NFV Home

Why Businesses Must Be Aware of the IoT Trojan Horse

By Michael Segal February 15, 2017

Over the last 12 months alone, the scope and depth of IoT has grown at an astonishing rate. Connected devices and complex networks have penetrated a wide range of industries, all keen to capitalize on the automation, cost savings and efficiencies the ecosystem enables. From consumer gadgets and wearables, to connected cars and smart homes; awareness, understanding and adoption of IoT is growing quickly. Fields as diverse as healthcare and manufacturing are becoming more dependent on IoT communications to drive business processes and missions critical systems.

The automation of industrial processes, benefits to healthcare and an ever more connected society are all signs of a positive impact from IoT. However, like the Greeks’ ambush of Troy, aided by their hiding in a wooden horse, the IoT conceals a significant threat. Progress will be hampered by a new breed of malware threats that use IoT devices as hosts and their respective networks to propagate and run amok in factories, hospitals and even smart homes.

To date, innocuous devices such as thermostats, webcams, and even printers have been used as bridgeheads for nefarious hackers and botnets. These unsecured devices have in a number of instances – and unbeknownst to owners – harboured malware botnets such as Mirai. When hackers choose to strike, these devices can be used to launch DDoS attacks, overloading servers with Internet traffic. As the number of connected devices increases, we are likely to see more of these types of attacks going forward. As enterprises increasingly take advantage of IoT, attacks will intensify in scale, with hackers targeting commercial applications for bigger gains. As botnets become more sophisticated, attacks will carry a much higher risk and may move on to bigger targets such as transport networks and power grids in the future.

This is not just a security issue for IoT adopters, however. There will be serious consequences for both enterprises and public sector organizations that do not keep their IoT networks in check, as well as other enterprises that will become more susceptible to DDoS attacks and other security threats from IoT devices they don’t own. Enterprises can only protect themselves effectively if they have a real-time and historic view into the performance of their business services and infrastructure. This is only possible through continuous monitoring of all aspects of IT across the estate, which will spot and isolate any anomalies that may present a hindrance to business performance. This aspect of business assurance, which encompasses both service performance and security management, is bolstered by real-time smart data that translates into actionable insight, which is of huge strategic value to the enterprise both in terms of productivity and revenue. To conduct monitoring and data analysis in real-time requires a continuous, rather than sampled, data source, such as network traffic data. This is vital when you consider the need to identify IoT-based threats quickly in order to resolve service performance issues and neutralize network incursions.

There is no doubt that IoT developments are set to accelerate, becoming more integral to industry and business. Enterprises are accelerating their digital transformation strategies in an attempt to catch up, but this should never come at the expense of implementing business assurance, data analytics, and end-to-end visibility of infrastructure. Organizations need to remember that IoT devices could well become conduits for malware, providing the Trojan horse within which to conceal 21st century attackers: denial of service, botnets, and advanced threats. That is unless adequate measures are put into place to neutralize threats and ensure the smooth running of IoT devices and their infrastructure. 

Edited by Alicia Young
Related Articles

GENBAND Hits MWC With NFV Products

By: Steve Anderson    2/23/2017

GENBAND, commonly known for its work in real time communications, steps up to the NFV plate with a slate of collaborations at the upcoming MWC event.

Read More

Ericsson Helps Verizon Enterprise Orchestrate Business

By: Paula Bernier    2/21/2017

Verizon Enterprise Solutions will use solutions from Ericsson to help power its virtualized global managed network services, including SD-WAN. As a re…

Read More

ADVA Optical Launches FSP Network Hypervisor

By: Frank Griffin    2/21/2017

ADVA Optical Networking launches its FSP Network Hypervisor to extend software defined networking into the optical layer, which will make it a key com…

Read More

Corero Introduces 100gbps DDoS Mitigation Solution

By: Paula Bernier    2/17/2017

Security company Corero Networks has expanded its SmartWall distributed denial of service prevention solution with support for 100 gigabit per second …

Read More

Why Businesses Must Be Aware of the IoT Trojan Horse

By: Michael Segal    2/15/2017

The automation of industrial processes, benefits to healthcare and an ever more connected society are all signs of a positive impact from IoT. However…

Read More