Government Agencies and Hospitals Face Increasing Risk of IoT-Powered Cyberattacks
If you paid even the
slightest attention to tech media and conferences in 2016, you heard how the
Internet of Things (IoT) is the next big thing. While there’s hype surrounding the tremendous opportunity the
IoT offers, there are still hazards that have yet to be properly addressed. The
biggest concern -- safety -- is a thorny topic with which enterprises
are still grappling. For example, 2016’s
DDoS attack on Dyn that took down several major websites such as Twitter was caused by a bot
army of unsecured IoT devices. This attack is only the tip of the iceberg, and
in 2017 we should expect more of the same, but websites and companies won’t be the only targets. Unless manufacturers and
users of connected devices get serious about security, we will see these
attacks evolve this year. I believe that there’s a significant chance these attacks could extend
to major government institutions and hospitals.
Why these attacks are coming
According to a study from HP, 70
percent of IoT devices are currently vulnerable to an attack. While both
manufacturers and their customers are certainly working to reduce that, a
significant number of IoT devices will still be unprotected in 2017.
Additionally, Gartner predicts over 20 billion IoT devices by 2020.
Let’s say that in the next three
years the number of secure IoT devices doubles, which means that only 40
percent will be insecure. According to Gartner’s estimate that means a total of 8 billion devices by then that are
free to be enlisted in a hacker’s
arsenal: roughly equivalent to the population of the Earth. That security
risk is beyond anything we’ve
currently seen in the realm of cybersecurity.
The risk isn’t necessarily coming from the sophistication of
attacks but poor security practices of IoT users. Bad practices such as using
the default usernames and passwords that are supposed to be used only for setup
and then changed, are making it easy for attackers to take those devices and using them
as botnets. Companies aren’t doing
much to stop this or other potential sources of breaches. A study showed over 90
percent of corporate executives said
they cannot read a cybersecurity report and are not prepared to handle a major
attack and a stunning 98 percent of the most vulnerable executives have little
confidence that their firms constantly monitor devices and users on their
systems. It’s clear that most
C-Suite executives don’t give
cybersecurity enough consideration.
Even more chilling news
came from a report back in April,
which ranked the U.S. government (including federal, state and local agencies)
as having the worst cybersecurity protocols compared to 17 major private
industries, including transportation, retail and health care. As these agencies
face pressure to virtualize, move to the cloud and embrace connected devices,
this lack of security will leave them greatly exposed. I believe that as a
result of these vulnerabilities, there is a 50/50 chance that a significant
cyber warfare attack is instrumented against the U.S. government, the U.S.
military, U.S. critical infrastructure or the U.S. banking infrastructure.
This organization will be ill-prepared and vulnerable; it is also likely that
the attack won’t originate on IoT
devices owned by the government but instead will come from the outside.
Can IoT breaches threaten your health?
Government infrastructure
won’t be the only new source of an
attack that reaches tomorrow’s
headlines. I also predict that a major hospital will face a HIPAA violation for
using an unsecured smart medical device. Hospitals have a lot to gain from
deploying the IoT for crucial data/insights to improve patient care, but so do hackers. They’re already targeting connected MRI machines, CT
scanners and dialysis pumps to
steal patient medical data, which is worth more than twice as much as financial
information on the black market. While the FDA already recognizes that cybersecurity/HIPAA compliance is
an important issue, it is not certain they get practices ready in time to
prevent a major breach. And more important than data, there’s an ever-increasing chance that an IoT attack
will put lives at risk if it can cause a shutdown of needed medical
services.
How will hospitals fight
back? The best prepared ones will do so by adopting improved security practices
such as: password management, policies to ensure all devices are up to
date/passwords get changed, network segmentation, software-defined network
overlays with security built in and improved data management policies.
Vital to ensuring that these practices get used successfully will be
administrators that make them part of the hospital’s workplace culture.
Change your culture, build your defenses
My advice for
entrepreneurs and startups is to make IoT security a serious and valued part of
company culture. Bake it in while the company is still young and there’s no complacency from “doing things the way we’ve always done them.” Furthermore, do not make it solely the IT
department’s responsibility to keep
enterprise data safe. Every member of the organization needs to help take
responsibility, follow security procedures to the letter and be vigilant for
signs of danger. The good news is that there are security solutions out there
to help, even with technology as nascent as the IoT. There is also a great deal
of advice on the best practices to put in place,
from a variety of experts and trusted sources. As Gartner cautioned at last year’s ITxpo, developing best practices can only
prepare you for threats that are already known. Only innovation can prepare you
for tomorrow’s threats that have yet
to be discovered. A combination of advanced software and a strong internal
culture will create a cybersecurity defense ready to take on potential attacks.
Comments
Post a Comment