. This will take a paradigm shift in outlook and confidence in leading edge technology.