Friday, Mar 29, 2024 | Last Update : 02:32 AM IST

  Technology   In Other news  08 Sep 2018  Is smart technology invading your privacy?

Is smart technology invading your privacy?

THE ASIAN AGE.
Published : Sep 8, 2018, 10:10 am IST
Updated : Sep 10, 2018, 2:31 pm IST

We need to be extremely cautious about inherent private information exposure.

IoT devices are not built with the appropriate security precautions or features such as identity protection in effort to keep costs low and save time due to their increasing demand.
 IoT devices are not built with the appropriate security precautions or features such as identity protection in effort to keep costs low and save time due to their increasing demand.

The Internet of Things (IoT) is here and is growing faster than the blink of an eye. Today it has the potential to simplify life's everyday tasks; tomorrow it will drive your car. The IoT is so big, it has been described as the next "Industrial Revolution". This is a major, but exciting change to our world, but of course we need to be wary of the potential dangers. For instance, we need to be extremely cautious about inherent private information exposure. IoT devices are not built with the appropriate security precautions or features such as identity protection in an effort to keep costs low and save time due to their increasing demand.

Privacy risks within the IoT

A scary, but common theme discussed across multiple IoT conversations is the uninformed user. This means that a user's personal information can be captured and analyzed through the use of a connected device without their permission. Unfortunately, this is innate to the majority of consumers. An extensive amount of user ambiguity exists today and the industry lacks any formal type of disclosure upon the sale of an IoT device. The fact that these devices do not contain proper security functionalities is not well-known or disclosed. In many cases, the gathering of private information can be seen as a productive means of learning and innovation, but can also be used to benefit third parties at expense of the device user. Below are three major areas where red flags are raised regarding privacy concerns within the IoT.

Home automation

Home automation encompasses many different IoT devices. This includes everything from automated kitchen appliances, automated thermometers, smart lighting, smart meters and more. Smart homes, an aspect of the Internet of Things, offer the promise of improved energy efficiency and control over home security. Integrating various devices together can offer users easy programming of many devices around the home, including appliances, cameras and alarm sensors.

As smart homes are quickly becoming a fixture with several homeowners taking on the concept of automated living, security experts have warned about the vulnerability that comes with smart homes. As we connect devices to a smart hub that operate under a WI-FI connection, the home router is found to be the weakest link of the setup as routers have proven to be vulnerable with their firmware. For homes that have a home WI-FI network, a hacked router opens up a lot of vulnerabilities where cybercriminals can gain access to your computers, devices, personal information, and your security cameras. The fact, router security will either be your weakest link or the first line of defense against cyber intrusion.

Office automation

Every business has hundreds, if not thousands, of Internet-connected devices. While this Internet of Things, or IoT, helps companies operate more effectively, it also presents a far bigger security risk than many businesses realize.

Many IoT devices that are finding their way into businesses were never designed to be in the enterprise and are therefore not being held to the same standards or vetted the same way as traditional IT equipment. Any Internet-enabled device operating in the typical business environment today – from office speakerphones, boardroom TVs and AV equipment to printers, scanners, Wi-Fi enabled security cameras, appliances and much more – can be hacked unknowingly to provide attackers with confidential information. Treat that smart TV in your boardroom or your smart office printer as though they are computers on your network because that’s how they function.

The bottom line, businesses need to understand that limiting risk goes far beyond simply protecting the devices themselves.

Health wearables:

Fitness trackers may not present a huge security risk, but any connected device can be hacked.  Wearable devices are a particular kind of products that belong to a larger network called ‘the internet of things’ or IoT. More than 70% of cybersecurity and IT professionals believe that IoT manufacturers aren’t doing enough to maintain data security and that the standards need to be updated. 84% of them think that the manufacturers don’t make consumers aware of the kinds of information the devices can collect. The concern does exist in privacy, data security, and consumer protection in the age of health wearables. 

To summarize, the most dangerous part of IoT is that consumers are surrendering their privacy, bit by bit, without realizing it, because they are unaware of what data is being collected and how it is being used. IoT has a dark side, fuelled by security and privacy concerns along with uncertainty about what these devices can do.

- Mr Zakir Hussain - Director, BD soft, Country Partner of Bitdefender.

Disclaimer: The views and opinions expressed in this article are solely those of the original author. These views and opinions do not necessarily represent those of The Asian Age and/or other staff and contributors to this site.

(Source)

Tags: iot, smart technology