{"id":11577,"date":"2016-03-17T09:00:43","date_gmt":"2016-03-17T13:00:43","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=11577"},"modified":"2017-09-24T11:19:40","modified_gmt":"2017-09-24T15:19:40","slug":"iot-state-of-mind","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/iot-state-of-mind\/11577\/","title":{"rendered":"Changing the security mindset for the IoT"},"content":{"rendered":"<p>When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something that users typically swap out every two years and automobile manufacturers will look at car buyers trading in their car every five or so years.<\/p>\n<p>The problem with this though is that humans don\u2019t act the way these types of purchasing patterns presuppose. One would only need to look at a used car dealership or peruse eBay to find an aftermarket for cars or phones. Ok, eBay is enough for both.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/03\/06022702\/rsa2016-iot-mindset-FB.jpg\" rel=\"attachment wp-att-11580\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/03\/06022702\/rsa2016-iot-mindset-FB.jpg\" alt=\"Changing the security mindset for the IoT\" width=\"1280\" height=\"1280\" class=\"aligncenter size-full wp-image-11580\"><\/a><\/p>\n<p>This secondary sales market is also something that is going to become more important for manufacturers to think about as the IoT grows. Why you ask? Since many devices have a finite timeline in a company\u2019s sell-sheet, they are not supported after their \u2018expiration\u2019 date, and usually, that\u2019s exactly the time when they bypass the trash and head straight to the aftermarket.<\/p>\n<p>Chances are that those who buy these IoT devices from their previous owners could very well end up with something that\u2019s not longer protected from any vulnerabilities that would be found afterwards. And there certainly would be a lot of those vulnerabilities, as both white hat and black hat hackers are constantly searching for them.<\/p>\n<p>We have already seen many devices connected to the Internet fall susceptible to a hack due to software that is used to connect to the web, which ironically is also past it\u2019s prime. Items compromised range from <a href=\"https:\/\/www.kaspersky.com.au\/blog\/kid-safety-iot\/11066\/\" target=\"_blank\" rel=\"noopener\">baby monitors<\/a> to <a href=\"https:\/\/www.kaspersky.com.au\/blog\/air-conditioner-hack\/11348\/\" target=\"_blank\" rel=\"noopener\">air conditioners<\/a> to <a href=\"https:\/\/www.kaspersky.com.au\/blog\/blackhat-jeep-cherokee-hack-explained\/9493\/\" target=\"_blank\" rel=\"noopener\">automobiles<\/a>. Sadly if something connects to the web, it can be hacked. And there are <a href=\"https:\/\/www.kaspersky.com.au\/blog\/shodan-censys\/11430\/\" target=\"_blank\" rel=\"noopener\">IoT search engines<\/a> to make it happen faster.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">When hacking air conditioners leads to blackout <a href=\"https:\/\/t.co\/LSxYAgBSI2\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/LSxYAgBSI2<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/t.co\/LSxYAgBSI2\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/LSxYAgBSI2<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/t.co\/5koCkAcwGb\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/5koCkAcwGb<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/700348656717799425?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 18, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Overall, we also know that cybersecurity usually comes last when companies plan out their products and find ways to make them connected. Something has to give, right?<\/p>\n<p>According to Todd Inskeep of Booz Allen Hamilton, companies need to start looking at building trust when it comes to these devices and their connectivity. At this year\u2019s RSA Conference, he gave a presentation entitled <i>Cyber Wars: The Trust Awakens<\/i>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/03\/06022705\/Screen-Shot-2016-03-11-at-2.22.02-PM-1.png\" rel=\"attachment wp-att-11578\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/03\/06022705\/Screen-Shot-2016-03-11-at-2.22.02-PM-1.png\" alt=\"Changing the security mindset for the IoT\" width=\"939\" height=\"529\" class=\"aligncenter size-full wp-image-11578\"><\/a><\/p>\n<p>During the talk, he discussed the need for a fundamental shift in product development. All stakeholders should be involved in this shift, from concept to R&amp;D to marketing and sales, along with everyone in between. The reason for this is that without accounting for the worst case, should it happen, you lose customer trust.<\/p>\n<p>In theory, companies would operate similar to the military, which prepares in advance for all of the scenarios that can play out. They also operate systematically with their process. To put it into marketing speak, their brand is operating as a cohesive unit. Also, many of the mantras of the branches of the military are pretty engrained into the memories of most Americans.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Medicine under fire: how to hack a hospital <a href=\"https:\/\/t.co\/QcmY3IlWGR\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/QcmY3IlWGR<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Healthcare?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Healthcare<\/a>  <a href=\"https:\/\/twitter.com\/hashtag\/medicalsec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#medicalsec<\/a> <a href=\"https:\/\/t.co\/Cil0ueabag\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Cil0ueabag<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/697813032647467008?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>While change is something that we can all agree needs to happen with companies thinking of security, let\u2019s be honest \u2014 it could take a long time. So what can you do?<\/p>\n<p>When it comes to looking at purchases, you will always have choices as to what suits your need for a given moment. For connected devices, I\u2019d implore you to ask yourself the following questions:<\/p>\n<ol>\n<li>Do I really need to have this connected to the web?<\/li>\n<li>What is this company\u2019s reputation on security?<\/li>\n<\/ol>\n<p>If you answered #1 as no, move along and get another product. As for #2 a Google search should help you with some of the research on the company. If you want to stay up to date with the latest IT industry news, be sure to head over to <a href=\"https:\/\/threatpost.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Manufacturers need to change their mindset when it comes to the IoT<\/p>\n","protected":false},"author":636,"featured_media":11579,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,9],"tags":[901,882,658,794,36,1073,1470,97],"class_list":{"0":"post-11577","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"tag-breach","10":"tag-bugs","11":"tag-internet-of-things","12":"tag-iot","13":"tag-malware-2","14":"tag-rsac","15":"tag-rsac2016","16":"tag-security-2"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/iot-state-of-mind\/11577\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/iot-state-of-mind\/6876\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/iot-state-of-mind\/6918\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/iot-state-of-mind\/6846\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/iot-state-of-mind\/7954\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/iot-state-of-mind\/7743\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/iot-state-of-mind\/11263\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/iot-state-of-mind\/11577\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/iot-state-of-mind\/5383\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/iot-state-of-mind\/6409\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/iot-state-of-mind\/7253\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/iot-state-of-mind\/10768\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/iot-state-of-mind\/11263\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/iot-state-of-mind\/11577\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/breach\/","name":"breach"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/11577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=11577"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/11577\/revisions"}],"predecessor-version":[{"id":17930,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/11577\/revisions\/17930"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/11579"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=11577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=11577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=11577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}