Internet of things or IoT is a term that is increasingly well-known in the digital era like today. The term IoT itself was first coined by Kevin Ashton, co-founder of the Auto-ID Center at MIT, in a presentation he made for Procter & Gamble (P&G) in 1999. However, long before Ashton expressed his idea, around the 1970s the term for connected devices already existed under the monikers that embedded the internet and broad computing. In an article published in Technopedia, it is explained that the Internet of things (IoT) is a computing concept that describes the idea of physical objects connected to the internet and able to identify other devices. However, in simple terms, the internet of things is connecting objects or devices to the internet.
How does IoT work?
In an article written by Alexander S. Gillis, it is stated that the IoT ecosystem consists of web-enabled smart devices that use embedded processors, sensors, and communication hardware to collect, send, and act on data they obtain from their environment. IoT devices share the sensor data they collect by connecting to an IoT gateway, where the data is sent to the cloud for analysis. Sometimes, these devices communicate with other devices and act on the information they get from each other.
As more and more IoT devices are created and present in our lives, there are many benefits that we can get. However, did you know that behind the convenience and benefits offered by these IoT devices, some of them can track the whereabouts and online activities of their users which can potentially refer to security risks. This is because IoT devices collect a lot of data that can potentially be hacked and misused in several ways. To anticipate the bad possibilities that will occur, it is important to secure Internet of Things (IoT) devices. The following are the methods quoted from an article written by Claudio Buttice in Techopedia.
- Think About IoT Security Before Buying a Device
The first way is before you buy a device, also think about its IoT security. This aims to avoid problems that may occur. So, always investigate or investigate the security and reputation of a device and system security before buying it. Ask questions like: does the device you purchased have a built-in PKI managed service? Is it TLS/SSL and encryption compliant? - Store Devices on a Separate Network
To avoid the threat of hackers who can steal your personal information, store devices on a separate network. This is because smart devices such as smart homes or smart kitchens are connected to the internet which can provide access to hackers to see our information easily. How to do it? You can set up multiple networks on multiple routers, and the more segmented, the more difficult it is for cybercriminals to gain access to you. - Protect Devices with Passwords
The next thing you should do is use a password to protect your devices, especially smart devices that go through a connected account or offline interface. Make sure to change your password often to keep it more secure. Combine uppercase letters, lowercase letters, symbols and numbers to make it more secure and remember not to use old passwords that have been used before. Also, don’t use one password for multiple accounts, especially email and social media accounts. - Update Firmware
The first way is to always update your firmware. What is firmware? Firmware is a software program or set of instructions programmed into a hardware device. Patches are released all the time to address potential vulnerabilities, so keeping your firmware up to date is essential. If automatic device updates are not available, there is another way, namely you can download and install the latest firmware from a trusted source. Download it from the official website directly from the device manufacturer. - Secure the Main Network
The next method can be said to be a backup plan that is no less important. Why? This is because if hackers can still enter your security system, make sure your sensitive data is protected by a bulletproof shield. So the most appropriate answer for this is a firewall. Not only does it help you keep hackers from reaching your network, but it can also prevent infected devices from sending your personal information back by rejecting unauthorized traffic. That’s how to secure Internet of Things devices. Don’t forget to visit the Netmonk website to get information about the right network monitoring technology, solutions and products for your company. Also get a free trial of Netmonk Basic as a network monitoring tool for your company.
References:
https://www.coursera.org/articles/internet-of-things
https://www.cisecurity.org/insights/blog/6-simple-tips-for-securing-iot-devices