{"id":65623,"date":"2017-09-12T15:56:39","date_gmt":"2017-09-12T12:56:39","guid":{"rendered":"https:\/\/www.mywot.com\/en\/blog\/?p=65623"},"modified":"2025-01-07T12:01:04","modified_gmt":"2025-01-07T10:01:04","slug":"iot-network-risk","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/iot-network-risk","title":{"rendered":"IoT is Putting Your Network at Risk"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-65625\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/09\/Blog-Image-10.png\" alt=\"IoT devices are putting your network at risk\" width=\"800\" height=\"475\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/09\/Blog-Image-10.png 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/09\/Blog-Image-10-300x178.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/09\/Blog-Image-10-768x456.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>It\u2019s no secret that modern life is increasingly dominated by, and organized around, technology where pretty much everything is connected to the net. We increasingly depend on \u2014 and love \u2014 next-gen gadgets whose functionality depends on an internet connection. While the possibilities of such inventions are endless, they also pose challenges.<\/p>\n<p><strong>What\u2019s IoT?<\/strong><\/p>\n<p>The Internet of Things (aka IoT) is the fast-growing network of objects that are connected to the internet and are able to collect and exchange data using embedded sensors. The concept has attracted the biggest names in tech, from Apple to Samsung and everyone in between.<\/p>\n<p>We\u2019re talking everything from smart home IoTs (like voice-controlled thermostats); to wearables (the Apple Watch and others that enable everything from text messaging); Fitbit and Jawbone (that have revolutionized fitness); IoTs that could transform entire cities by solving real problems (traffic congestion, crime, pollution, noise reduction, etc.); to vehicles equipped with internet access that can be shared with others. Tech experts predict that everything from light bulbs to toasters will soon have internet functionalities!<\/p>\n<p><strong>IoT Vulnerabilities<\/strong><\/p>\n<p>As we all know, <a href=\"https:\/\/www.mywot.com\/blog\/category\/internet-security\">internet security<\/a> is a growing concern with the net being constantly hacked and cybercrime on the up-and-up. That means, because the very gadgets emerging rapidly are internet-dependent, they too are at risk of being hacked. The more technological and internet-connected we become, the more security problems we face. The truth is that most of the public is still unaware of this and of the fact that cybercriminals can not only take control of connected cars, for example, but are using everyday appliances to launch distributed denial of service (DDoS) attacks with disastrous consequences.<\/p>\n<p>The auto industry, for example, was quick to adopt the possibilities of IoTs, launching models with internet-enabled infotainment systems and hubs, and automated features such as traffic jam assist, adaptive cruise control, and automatic parking. This should mean less accidents, pollution, congestions and more productivity. However, last year, the FBI, US Department of Transportation, and National Highway Traffic and Safety Administration teamed up to increase <a href=\"https:\/\/www.mywot.com\/blog\/raise-security-awareness\">security awareness<\/a> and warn people about cyber security threats to these cars. They even had two hackers compromise the security of a car remotely taking over the steering wheel and applying the brakes. In reality this could threaten lives. These vehicles need adequate and advanced technology behind them to avoid breaches and to ensure security and safety.<\/p>\n<p>IoT-embracing cars are not the only targets. Cyber criminals are trying to exploit connected gadgets like webcams, Wi-Fi routers, wearables, and smart thermostats to launch wide-scale attacks on companies and organizations \u2014 as they would hack into computer systems. Hackers use Mirai malware (which ironically comprises hundreds of thousands of CCTV cameras, DVRs and SOHO routers unwittingly built by the very IoT manufacturers), to turn systems into botnets to inaugurate network compromises \u2014 they could even take out a city\u2019s smart connected lights. In fact, in September 2016, hackers used 152,000 consumer IoT devices to initiate a DDoS attack on OVH (French cloud computing company that offers VPS, dedicated servers and other web services). The hackers flooded the company with an incredible 1Tbps (a speed of one Terabit per second) of traffic, causing chaos for its global customer base.<\/p>\n<p><strong>Bottom Line<\/strong><\/p>\n<p>As with vulnerable computers or mobile phones, no IoT device is safe and most consumer-ready hardware is pretty easy to hack \u2014 especially home security systems, smart TVs, and baby cameras. Yet, consumers remain unaware and keep flocking to buy the latest connected gadgets.