As we have been scouring the web and looking at trending news, one topic seems to resound. IoT or Internet Of Things. Do you use a smart thermostat?, Use your Amazon Echo to get the latest news or music?, Samsung Smart Things to turn on your lights when you arrive at home? Well, it is becoming very common in everyday life that you have at least 1 IoT device in your home or office. From televisions, to refrigerators, to even manufacturing and monitoring water and electricity distributed to your house. These devices are being used everywhere.

IoT has expanded the frontier for businesses to enhance users every day lives and help to make life’s tasks, a little easier. Much like the dawn of the internet or the telephone, even electricity, this paved the way for businesses to grow and expand their revenue and bring products to consumers that have become an essential part of living for most.

On the backbone of this frontier we have seen an explosive growth of malicious activity targeting consumers personal information and even leaking corporate intellectual property. With these activities occurring on an even minute by minute basis we realize that with the expanding frontier of IoT devices we also have expanded our threat landscape as well. This allowing hackers to gain access to your information by using a multitude of attacks via various vectors including IoT devices.

IoT Devices are typically extremely lightweight devices designed for a specific task or set of attacks that communicate with a local controller or hub close by. This is typically done via wireless technologies that we use all use on a daily basis or even other means by Zwave or other RF technologies. These lightweight devices being controlled centrally will communicate directly with its controller and then in turn this data can be offloaded to a web accessible administrative app or mobile app.

Every time data leaves a device or enters, creates an opportunity for someone to pick up this information by some means. No this does not mean we need to go back to the stone age or break out the tinfoil, but we do need to be aware of these technologies and if we are to embrace them as we have.

Securing data and devices is a constant cat and mouse game. Because of this, manufacturers and vendors need to maintain a constant stream of improvements to ensure security of these devices remain at the utmost top of their priority if we are to continue to embrace these new technologies. By understanding these devices and how they communicate can be a daunting task for most and honestly beyond many of their abilities, leaves room for security experts to advocate and assist others with these technologies to help them stay secure and be their eyes and ears.