{"id":868,"date":"2015-11-17T16:22:41","date_gmt":"2015-11-17T13:22:41","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=868"},"modified":"2019-06-10T14:32:51","modified_gmt":"2019-06-10T11:32:51","slug":"how-to-make-the-internet-of-things-safe","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/how-to-make-the-internet-of-things-safe\/","title":{"rendered":"How to Make the Internet of Things Safe"},"content":{"rendered":"<p>In recent years, the Internet of Things has been developing rapidly. Today, not only computers and smartphones can access the network. Many kinds of home appliances, including refrigerators and washing machines, are also connected to the World Wide Web.<\/p>\n<p>The idea of such devices is certainly good: Internet connection allows you to manage them even at a considerable distance. It\u2019s comfortable to use a smartphone on your way home to \u2018order\u2019 the microwave to warm up dinner for your arrival and coffee machine \u2013 to make a cup of refreshing beverage.<\/p>\n<p>But such innovations also have a downside. Every network communication attracts hackers with new viruses attempting to take over other people&#8217;s secrets.<\/p>\n<h2>Is the modern Internet of Things safe?<\/h2>\n<p>In the case of computers and smartphones, data protection is one of the main concerns of developers and device manufacturers. But the security of the Internet of Things is obviously not up to par.<\/p>\n<p>Here are some facts proving this:<\/p>\n<ul>\n<li>Not long ago, HP has conducted a research of ten home video surveillance systems from different manufacturers, and only one used two-factor authentication to gain access to the system! All these systems had other serious security breaches: from the absence of blocking after repeated incorrect password entering &#8211; to the possibility of watching streaming video from cameras without authentication.<\/li>\n<li>During this year\u2019s experiment, a <a href=\"https:\/\/www.protectimus.com\/blog\/automotive-security-review-board\/\">Jeep Cherokee was brought under control<\/a> by a simple netbook while moving on the highway. The person who controlled the car remotely could turn the cooling on maximum and turn on the wipers, as well as change the radio wave. The attempts by a driver, who participated in the experiment, to cancel these orders manually were of no success. Later, during a test in the garage, the researchers distantly blocked jeep wheels. Had it happened on the track, it would lead to a serious accident and even death.<\/li>\n<li>Samsung TVs with Smart TV function are capable not only to collect data about the user\u2019s behavior but also to send this information to the third person.<\/li>\n<li>An example that at first glance seems absurd. Trojan viruses written specifically for the coffee machine were detected.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4675 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/the-internet-of-things-1.jpg\" alt=\"The Internet of Things\" width=\"1940\" height=\"1248\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/the-internet-of-things-1.jpg 1940w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/the-internet-of-things-1-300x193.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/the-internet-of-things-1-768x494.jpg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/the-internet-of-things-1-1024x659.jpg 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/the-internet-of-things-1-610x392.jpg 610w\" sizes=\"auto, (max-width: 1940px) 100vw, 1940px\" \/><\/p>\n<p>Just a few years ago, such stories existed only on the pages of science fiction novels. Nowadays, they have ceased to be the fruit of creative people\u2019s imagination and moved to the subjects of news feeds.<\/p>\n<p>Do manufacturers of &#8220;smart&#8221; things know about the serious problems with data protection in their devices? Of course, they do! But at the current stage of Internet of Things development manufacturers give preference to the introduction of new functions and to the speed with which the items are brought to the market. Thus, they don\u2019t care about security, which requires a large investment and does not bring quick profit.<\/p>\n<p>Customers also rarely think about the dangers lurking in the Internet of Things and often do not even use the available protection means. The temptation to seize new opportunities prevails over the caution.<\/p>\n<h2>How to protect the Internet of Things against hacking<\/h2>\n<p>In reality, the IoT (Internet of Things) security doesn\u2019t need much to cover most of the \u2018holes\u2019. It needs only reliable means of user authentication. A simple 2-factor authentication will not allow an unauthorized person to get access to the remote control of cars, cameras, refrigerators or other devices.<\/p>\n<p>Usual static password even the most complex one is not enough for reliable authentication. That is why two-factor authentication using the one-time passwords comes to aid. It\u2019s possible to get one-time passwords not only via SMS. There are more reliable and modern tools for one-time passwords generation. We talk about tokens, which can be both hardware and software.<\/p>\n<p>There are different types of tokens and you can choose the most convenient for you. For example, <a href=\"https:\/\/www.protectimus.com\/\">Protectimus<\/a> offers three types of hardware tokens &#8211; Slim, Ultra, and One. Besides, there is a free Protectimus Smart application, which can be installed on a smartphone or tablet.<\/p>\n<p>For further user protection, in certain cases the two-factor authentication can be supplemented with <a href=\"https:\/\/www.protectimus.com\/blog\/biometric-authentication-pros-and-cons\/\">biometric components<\/a>. Fingerprint scanning is one of the most common and available today. This function is already supported by Apple smartphones and tablets. And it is being introduced to a growing number of Android gadgets.<\/p>\n<p>Modern multifactor authentication tools can provide reliable protection when using the Internet of Things. People can enjoy convenience from \u2018smart\u2019 devices rather than problems. A bit of time spent on the two-factor authentication \u2013 is it such a big price for security?<\/p>\n<p>Picture\u00a0by: www.shutterstock.com<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>In recent years, the Internet of Things has been developing rapidly. Today, not only computers and smartphones can access the network. Many kinds of home appliances, including refrigerators and washing machines, are also connected to the World Wide Web. The idea of such devices is certainly good: Internet connection allows you to manage them even [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4523,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7,15],"tags":[16,166,200,120,99],"class_list":["post-868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","category-rd","tag-2fa","tag-hacking-attacks","tag-internet-of-things","tag-multifactor-authentication","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=868"}],"version-history":[{"count":5,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/868\/revisions"}],"predecessor-version":[{"id":4676,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/868\/revisions\/4676"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4523"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}