π’Insecure networks
Many of today's IoT networks have security shortcomings, exposing the personal and sensitive data they collect.
For example, many consumer connected objects use low-speed radio protocols that are unsecured by default, such as Bluetooth Low Energy or ZigBee. Data is transmitted unencrypted, making it easy to intercept. Researchers have thus been able to hack into connected bracelets to track their wearers without their knowledge. Or suck out all the data from unsecured pacemakers. Even on cellular networks like NB-IoT, encryption is not always enabled, allowing data sniffing. The same applies to poorly configured WiFi networks. The centralized back-end servers on which data is stored represent another weak link. Their security is often neglected. Flaws are regularly discovered, as demonstrated by the hacking of 150,000 security cameras exposed on an unprotected server.
The consequences can be dramatic when medical, banking or privacy data is stolen. Reinforcing security is crucial to the development of the IoT.
Last updated