internet of things

The Internet of Things is going to be a point of focus for network security professionals in the coming years.

The Internet of Things (IoT) is something we have previously discussed in terms of computer forensics. This complex and diverse network of little devices known simply as the Internet of Things, is becoming more and more prevalent not only in American homes, but also in American business. The challenge of securing the Internet of Things is ongoing, but today we will be addressing what makes the IoT so vulnerable and what you can do to help keep yourself protected. Let’s take a look.

What makes the IoT so vulnerable?

The IoT is a very diverse group of devices. Securing a diverse group of devices isn’t always a straightforward process. The reason for this is because different “Smart” devices have different capabilities in terms of software application. What we mean by this is that some items within the Internet of Things do not have the processing power to utilize security software available to some more sophisticated items like computers or tablets. Another challenge is that there are many different devices with many different operating systems, each of which need their own set of security solutions.

What could go wrong with the Internet of Things?

Let’s take a wi-fi enabled thermostat, for example. The thermostat might display the internal temperature as well as a weather update. Seems harmless enough, and hackers certainly wouldn’t be interested in this information. However, the thermostat doesn’t have any type of security software installed on it. Therefore, a hacker can access the device via a web browser and obtain access to the network. Through network access, the hacker could then obtain all configuration information and then closely monitor the network, the very same network that you do all of your banking on. Back in 2014, the retail giant, Target had their credit card data stolen through the use of a remotely accessible HVAC system. As the IoT continues to change and grow, we need developers to continue to grow with it. For now, exercise caution when you set up a new device within your wireless network.


If you need the help of an experienced computer forensics experts, contact the team at Atlantic Data Forensicstoday. To find out more about how we can help in your data recovery, cybercrime, or e-discovery needs or if you need trusted expert testimony, simply request a consultation and we will be in touch.

Don’t forget to keep up with our weekly blog for advice and information on how to prevent being the victim of cybercrime. You can follow us on TwitterGoogle+, and LinkedIn too.