Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • IoT Devices in Different Industries and How to Secure Them
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

IoT Devices in Different Industries and How to Secure Them

6 years ago Tripwire Guest Authors
IoT Devices in Different Industries and How to Secure Them

Today, data analytics, automation, connectivity, and remote monitoring have made great progress and have brought innovations in every sphere of modern civilization.

The digitization in day-to-day human activities has been revolutionized by the Internet of Things (IoT). Based on Gartner’s Forecast database, we can expect that there will be approximately 14 billion devices connected to the internet by 2022. With more devices connected, it will change the way we do business and use resources.

For example, monitoring the cows on a farm can help farmers obtain health reports and plan more efficient feeding strategies. Also, being able to track the behavior of complex industrial machinery enables organizations to prevent accidents and shorten the downtime for maintenance.

There are many examples of how IoT is facilitating human activities. All kinds of devices can gather and share information from their environment. A world where all things are connected will potentially bring endless opportunities for most human activities.

In this blog, we are going to walk through the impact of IoT on some of these different industries.

Manufacturing

IoT has enabled smart manufacturing that increases safety, improves performance and services as well as reduces time and cost. It has been a driving force behind the industry 4.0 movement. Efficient data collection, enhanced automation, and analytics are all possible with the help of IoT.

With a large variety of IoT devices, manufacturing units are able to leverage their workflow more efficiently and accurately. For example, companies are tracking assets, collecting data, and performing analytics using IoT sensors placed in equipment and devices. These sensors monitor the functioning of equipment to allow automated recovery and to shorten downtime in maintenance. According to statistics by The Atlantic, it is expected that the investment in IoT solutions by international companies will exceed $70 billion by the end of 2020. Many other statistical reports are indicating that IoT technology has a huge potential for manufacturing and that the manufacturing industry has been the sector most impacted by IoT in the last few years.

IoT is important in the manufacturing industry because it automates operations. The operational technology in a smart factory includes programmable logic controllers, industrial IoT devices (IIoT), distributed control systems, embedded systems, and more.

Collectively, these systems can multiply the risk of potential cyber threats. For instance, the Cybersecurity and Infrastructure Security Agency (CISA) listed more than 1200 OT system-related vulnerabilities. These issues came from more than 300 OEMs (Original Equipment Manufacturers).

The root cause of the proliferation of these cyber threats is that areas like OT and IT are often not synced with security strategies.

Here are the key security strategies for building a sound manufacturing cybersecurity program:

  • Perform a cybersecurity maturity assessment

A cybersecurity assessment model provides a path forward and helps organizations to better understand where they are along that path. It helps organizations to improve their cybersecurity efforts and communicate with upper-level management to get the required support. According to an article published in Forbes, the Cybersecurity Capability Maturity Model (C2M2) and the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) are two of many models recommended to choose from, each provides a wider approach that covers everything in cybersecurity.

  • Prioritize actions based on the risk profile.

It is important for organizations to identify risks by using CSRF Analysis (Cybersecurity Risk Framework). There are several CSRFs such as OCTAVE, NIST, ISO, and more. Organizations can follow different approaches for risk assessment, one of the best models is created by Radanlive et.al. is designed to capture IoT cyber risks

  • Built-in security.

Consider buying devices that offer built-in security from cyber-attacks. There is a large number of devices available without any security assurance. For example, a light bulb has a star-based rating system on its back for its energy efficiency, there should be the same rating system for its built-in security measures. Underwriter laboratory, the electronic safety organization, has introduced security ratings for IoT devices.

Agriculture

IoT technology is driving the agriculture industry toward a new revolution. It’s yielding information into soil moisture, chemical applications, livestock health, and more. This information allows farmers to track farm operations in real-time and make better informed decisions on improving farm productivity and performing preventive maintenance. IoT-based farming helps farmers across the globe to increase productivity and maximize their resources. The advancement in farming with the help of IoT technology will help farmers to match their production with the ever-increasing demand for food.

  • Cybersecurity for smart farming devices:

There have been massive integrations of insecure IoT devices in the agriculture industry. Mitigation of cybersecurity risk is not the primary interest of farmers in most of the cases. In order to mitigate the cybersecurity risk, each piece of connected farming equipment must pass through a certification process. IoT devices used in agriculture are no different than devices being used in other industries such as healthcare and manufacturing, and cyber threats in smart farming devices are equally hazardous. Certification will stop the impediments of contracts and privacy violations. Due to the wide adoption of precision farming culture, there is a proliferation of IoT devices in farming. Farmers and growers are required to shift focus towards the mitigation of possible cyberattacks, which has never been their primary goal.

Healthcare

IoT has removed complexity as a barrier for caregivers and patients by enabling healthcare services in hospitals, at home, offices, and in travel.

According to 46% of respondents in the healthcare sector, audio devices and mobile phones are the most essential devices for providing better healthcare services. According to the study, 57% of caregivers utilize visual analytics to improve the level of personalized treatment and healthcare services generally. For example, with the help of IoT solutions such as real-time remote health monitoring devices, wearable smart pills, diabetes management systems, and more, it has become easier and more efficient to monitor a patient’s health conditions and make treatment decisions. From health management through smartwatches to post-cancer care, IoT is impacting healthcare in all directions.

Due to the use of advanced technologies and devices, the vulnerability and risk of cyberattacks increases meaning that the healthcare industry faces a number of cyber risks. IBM listed out various cyberattacks witnessed by the healthcare industry in the past years.

