2020 computing

The IoT Rundown For 2020: Stats, Risks, and Solutions

Weak passwords, insecure network services and a lack of secure update mechanisms top the list of risks for companies utilizing IoT technology.

In 1999, Kevin Ashton coined the term “the Internet of Things.” However, the technology only gained momentum in 2011, after a Gartner report added it to the list of new emerging technologies. Since then, IoT gained global coverage, as more companies worked on advancing and applying it.

In the past, people referred to IoT as “embedded internet.” Today, IoT technology is embedded in many aspects of our lives. The most significant revelation of 2020 is, perhaps, the fact that many people know about IoT, but few understand the true meaning of the tech.

In this article, you’ll learn what IoT is, what are the risks it poses on your organization, and how to protect your network from IoT threats.

What Is the Internet of Things (IoT)?

IoT technology is an umbrella term that refers to connected physical and digital components. IoT components can transmit data without the assistance of human mediators. Each IoT component has a Unique Identifier (UID) that makes it recognizable.

There are currently five types of IoT applications:

  • Consumer IoT—such as light fixtures, home appliances, and voice assistance for the elderly.
  • Commercial IoT—applications of IoT in the healthcare and transport industries, such as smart pacemakers, monitoring systems, and vehicle to vehicle communication (V2V).
  • Industrial Internet of Things (IIoT)—includes digital control systems, statistical evaluation, smart agriculture, and industrial big data.
  • Infrastructure IoT—enables the connectivity of smart cities through the use of infrastructure sensors, management systems, and user-friendly user apps.
  • Military Things (IoMT)—application of IoT technologies in the military field, such as robots for surveillance and human-wearable biometrics for combat.

16 Internet of Things (IoT) Statistics

IoT technology enables users, systems, and devices, to connect to a wide range of networks, thus expanding the connectivity between the physical and the digital. As more organizations and governments make digital transformation a priority, the adoption of IoT technology increases. The below statistics show the continuous penetration of IoT technology.

How many IoT devices are installed worldwide:

  • In 2018—there were 7 billion IoT devices in 2018
  • In 2019—the number of active IoT devices reached 26.66 billion
  • Every second—127 new IoT devices are connected to the web
  • During 2020—experts estimate the installation of 31 billion IoT devices
  • By 2021—35 billion IoT devices will be installed worldwide
  • By 2025—more than 75 IoT devices billion will be connected to the web

Revenue for the IoT market:

  • In 2016—the global spending on the IoT was $737 billionv
  • In 2018—the North American IoT market generated $83.9 billion in revenue
  • During 2020—global spending on the IoT should reach $1.29 trillion
  • By 2021—the industrial IoT market size should reach $124 billion
  • By 2024—the global IoT healthcare market should reach $14 billion
  • By 2026—Experts estimate that the IoT device market will reach $1.1 trillion

IoT adoption predictions for 2020:

  • 93% of enterprises will adopt IoT technology
  • 80% of industrial manufacturing companies will adopt IoT technology
  • 90% of cars will be connected to the web through IoT technology
  • 3.5 billion cellular IoT connections will be installed

10 IoT Risks to Watch Out for in 2020

Here are the ten most pressing vulnerabilities according to the 2018 Open Web Application Security Project (OWASP) IoT Top 10:

  1. Weak, guessable, or hardcoded passwords—such as short, simple, and publicly available passwords.
  2. Insecure or unneeded network services—which are installed on the device and may expose data such as sensitive and financial information to theft and eavesdropping.
  3. Insecure ecosystem interfaces—external interfaces that connect to the device. The connection may compromise the device and its components.
  4. Lack of secure update mechanism—such as un-encrypted data moving from outward sources towards the device, and poor security monitoring.
  5. Use of insecure or outdated components—such as open-source and third-party components that weren’t scanned for vulnerabilities.
  6. Insufficient privacy protection—failure to protect private information that is stored on the device and connected ecosystems.
  7. Insecure data transfer and storage—such as the lack of access control and encryption during the movement of data.
  8. Lack of device management—on devices deployed in production; results in poor security support.
  9. Insecure default settings—the inability to fix insecure settings creates exploits in devices and systems.
  10. Lack of physical hardening—creates a larger attack surface, which threat actors can leverage to take control of a device or system.

This list will be updated during 2020, so keep an eye on the OWASP website.

3 Ways to Protect the Network from IoT

1. Monitor endpoints

IoT components complicate the security perimeter. The more IoT points you connect to the network, the more attack surface you add to the network. You can leverage Endpoint Detection and Response (EDR) cybersecurity to protect your network. EDR tools monitor endpoints, proactively look for threats, send alerts during security events, and respond when possible.

2. Scan devices for vulnerabilities

To prevent IoT devices from introducing vulnerabilities into the network, scan the device before enabling the connection. Performing vulnerability scans for devices and systems on a continuous basis can ensure the continued health of the network and its components.

3. Create a dedicated IoT a network

To keep your network secure, consider keeping it segregated from IoT components. You can do so by creating a wireless network dedicated for IoT. This network should have access to the Internet, but not to the corporate network.

Conclusion

IoT devices are set to be embedded in every aspect of our lives. From home appliances to healthcare devices, transport technology, industrial networks, and military weapons. IoT technology enables digital transformation. As more industries undergo digitalization, more IoT devices will be installed and connected to networks.

Whether you’re responsible for the security of a network, or the security of your personal device—you should take IoT security seriously. Hackers can easily take advantage of IoT devices for nefarious reasons. Hopefully, this article has helped you to better understand IoT technology, and how you can protect against IoT vulnerabilities.

Featured

  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.