Security and privacy
Internet of Things and new challenges related to cybersecurity
Companies turn to startups focused on the Internet of Things (IoT) to meet new security challenges.
Internet of Things, (Internet of Things, IoT) is a network of physical objects that are equipped with sensors, software, and other technologies for connecting and exchanging data with other devices and systems over the Internet. These networks include both ordinary household items and advanced industrial tools. Currently, there are over 15.4 billion devices connected to IoT, and experts expect this number to increase to over 29 billion by 2030.
However, with the growing IoT networks, the number of threats associated with them is also increasing. One of the most notorious examples of an attack using the Internet of Things took place during the ongoing war in Ukraine. Russian special services hacked cameras in residential complexes and cafes to monitor neighboring streets, gather intelligence about Ukrainian citizens, and monitor convoys with aid.
New threats associated with the Internet of Things
Although the above incidents are disturbing, IoT security threats can become even greater when edge processing enters the mainstream and advanced 5G networks introduce features such as Reduced-Capability (RedCap) 5G, which are designed to accelerate the adoption of IoT in enterprises.
Thanks to RedCap 5G, mobile devices with cellular connections, such as smartphones and watches, will be able to serve as hubs that provide connectivity with nearby devices with limited capabilities. Although this may help streamline workflows and ensure business performance, poorly secured mobile devices that automatically connect, for example, with industrial equipment for diagnostics, can also expose these devices to threats. Among them, Stuxnet-style malicious software, which can cause machine self-destruction, is most often mentioned.
– The greater number of endpoints also means that hackers have a larger attack surface to exploit, and security teams have to manage a significantly larger number of threats – said IDC analyst Jason Leigh.
However, there is a certain rescue that can limit the risk associated with IoT.
– With limited devices, it is difficult for complex malicious software to get through them. In addition, new network specifications [such as 5.5G] contain detailed information about security components that can be implemented at the network level to reduce risk – added Leigh.
In the foreseeable future, IoT security, like the IoT market in general, will be a complex problem without a simple solution from a single provider. Organizations should strengthen protection with existing providers, and then leverage these providers' partner ecosystems to increase the overall level of security.