Mobile Magazine September 2020 | Page 78

IOT MOBILE
78

“ IoT security will be complicated by the fact that many ‘ things ’ use simple processors and operating systems that may not support sophisticated security approaches ”

— Professor Ahmed Banafa
from both information attacks and physical tampering , to encrypt their communications , and to address new challenges such as impersonating ‘ things ’ or denial-of-sleep attacks that drain batteries , to denial-of-service attack ( DoS ). But IoT security will be complicated by the fact that many ‘ things ’ use simple processors and operating systems that may not support sophisticated security approaches .”
IoT devices have already been proven to represent a critical vulnerability in many enterprise and personal networks . The ongoing COVID-19 pandemic is only exacerbating the issue , as an unprecedented number of people around the world switch to personal devices to access enterprise systems as part of remote working initiatives . More and more people are connecting personal IoT devices like fitness monitors , smart watches and speakers , and more to their enterprise networks , which then renders those networks vulnerable to attack . In the last year alone , 46 % of organisations surveyed by cybersecurity firm Infoblox found devices connected to their network that the IT department was not aware of . These “ shadow IoT devices ”
SEPTEMBER 2020