IoT Cyber Security Threatens Consumer Adoption of Smart Devices

If IoT cyber security concerns aren’t addressed, consumers will reject self-driving cars and other smart devices

Shortly after rideshare company Uber launched a pilot test of self-driving cars in Pittsburgh, competitor Lyft made the bold prediction that most of its cars would be self-driving within five years. While it can be argued that Lyft’s proclamation is overly optimistic, self-driving cars are no longer science fiction; rapid advances in machine learning and artificial intelligence are making it possible to turn more and more everyday gadgets and machines into smart Internet of Things (IoT) devices. However, consumers have grave concerns about the cyber security issues surrounding smart cars, smart thermostats, and other smart technology, and these concerns are not unfounded. Unless IoT manufacturers can ensure that IoT cyber security is solid, the IoT market could be severely hampered or, should a wide-scale hack occur, even grind to a halt.

If IoT cyber security concerns aren’t addressed, consumers will reject self-driving cars and other smart devices

Ransomware Possibly the Biggest Threat to IoT Cyber Security

The IoT market is booming. Verizon predicts that the global market for IoT devices will grow from just under $600 billion in 2014 to $1.3 trillion in 2019. Although self-driving cars are still in their infancy, other smart devices, from fitness wearables to smart thermostats to connected insulin pumps, are ubiquitous. However, once a device connects to the internet, it immediately becomes a potential target for hackers, and IoT devices are particularly susceptible to ransomware attacks.

Recently, researchers at Intel Security discovered a vulnerability in a connected car that made it possible to install malware on the car’s infotainment system, causing the stereo to play the same song over and over. Many consumers are concerned about hackers being able to disable a smart car’s brakes or take control of its acceleration and steering. While these scenarios are possible, a ransomware attack on a smart car, which would render the car un-drivable until the owner paid a ransom, may be even more likely. Earlier this year, Hollywood Presbyterian Hospital paid a $17,000.00 Bitcoin ransom to hackers who had locked down the facility’s electronic health records. It’s reasonable to assume that a consumer who needs their car to get to work or drive their children to school may be willing to fork over several hundred dollars to a hacker, especially since trying to fix the car’s computer may cost that much or even more. If a hacker manages to disable a commercial fleet of self-driving vehicles, the affected company may be willing to pay that much per car.

The IoT cyber security threat extends to the smart home: Hackers could use ransomware to disable thermostats, security systems, even routers. Healthcare IoT cyber security is also a grave concern as pacemakers, insulin pumps, and other lifesaving devices are connected to the internet. Yet despite the gravity of the threats to connected devices, 90% of organizations have no cyber security plan to address IoT cyber security specifically, and 68% have no testing strategy for IoT devices.

Meanwhile, 58% of consumers report being “very concerned” or “highly concerned” about IoT cyber security. Smart device security isn’t just a cyber security issue; it’s a safety issue. If consumers do not feel that smart cars, smart thermostats, and other connected devices are safe, they will refuse to buy them or patronize businesses that use them. Manufacturers cannot afford to take a lackadaisical attitude toward IoT cyber security. Devices should be subjected to a comprehensive security evaluation and testing process before they are released into the marketplace, and businesses that purchase IoT devices should refuse to buy products that haven’t been proven safe.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization secure your enterprise IoT devices.

DNC Email Hack Highlights Need for Proactive Email Security

A Proactive Approach Could Have Prevented the DNC Email Hack

The NSA isn’t the only Washington organization being embarrassed by a data breach. The sorry state of cyber security in America has taken center stage in this year’s presidential election. In June, it was discovered that Russian cyber criminals had managed to hack the Democratic National Committee’s email server, stealing over 20,000 emails and sharing them with WikiLeaks. While most of the emails contain mundane correspondence, some of them are quite embarrassing and imply possible ethical violations on the part of DNC insiders, such as emails questioning Bernie Sanders’ religion and implying the party officers wished to derail his campaign. Shortly after the emails were released, the DNC’s chairperson, CEO, and communications director abruptly resigned. Even worse, the New York Times has revealed that the DNC email hack might be much more extensive than originally believed, involving the email accounts of over 100 individuals and groups.

DNC Email Hack Highlights Need for Proactive Email Security

The DNC email hack bears a strong resemblance to the equally scandalous email hack perpetrated on Sony Pictures two years ago, which was believed to have been carried out by North Korean nation-state hackers. That hack involved the release of 170,000 emails, many of them containing negative commentary about major Hollywood stars. Sony’s chairperson was removed, the company ended up being sued, and the emails are still live on WikiLeaks, neatly indexed and searchable.