Here are four cybersecurity risk mitigation strategies for IoT devices recommended by NIST (National Institute of Standards and Technology):

  1. It is important for healthcare providers to maintain accurate inventories of IoT devices throughout the devices’ lifecycle.
  2. Healthcare institutions should invest in reviewing software and firmware to find vulnerabilities.
  3. It is crucial to adopt access management policies for the use or administration of IoT devices in order to prevent unauthorized access.
  4. IoT devices need to be continuously monitored to trace potential security incidents and unusual activities.

Transportation

IoT technology is uniquely positioned to provide sets of solutions that help the transportation industry. For example, through IoT-based safety solutions, vehicles can communicate any incoming accidents and bad weather conditions.

The United States Department of Transportation (USDOT) has the goal of using IoT safety solutions to reduce car accidents by 80%. IoT solutions can help to track incoming traffic delays in the current route and suggest better routes, for instance. At the same time, vehicle maintenance solutions can help to track the vehicle’s health in real-time to ensure it’s fully functioning. Geo-fencing helps to create virtual fences and parameters around a certain point of interest; it helps logistics managers to receive shipment updates. Many IoT solutions help the transportation industry to perform more efficiently and accurately.

Cyber attacks and data breaches in the transportation system can lead to greater loss. Therefore, it’s important that organizations consider deploying cybersecurity in an IoT-enabled smart transportation ecosystem. In a recent survey of 125 businesses in the industry, 64% of respondents reported that their inner process to mitigate cybersecurity risks could be stronger, while 66% expressed that more could be done to protect against data mishandling. It is important to follow the “security by design” principle more widely in every stage of the designing process and to implement new solutions, risk assessment, and mitigation strategy at every stage.

Read more: Transportation Systems Cyber-security is a Major Concern

Energy Industry

IoT helps the energy industry to make use of green energy. Green energy devices that are connected with IoT, have removed human intervention to a large extent. Additionally, energy providers are using smart meters to track information about the usage of both green and non-renewable energy. This makes it easier to prioritize the production and delivery of non-renewable and green energy.

As IoT expands in the energy and utility industry, it increases the risk of cyberattacks in the system. Industry leaders see cyber threats as one of the major threats in the industry. If there are 1000 smart meters, that’s 1000 potential entry points to hack the system. The use of third-party service providers opens the door even wider.

Some key precautions industries can take against IoT cyber attacks

  • Changing the default setting

Generally, IoT devices come with default settings including a standard username, password, and more. Most of the time, device default settings benefit hackers to get access to the devices. For hacking devices, hackers try to guess the default names, IDs, and device internal settings, it is important to customize the settings and prevent it from being easily guessed.

  • Securing password with two-factor authentication (2FA)

It is important to use two-factor authentication for accessing the device because it works as an extra security layer. As the 2FA process requires the user to submit OTP (one-time-password) to grant access to the device which is system generated and presented to the user in a confidential way. It protects the system from unauthorized access and reduces its vulnerability to cyber-attacks. It is recommended to set a strong password with a unique combination of numbers, symbols, uppercase letters, and lowercase letters.

  • Disabling UPnP feature

UPnP (Universal Plug and Play) feature allows any IoT device to connect with other devices. For example, a smart bulb can be connected to voice-command-based devices such as Google Home and Alexa. It is important to disable the UPnP feature so that an attacker cannot get access to other systems should they succeed in hacking one device.

  • Updating devices regularly

Many manufacturers of IoT devices release security features to protect the user’s privacy from cyber attacks. Users need to update the device regularly to protect their data from ever-evolving cyber-attack patterns if and when an update for their device is made available.

  • Avoid using public WiFi networks

If you manage your IoT device remotely through a smartphone or other device, it is recommended that you avoid using public WiFi networks. To avoid the vulnerability to cyber-attack that using public WiFi networks can pose, you can make use of a VPN. There are VPN service providers that offer several security features for the public and to home WiFi networks.

Final Thoughts

As the technology matures and vendors compete, solutions become more refined and better. IoT technology will continue to drive changes in a variety of industries over the next decade. Businesses with a better understanding of the potential of IoT will be well-positioned to reap their benefit in the future. Based on statistics, it is expected that the global IoT market will exceed the value of USD 1250 billion by 2025 up from USD 690 billion in 2019 at a CAGR of 10.53% between 2020 and 2025. As it is mandatory to adopt the changes, every industry needs to be focused on utilizing the potential of IoT technology to stay relevant in their business.


About the Author: Piyush Jain is the founder and CEO of Simpalm, an app development company in Chicago. Piyush founded Simpalm in 2009 and has grown it to be a leading mobile and web Development Company in the DMV area. With a Ph.D. from Johns Hopkins and a strong background in technology and entrepreneurship, Jain understands how to solve problems using technology. Under Jain’s leadership, Simpalm has delivered 300+ mobile apps and web solutions to clients in startups, enterprises, and the federal sector.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” IoT Devices in Different Industries and How to Secure Them” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Compliance, Finance, Google, Privacy, TripWire

Continue Reading

Previous Four More Bugs Patched in Microsoft’s Azure Sphere IoT Platform
Next Supply Chain Risk Management – What You Need to Know to Build a Successful SCRM Program

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware

Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

1 hour ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

15 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

18 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

22 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

23 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover

23 hours ago [email protected] (The Hacker News)

Recent Posts

  • Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
  • Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
  • Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure
  • Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
  • The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT