How To Solve The Internet Of Things Security Issue

How To Solve The Internet Of Things Security Issue

There is currently a great deal of frustration surrounding who’s to blame for the wreck and also basic concern over if the IoT market is a failure threatening to destabilize the whole online infrastructure.

October’s massive DDoS assault was yet another reminder of this inadequate state of internet of Things (IoT) safety. The main culprit of the attack was a massive IoT botnet–a community of compromised connected devices being controlled by hackers–which took down services that granted access to countless users to major sites such as Twitter, Netflix, PayPal, and Spotify.

There is currently a great deal of frustration surrounding who’s to blame for the wreck and basic concern over if the IoT market is a loser threatening to destabilize the whole online infrastructure.

The reality is that, in this phase, the IoT security conundrum is a complex equation that can not be solved by any single party. IoT security worries everybody, even people who don’t possess IoT devices or do not understand what it is, and it’s an issue that has to be addressed through concerted efforts with of the stakeholders–which means us all.

Here is the way the concerned parties can and ought to respond to October’s DDoS attacks.

IoT Manufacturers and tech giants

Since the entities are accountable for all of the vulnerabilities that are being discovered and manipulated in IoT devices, producers are expected to direct the principal effort to guarantee the safety of prospective products and to research bypassing security holes in now connected devices.

The painful experience suffered by Hangzhou Xiongmai must function as a lesson to other technology companies. The Chinese electronics maker was made to recall thousands of its goods after researchers discovered that the company’s webcams accounted for a substantial proportion of the devices utilized in October’s strikes.

Hopefully, that the Xiongmai episode can help alter the mindset of organizations that fail-safety and reliability problems in the interest of cutting down prices or transport goods to market before their opponents do. Businesses must recognize safety as an important part of product development rather than thinking about it as an afterthought.

They should also put extra care into incorporating over-the-air (OTA) update mechanisms in their products so as to have the ability to spot vulnerabilities without needing recalls.

Other steps include avoiding bad practices like static encryption keys and default passwords embedded in goods.

But product recalls do occur eventually, and businesses need to have the ability to prepare themselves for the afternoon they’ll be asked to collect vulnerable devices that can not be repaired remotely. The painful and expensive procedure can be eased with the assistance of blockchain technologies, which may offer visibility and transparency to the possession of components and devices and streamline the procedure for identifying vulnerable goods, reaching out to their owners, and registering merchandise upgrades.

In the end, tech companies must collaborate more on regulating and standardizing IoT security. We have seen some positive improvements in the last year, as the attempts, led by the IoT Security Foundation, which intends to establish principles and guidelines for IoT security. Today, more than ever, technology companies will need to encourage initiatives like the ones of their IoTSF.


For their part, customers must first recognize they are partially to blame for its absence of safety in the IoT market. With clients being concentrated on ease of use and installation instead of safety, there is no incentive for producers to create more protected devices, and they will go out of their way to stop disenchanting users.

Although it’s the job of producers to make frictionless safety in their devices, clients must come to take that progressively connected lifestyle that will warrant a reversal of culture at the customer level.

This effectively means that customers need to realize that linking vulnerable devices to the net won’t just hurt the proprietor, but most internet users generally. Therefore they ought to hold businesses to account for devices that are insecure and be conscious of the safety of the devices they buy.

Consumers must make it a priority to understand and embrace the best security methods for smart houses and offices, like changing default passwords, upgrading device firmware, and applications, and disabling unnecessary features.


With numerous vulnerable devices already on the world wide web, net providers may play a very important part in preventing IoT devices from getting tools to potential attacks.

One of the chief methods ISPs can help fight against the ill-usage of compromised IoT devices is the adoption of criteria like BCP38, which was made to reduce spoofing and amplification, methods employed by hackers to reflect their malicious traffic on their victims against one or more third-party servers.

But while the BCP38’s existed for quite a while, many ISPs finally choose not to embrace it as a result of economic motives. Hopefully, the October 21 strikes will function as a wake-up telephone to ISPs, telling them that the prices of not embracing anti-DDoS steps can be far warmer as well as the damage could be irreparable.

Since safety researcher Brian Krebs reports, campaigns are being directed to determine service providers and ISPs which don’t filter out spoofed online traffic and also to expose them. This will probably incentivize other people to do the ideal thing. Nevertheless, the efforts could actually bear fruit only when important hardware and operating system businesses, cloud companies, and businesses that deliver important internet servers combine efforts and make the essential infrastructure to offer visibility into ISP safety practices.

Also read: Here’s The Security Challenges In IoT World

ISPs also need to do more to inform clients when devices in their network are either receiving or sending malicious traffic. This could help unwary clients learn about compromised devices and take actions to fix or isolate them. Unfortunately, a lot of ISPs do not see this as their difficulty and so do not allocate resources and time to it. This also should change in aftermath of the substantial strikes.


Finally, authorities can act as the catalyst which makes sure each of the parties do their role and therefore are held to account if they do not. Some noteworthy attempts are seen, as a U.S. government-led solicitation to promote startups to deal with IoT security problems, along with a law from the European Commission which will beef up cybersecurity needs for the internet-connected devices.

When these efforts are notable, more must be performed on a worldwide scale, because cyber threats know no boundaries, and in the example of IoT botnets, strikes are performed from countless nodes scattered throughout the world.

With the pervasiveness of the internet of things, just a concerted effort can guarantee a secure and safe future. Everybody should create IoT security in their small business, or else nobody will be spared.

Written by
Isla Genesis

Isla Genesis is social media manager of The Tech Trend. She did MBA in marketing and leveraging social media. Isla is also a passionate, writing a upcoming book on marketing stats, travel lover and photographer.

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

Data Breaches

Preventing Data Breaches: A Guide for Businesses

Data breaches are a grim reality that can wreak havoc on the...

Modern Cybersecurity

Beyond Prevention: The Role of DDR in Modern Cybersecurity Strategies

In today’s connected world, businesses have to deal with massive volumes of...

Vendor Risk

Vendor Risk Scorecards: Developing a Comprehensive Assessment System

In today’s interconnected business landscape, organizations rely heavily on third-party vendors to...

Security Risk Registers

Continuous Improvement of Security Risk Registers: Strategies for Iterative Enhancements

In the dynamic landscape of cybersecurity, the importance of robust security risk...