IoT devices pose uniquely terrifying security threats. Just ask a Waterbury, Connecticut, family who was awakened and harassed by hackers accessing their Ring security cameras.
As part of their coverage of this incident, WFSB Channel 3 news asked Kelser to offer some insight into how hackers may have gotten access, and what can be done to secure IoT devices.
After this hack and others like it, Ring denied a data breach saying only the individual accounts had been breached, likely due to password reuse. However, it now appears there potentially was a small breach that could have led to these incidents. While Ring’s security features may not be as strong as they should be, there are best practices for both businesses and consumers when it comes to preventing breaches of internet-of-things devices.
Anytime an internet-enabled device is connected to your network—whether it’s a security camera, a TV, a thermostat, a printer, or another smart device—it creates a potential doorway for hackers. It’s important to implement cybersecurity best practices for each device such as:
It’s shocking that many consumer and small business routers in the US are unsecured. They arrive from the factory with default settings such as a password of “admin” and are simply never changed. Even if hackers can’t access your Ring account because you have 2FA enabled, if your network is wide open, that’s potentially even worse.
Having a secure network with, at the very least, a secure password, but also ideally a firewall and software like OpenDNS to monitor for malicious activity, is essential if you are going to use IoT devices. Without a secure network, smart devices allow hackers not just access to your data, but access to your home or office.
While having your home security camera accessed by hackers is extremely unnerving, consumers don’t have the potential for IoT disasters that businesses do. The Ring hacks in Connecticut and elsewhere already seem like something out of sci-fi. It’s not hard to imagine what destruction can be wrought by hackers who gain access to industrial or medical equipment.
The recent Ring hacks illustrate how easy it is to overlook IoT security. As a rule of thumb for businesses, if you have IoT, you need an MSP. When we begin working with a new client as a managed service provider (or MSP), one of the first things we look at is any IoT devices and potential vulnerabilities they may present.