While the Sony hack and the DNC email hack involved ethical and privacy violations, the release of corporate emails can damage an organization even if the employees in question did nothing wrong. Confidential information about new product launches, marketing strategies, and partnership negotiations are routinely discussed via email, and this information could destroy a company if it fell into the hands of a competitor.

Proactive Ways to Prevent Email Hacks

Both the Sony hack and the DNC email hack could have been prevented using proactive email security measures. Following are three things your company can do to prevent your emails from ending up on WikiLeaks – or in the hands of a competitor.

Train Your Employees How to Spot Spear Phishing

It is believed that the Sony hack and the DNC email hack happened after hackers used a spear-phishing campaign to get hold of legitimate login credentials. Spear phishing has become extremely popular among hackers as end users have become more aware of these scams and as spam filters have gotten better at recognizing and intercepting regular phishing emails. Because spear-phishing emails are sent to only a small group of targets and are carefully researched and crafted to appear legitimate, they tend to pass through spam filters. Therefore, the best defense is employee awareness. See our previous blog for more information on how to spot spear phishing emails.

Set Up Your System to Assign Employee Passwords

Regardless of how many times they are told not to do so, employees frequently choose passwords that are weak, and they tend to use the same password to access multiple systems, including their personal and work accounts. Thus, a hacker may be able to use an employee’s Dropbox password to get into their work email. For this reason, random, strong passwords should be assigned to employees, and the system should be set up to require periodic password changes.

Outsource Your Enterprise Email

In most cases, using a private email server for company email, as the DNC did, is a bad idea. The majority of companies do not have the in-house technical expertise to securely set up an email server, continuously monitor it for unusual user behavior, or maintain up-to-date spam filters. Large enterprise email providers such as Google and Yahoo do. While using one of these providers is not a guarantee that you will not be breached – especially in light of the popularity of social engineering – a third-party provider will offer a higher level of email security than you could achieve in-house.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help secure your organization’s data.

The NSA Hack: Not-So-Covert Affairs

What the NSA Hack Says About Cyber Security in America

In a Mr. Robot episode come to life, an anonymous group of hackers calling themselves the Shadow Brokers has compromised the U.S. National Security Agency (NSA). The NSA hack involved the release of elite hacking tools used by the spy agency to conduct cyber espionage. The Washington Post reports:

A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate.

The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO).

“Without a doubt, they’re the keys to the kingdom,” said one former TAO employee, who spoke on the condition of anonymity to discuss sensitive internal operations. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”

The NSA hack is sending shockwaves through the cyber security industry, not just because one of the most secure systems in the world just got hacked, but also because the hack didn’t just expose government secrets; it exposed significant zero-day vulnerabilities at major U.S. corporations, including companies that, ironically, sell enterprise cyber security services.

While there are rumors that the Shadow Brokers are Russian nation-state hackers, no one knows for certain. No one knows how the Shadow Brokers managed to access the NSA’s data, either. The NSA is refusing to comment on the leak. However, since nearly all data breaches are the result of hackers getting their hands on legitimate login credentials, either through carelessness or malicious intent on the part of an organizational insider, it’s reasonable to theorize that the leak originated within the NSA. It could have been as simple as an employee clicking on a phishing email or sticking an infected flash drive into a machine.

The NSA hack also begs the question, if a covert government spy agency’s data isn’t secure, what’s the state of everyone else’s information security? From a rash of ransomware attacks on the healthcare industry, to an epidemic of tax data spear phishing schemes, to the hijacking of the SWIFT Network bank messaging system, to the Wendy’s POS data breach, to an amateur managing to hack the Houston Astros database, to information security providers being caught with their pants down in the NSA breach, 2016 has been a banner year for cyber criminals – and we’ve got four more months to go.

Rather than panicking, now is the time to ask yourself, how secure are your organization’s systems? Are you approaching your cyber security proactively, or are you taking a reactive approach, scrambling to clean up the mess once a breach has occurred? Have you been trying to handle your cyber security in-house but are struggling to keep up with all of the new technological advances and cyber security threats? Do you suspect there are hackers in your system right now, either from the outside or within your organization, but you don’t know to find and deal with them, and then keep new ones from coming in?

You’re not alone. Today’s information systems are increasingly complex, and so are the attacks that hackers launch on them. Many organizations simply do not have the resources to handle all of their information security needs in-house, and they find that scrambling to do so leaves them with lax information security while taking away time and resources from their core competency.

The NSA hack should be a wakeup call to organizations in all industries and of all sizes to reevaluate their cyber security efforts and, if they have not already done so, enlist the services of a professional cyber security firm to ensure that they are fully protected.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help secure your organization’s data.