An Evolution of IoT Security Issues
September 16, 2019 by Jon O'Keefe

We have seen a boom in the world of the Internet of Things in the last few years – which means we have also seen an increase in security issues with said devices and networks. As we slowly transition into a world of total interconnectivity through these smart devices in our homes, offices, cars, and nearly every aspect of our lives, how can we keep things secure?

When your smartphone is talking to your refrigerator and your smart watch is talking to the office network, what kind of threats have we already begun to see? What can we expect in the near future of the Internet of Things and what should we do?


  • Things could get physical. – When it comes to most tech devices, you normally only have to make cybersecurity the top priority. With the interconnectivity of physical devices within the Internet of Things, physical security may also be threated over time. For example, cybercriminals could use your devices to hack into your home electronics, break into your internet-connected alarm system, and cause in-person problems. Items such as baby monitors, remote vehicles, and even microwaves could be turned against you.
  • Networks are the weakest link. – Network vulnerabilities and the ability to access them without ever touching a physical device has always been a risk that comes along with an Internet-connected device, but Internet of Things networks are especially vulnerable. Users and corporations utilizing such devices should consider using a VPN or even stronger security measures to ensure that their networks are as secure as possible to prevent a cyberattack. Devices that have been highjacked could be turned into botnets by hackers with the intention of distributing DDoS (denial-of-service) cyberattacks.
  • A need for encryption and better protection. – The transmission of data between devices is certainly a weak point of the IoT. Cybercriminals can collect data while it is being sent between your connected devices or collect it to reroute data for transmission to an illegal third party. Either way, your information could be easily taken advantage of when encryption is not made a priority.
  • Cloud servers will encounter issues. – Internet of Things devices leave many open ports to servers, which means more vulnerable spots for hackers to take advantage of. Said hackers an also overload servers with fake requests to make them totally nonfunctional. Corporate offices should make the security of their cloud services a top priority to be able to fend of cloud-based attacks on the company’s private data.


What could be next as the Internet of Things continues to grow in both popularity in the common household and business? What will we need to look out for as cybercriminals continue to grow more sophisticated in their attacks on IoT devices and networks? Let us know what you think down below.