<\/p>\n<p>What makes them so vulnerable is that these devices come with unchanged default device passwords (and <a href=\"https:\/\/www.mywot.com\/blog\/password-leaks\">passwords are extremely easy to hack<\/a>), have infrequent updates, and poor security protocols. While consumers can do their part to up their devices\u2019 security (change default device credentials, modifying privacy settings, disable unused services, ensure firmware is up to date), organizations and manufactures need to develop safeguards to stop hackers whilst the IoT is still in its embryonic stages and before it burgeons bringing with it more complex and widespread security threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s no secret that modern life is increasingly dominated by, and organized around, technology where pretty much everything is connected to the net. We increasingly depend on \u2014 and love \u2014 next-gen gadgets whose functionality depends on an internet connection. While the possibilities of such inventions are endless, they also pose challenges. What\u2019s IoT? The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":65626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IoT is Putting Your Network at Risk | WOT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/iot-network-risk\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT is Putting Your Network at Risk | WOT\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/iot-network-risk\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-12T12:56:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T10:01:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/09\/Blog-Thumbnail-10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex at WOT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex at WOT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/iot-network-risk#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/iot-network-risk\"},\"author\":{\"name\":\"Alex at WOT\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\"},\"headline\":\"IoT is Putting Your Network at Risk\",\"datePublished\":\"2017-09-12T12:56:39+00:00\",\"dateModified\":\"2025-01-07T10:01:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/iot-network-risk\"},\"wordCount\":672,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Device Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/iot-network-risk#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/iot-network-risk\",\"url\":\"https:\/\/www.mywot.com\/blog\/iot-network-risk\",\"name\":\"IoT is Putting Your Network at Risk | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2017-09-12T12:56:39+00:00\",\"dateModified\":\"2025-01-07T10:01:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/iot-network-risk#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/iot-network-risk\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/iot-network-risk#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT is Putting Your Network at Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\",\"name\":\"Alex at WOT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"caption\":\"Alex at WOT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT is Putting Your Network at Risk | WOT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/iot-network-risk","og_locale":"en_US","og_type":"article","og_title":"IoT is Putting Your Network at Risk | WOT","og_url":"https:\/\/www.mywot.com\/blog\/iot-network-risk","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2017-09-12T12:56:39+00:00","article_modified_time":"2025-01-07T10:01:04+00:00","og_image":[{"width":400,"height":400,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/09\/Blog-Thumbnail-10.png","type":"image\/png"}],"author":"Alex at WOT","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Alex at WOT","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/iot-network-risk#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/iot-network-risk"},"author":{"name":"Alex at WOT","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9"},"headline":"IoT is Putting Your Network at Risk","datePublished":"2017-09-12T12:56:39+00:00","dateModified":"2025-01-07T10:01:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/iot-network-risk"},"wordCount":672,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Device Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/iot-network-risk#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/iot-network-risk","url":"https:\/\/www.mywot.com\/blog\/iot-network-risk","name":"IoT is Putting Your Network at Risk | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2017-09-12T12:56:39+00:00","dateModified":"2025-01-07T10:01:04+00:00","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/iot-network-risk#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/iot-network-risk"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/iot-network-risk#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"IoT is Putting Your Network at Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9","name":"Alex at WOT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","caption":"Alex at WOT"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65623"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=65623"}],"version-history":[{"count":5,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65623\/revisions"}],"predecessor-version":[{"id":68109,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65623\/revisions\/68109"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/65626"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=65623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=65623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=65623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}