Internet of Things and new challenges related to cybersecurity

Companies turn to startups focused on the Internet of Things (IoT) to meet new security challenges.

Internet of Things and new challenges related to cybersecurity
00:00 00:00

Summary

  • The Internet of Things (IoT) is a network of physical objects equipped with sensors, software, and other technologies for connecting and exchanging data over the Internet. Currently, there are over 15.4 billion devices connected to the IoT, expected to increase to over 29 billion by 2030.
  • With the growth of IoT networks, the number of associated threats is also increasing. For instance, during the war in Ukraine, Russian special services hacked cameras in residential complexes and cafes to gather intelligence.
  • New threats are emerging with the introduction of edge processing and advanced 5G network features like Reduced-Capability (RedCap) 5G, designed to accelerate IoT adoption in enterprises.
  • RedCap 5G allows mobile devices to serve as hubs providing connectivity with nearby devices with limited capabilities. However, poorly secured mobile devices can expose these devices to threats, including Stuxnet-style malicious software that can cause machine self-destruction.
  • According to IDC analyst Jason Leigh, the increase in endpoints means hackers have a larger attack surface to exploit, and security teams have to manage a significantly larger number of threats.
  • Leigh suggests that limited devices make it difficult for complex malicious software to penetrate, and new network specifications contain detailed information about security components that can be implemented at the network level to reduce risk.
  • In the future, IoT security will be a complex problem without a simple solution from a single provider. Organizations should strengthen protection with existing providers and leverage these providers' partner ecosystems to increase the overall level of security.

Internet of Things, (Internet of Things, IoT) is a network of physical objects that are equipped with sensors, software, and other technologies for connecting and exchanging data with other devices and systems over the Internet. These networks include both ordinary household items and advanced industrial tools. Currently, there are over 15.4 billion devices connected to IoT, and experts expect this number to increase to over 29 billion by 2030.

However, with the growing IoT networks, the number of threats associated with them is also increasing. One of the most notorious examples of an attack using the Internet of Things took place during the ongoing war in Ukraine. Russian special services hacked cameras in residential complexes and cafes to monitor neighboring streets, gather intelligence about Ukrainian citizens, and monitor convoys with aid.

New threats associated with the Internet of Things

Although the above incidents are disturbing, IoT security threats can become even greater when edge processing enters the mainstream and advanced 5G networks introduce features such as Reduced-Capability (RedCap) 5G, which are designed to accelerate the adoption of IoT in enterprises.

Thanks to RedCap 5G, mobile devices with cellular connections, such as smartphones and watches, will be able to serve as hubs that provide connectivity with nearby devices with limited capabilities. Although this may help streamline workflows and ensure business performance, poorly secured mobile devices that automatically connect, for example, with industrial equipment for diagnostics, can also expose these devices to threats. Among them, Stuxnet-style malicious software, which can cause machine self-destruction, is most often mentioned.

– The greater number of endpoints also means that hackers have a larger attack surface to exploit, and security teams have to manage a significantly larger number of threats – said IDC analyst Jason Leigh.

However, there is a certain rescue that can limit the risk associated with IoT.

– With limited devices, it is difficult for complex malicious software to get through them. In addition, new network specifications [such as 5.5G] contain detailed information about security components that can be implemented at the network level to reduce risk – added Leigh.

In the foreseeable future, IoT security, like the IoT market in general, will be a complex problem without a simple solution from a single provider. Organizations should strengthen protection with existing providers, and then leverage these providers' partner ecosystems to increase the overall level of security.