We need to stop the Infiltration of Things

Connected devices that contain network sensors to allow for remote monitoring and control are expected to hit 75-billion devices installed by 2025.

These devices include everything from home routers, remote cameras to healthcare devices. This wide-ranging internet-of-things market includes industrial, consumer, banking, retail, manufacturing, healthcare and many more.

Now, this vast arrange of devices used globally has become the playground for hackers. Meaning that when a network-connected smoke detector starts communicating with the mail server, you know you have a problem.
IoT threats are on the rise and are transforming to penetrate various IoT devices as they are introduced to the market.

All these IoT devices are known as “dumb” devices and are built with a single, or limited purpose. They are designed to be easy to deploy, with minimal configuration and setup required, because of this the biggest vulnerability, lies within their design. This ease of use is this very same feature that allows malicious actors to take over any IoT device by utilizing malware like Mirai, Shishiga, Hajime, Okiru, and Torii.

All these malicious programs are used to take over these devices and transform them în botnets used for such things as Denial-of-Service attacks, spam and a variety of other crushing cyber plagues.
Remember everything can be hacked. In order to stay away from any threats related to the cyber world, we recommend the install of antivirus for Windows or antivirus for Mac on every device that you own, depending on which OS your device is running. If you are a company, it is also recommended to hire every year a specialized cybersecurity company that will run annual tests on your company’s network. These tests include penetration testing and ethical hacking tests;

Recently, hackers used a new IoT botnet that infected 100,000 home routers designed to send Hotmail, Outlook, and Yahoo spam.
Researchers predict that with the deployment of 5G, the cyberattacks leveraging IoT devices will only increase in size speed and impact.
Senator Mark Warner, the vice chairman of the Senate Select Intelligence Committee, is calling for U.S. agencies and Congress is one of the first representatives to introduce legislation to advance IoT security.
Last month Europol, and ENISA held an IoT security conference to discuss the problem with industry—and how to go about securing IoT before it’s too late.

Many manufacturers are not happy and still argue that requiring additional security for IoT devices will necessarily increase the cost of such devices.
A simple, easy first step to secure IoT devices is to use passwords. Passwords are often left to default which can be conveniently discovered by looking in the online documentation. Because the devices are easy to set up, users don’t often change these passwords, and, when connected to the internet, provide the door for hackers to enter their network.
Keep in mind that our modern society is dependent on computers, mobile devices, and the use of the internet always stay safe and secured.

We would continue to monitor the cybersecurity world. Meanwhile, users should keep a keen eye out for any cyber attacks. Remember to use an antivirus for Windows or antivirus for Mac in every device that you own, depending on which OS your machine is running, If you are a company we recommend to hire every year a specialized cybersecurity company that will run annual tests on your company’s network, tests like this include: penetration testing and ethical hacking.