• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Security

Building resilience against IoT vulnerabilities

Jeff Castillo by Jeff Castillo
May 21, 2024
Photo by Erik Mclean: https://www.pexels.com/photo/white-thermostat-hanging-on-the-wall-7616651/

Photo by Erik Mclean: https://www.pexels.com/photo/white-thermostat-hanging-on-the-wall-7616651/

A thermostat that automatically calibrates to the perfect temperature, a wearable device that tracks employees' health, and self-parking chairs to keep meeting rooms tidy. This is a glimpse into the future of work, where cutting-edge technology such as AI, IoT, and automation are transforming traditional offices into thriving hubs of innovation and connectivity.

However, despite their appeal, smart devices like IoT are potential vectors of attack for cybercriminals. For one, they rely on interconnected devices and networking infrastructure to operate, which can be compromised if not managed properly.

Each IoT device has its IP address and uses the Domain Name System (DNS) to exchange telemetry data with other computers, software systems and the internet. Without proper security defences, IoT devices are akin to an open door for cybercriminals to come through — not knowing who or what is connecting to your network.   

IoT loopholes in plain sight

The number of IoT devices in Southeast Asia is expected to grow more than double by 2027. Leading the way, smart cities like Singapore are expanding IoT applications beyond traditional uses like CCTV for public safety. Now, smart lamp posts monitor weather and traffic conditions, while in healthcare, devices like ECG monitors and pacemakers provide real-time diagnostics. This telemetry data is crucial for delivering critical services and insightful analytics.

However, the transformational benefits of IoT come with a caveat: most of these devices are fundamentally insecure, prioritising plug-and-play accessibility over robust security measures. Without standardised security protocols or practical means to implement traditional security controls, these devices become vulnerable to attacks.

Cybercriminals can easily exploit these weaknesses to infiltrate networks, alter DNS configurations, and redirect legitimate traffic to malicious servers or fraudulent websites, potentially causing data breaches, service disruptions, and financial losses.

IoT as a beachhead for attacks

Cybercriminals could participate in DNS amplification or reflection attacks, which could lead to a denial-of-service situation. This played out in 2016 when a Singapore-based telecommunication company was hit by two waves of cyberattacks that brought down the Internet across its entire network.

The outage was caused by bug-infested machines owned by the telecommunication’s customers. These so-called “zombie machines” would repeatedly send queries to the company’s DNS, which in turn overwhelms the system.

Cybercriminals can also launch ransomware attacks on IoT devices, encrypting data or manipulating device functions and demanding ransom for their release. A notable instance occurred with Colonial Pipeline, a major American oil pipeline system.

Hackers accessed the pipeline's systems through vulnerable IoT devices, then used ransomware to encrypt data, demanding 75 Bitcoin (approximately US$4.4 million) for decryption. Colonial Pipeline was forced to shut down operations, resulting in significant disruptions to fuel supplies across the region.

Prepare for an ambush

As convenient as IoT technology is, some devices have traded connectivity with security — jeopardising not only their safety but also compromising the security of other applications, users, and devices they are connected to. Hackers are adapting their strategies to capitalise on such vulnerabilities in DNS; thus businesses need to rethink their approaches to safeguard against IoT threats.

Organisations can start by investing in IoT devices that prioritise security and long-term updates, such as those certified by Singapore’s Cybersecurity Labelling Scheme, which rates smart devices according to their levels of cybersecurity provisions.

This will enable consumers to identify products with better cybersecurity provisions and make more informed purchase decisions. Furthermore, when purchasing IoT devices, do so only with trusted retailers that guarantee regulatory compliance and warranty support.

Naturally, a robust DNS detection and response system with real-time visibility and control over who and what connects to your network must be the focal point for any organisation. This is essential to protect the network against attacks that leverage IoT devices as a conduit for infiltrating the network and helping companies build resilient networks.

Protection from stray arrows

There are two sides to any technology. While it can revolutionise how we live and work, it can also serve as a potential attack vector. In the workplace, such vulnerabilities could lead to significant financial losses and erosion of trust.

IT and network teams need to work together to maintain constant vigilance and minimise the odds of such attacks. They can do so by sharing real-time visibility, user context, and DNS data, to ensure unparalleled visibility across devices that are connected to the network and the type of content that is being exchanged. This allows teams to see and stop critical threats earlier.

As our workflows and offices become smarter, so too must our approach to security. Instead of exposing these smart devices to stray arrows, expand and prioritise visibility into your network, which will protect your Achilles’ Heel.

Related:  IoT: too big and buggy to patch?
Tags: InfobloxIoT vulnerabilitiesresilience
Jeff Castillo

Jeff Castillo

Infoblox unites networking and security to deliver unmatched performance and protection. As Senior Regional Director, Jeff Castillo, is responsible for overseeing the SEA team to help bring about customer success in the region. Castillo joined Infoblox in August 2021. An accomplished engineer with over 25 years’ experience, Castillo has evolved to be the trusted advisor for Infoblox’s customers. Before his role at Infoblox, Castillo held senior roles at Forcepoint and Fortinet, where he played a crucial role in enhancing customers’ satisfaction and loyalty, and developed executive relationships with key SEA influencers and business leaders to generate the right solutions to meet their organisation’s needs. His vast experience in the cybersecurity industry has gained him a proven track record in developing and implementing successful secured digital transformation strategies for businesses across ASEAN. Castillo has a degree from The Harvard Kennedy School of Government and is a recipient of the prestigious Veritas Medal award from Harvard. He is also an Advisory Council Member for Philippine National Police Anti Cyber Crime Group.

No Result
View All Result

Recent Posts

  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks
  • Gartner urges supply chain leaders to adopt cost-to-serve model
  • Navigating cyber chaos while safeguarding Asia's supply chains

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Photo by John Tekeridis: https://www.pexels.com/photo/round-grey-speaker-on-brown-board-1072851/

Surge in ambient IoT to pave the way for sustainable tech

May 7, 2025
Imbibing AI skills into Singapore’s future workforce today

Imbibing AI skills into Singapore’s future workforce today

May 6, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe