• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Gadgets

The Cybersecurity Risks Of Implementing IoT Technology

Contributor by Contributor
July 22, 2019
in Gadgets, Security
Share on FacebookShare on Twitter

There are over 7 billion IoT devices in existence today. By 2025, statistics from research giant Gartner in conjunction with IoT analytics indicate that IoT devices will hit 64 billion.

That means that in the next five years, IoT will be everywhere; from the moment one wakes up to the time they go back home, they will interact with tons of gadgets, buildings, machines and more all connected to the web.

While that is a good thing, there is a risk that many are yet to take into consideration—the lack of proper cybersecurity measures. With such accelerated growth and the need to meet demands, manufacturers are not taking the time to focus on security. As such, hackers are exploiting the following IoT security loopholes.

 

IoT devices are network vulnerabilities

A prime example that is often touted as a cautionary tale in the IoT world is that of an internet-connected fish tank that gave hackers access to a casino’s database.

According to a report released by Darktrace—a cybersecurity firm—in July 2017, hackers exploited a vulnerability in the casino’s aquarium thermostat and used it as an entryway to the network and all the devices connected. They then went ahead and accessed a high-roller database and pulled it out of the database through the thermostat to the cloud.

This is not an isolated case. Cases exist where individuals have lost incredibly valuable personal data due to hackers targeting Wi-Fi printers. Any smart device connected to your network creates an entry point to it, which hackers can exploit to access more important sensitive data on neighboring hard drives. Less sophisticated devices such as Wi-Fi printers, smart fridges, or as seen above, internet-enabled fish tanks are easy targets you must take extra care to protect.

 

Attacks through weak passwords

Remember the infamous Mirai incident? The botnet malware that knocked incredibly popular and notable websites across the world offline two years ago? Well, that was due to weak passwords.

Essentially, the Mirai malware scanned IoT devices which were still using default passwords, it then ‘enslaved’ them using malicious codes to launch a Distributed Denial of Service (DDoS) attack. A DDoS attack is when a network is flooded by more requests than it can handle (bogus requests) and consequently it shuts down or rather makes a network resource unavailable to intended users.

According to a report by Dyn—the DNS provider that was the target of the Mirai attack—100, 000 devices were used in the attack. Attackers infected all these devices with the Mirai malware which is capable of taking over routers, cameras, DVRs and a host of other IoT devices. If you don’t want your personal device to be involved in cybercrimes, password-protect it immediately upon purchase. More on that later.

Elsewhere, a report by the Royal Academy of Engineering in the United Kingdom warned that health tech, i.e., pacemakers connected to the internet could have severe consequences for patients if hacked. Appallingly, most are incredibly easy to hack – simply enter its factory default password and the patient’s life is at your mercy.

 

The exploitation of ill-configured devices

Last year in July, two different hack groups employing varying strategies managed to hack Cisco and Huawei routers. One group of hackers used a backdoor to break into Cisco routers while the other used an older vulnerable code to access Huawei routers.

Recently, in 2019, Vodafone said it found a backdoor in the software of Huawei home routers and the optical service nodes. These are just two examples, but as more IoT devices continue to hit the market, you’ll most likely be in touch with one.

That raises a question; with such real-life and frightening examples of the dangers inherent in lax cybersecurity measures when it comes to IoT devices, what can you do about it? To start, you can consider the following cybersecurity best practices that each household or business should keep in mind if they are to avoid a situation where IoT goes wrong.

 

What can be done to protect IoT devices and sensitive data?

1. Encrypt the network

Encrypting the network is essentially using cryptography to deter hackers. One of the most comprehensive solutions that allow you to encrypt your entire network is a Virtual Private Network.

A VPN is a private network over a public network that routes all your traffic through a secure tunnel that hackers cannot penetrate. With regards to IoT devices, to avoid a scenario like the one noted above—the fish tank hack—all you have to do is purchase a router VPN.

A VPN on the router will encrypt all the devices in your home network or business network, which means a malicious cannot use your smartwatch, HVAC, or smart appliances to get a foothold in your network.

2. Practice password best practices

Password best practices is a thorny issue because, despite both global awareness on data breaches and hacking and the fact that 91% of internet users understand the risk of weak passwords and password recycling, 59% still use the same password for each account.

That is both frustrating and heartbreaking because the cost of a data breach or cyber-attack is catastrophic for both organizations and individuals. To avoid becoming a victim and to mitigate attacks, i.e., the IoT DDoS attacks, organizations and individuals must practice password best practices.

These practices include changing the default password for each IoT device you set up. Second, ensure each device has a unique, random, and long password. Third make the password as complicated as possible, for instance, don’t use 12345679 or Basketba11 as your password, go for something like nnx8@)SDF:V8]GuW.

In conjunction with this, to help you generate and manage such passwords for all your devices, consider getting a password manager. The manager will store all these passwords for you in a secure vault, so you do not have to struggle to remember them.

3. Scrutinize the devices that you buy

When purchasing IoT devices, go for devices with a good reputation. The rise in IoT technology will see the emergence of numerous companies. To avoid companies that create substandard devices; it is essential to do due diligence.

 

Last word

Without a doubt, IoT will bring with it uncountable benefits—from efficiency in market places to increased communication and better monitoring.

However, it is vital that everyone, both consumers and manufacturers, weigh the benefits against the possible risks and find ways to deal with the risks. Implementing the cybersecurity best practices mentioned above is a good place to start.

Related Posts:

  • Trust in Federal Government Branches Continues to Falter
    White House Announces New Labelling For Reputable IT Gadgets
  • Copy-of-Blue-Modern-Gradient-Beauty-And-Fashion-Blog-Banner-2024-07-10T161619.685
    Kenya Reports 2.54 Billion Cyber Threats in Q1 of 2025
  • 1934304-google-rolls-out-advanced-smart-home-features-in-gemini-app-update
    Gemini Extensions for Google Home Are Available to All Users
  • REv-CC-FutureProofIT-AdressingInsiderThreats-02@2x
    The Silent Enemy: How Insider Threats Are Stealing…
  • data detection
    Mitigating Insider Risk With Data Detection And Response
  • cyber-security-istock
    African SMEs Face a Host of Cybersecurity Challenges
  • CBN-1
    CBN Orders Nigerian Banks And Fintechs To Self‑Audit…
  • windows-11-surpasses-one-billion-users-despite-mix
    Windows 11 Surpasses One Billion Users Despite Mixed…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Subscribe

Tags: cyber securitycybersecurityinternet of thingsiotsecuritysmart device
Contributor

Contributor

Posts by contributors. You can send in a post to be reviewed and published to info@techbooky.com

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • IBM Rolls out ‘Bob’, an AI Development Partner Built around Multi-model Routing and Human Checkpoints April 29, 2026
  • iOS 27 Reportedly Adds New Apple Intelligence Photo Editing Tools April 29, 2026
  • Jack Dorsey-backed Divine brings Vine’s Six‑second Loops Back to Life April 29, 2026
  • Elon Musk Takes The Stand In High-Stakes OpenAI Trial Against Sam Altman April 28, 2026
  • Ethiopia’s Dodai Secures $13 Million to Scale Battery-Swapping EV Network April 28, 2026
  • OpenAI Revenue Growth Misses Expectations as Costs Surge, Report Says April 28, 2026
  • EU Pressures Google To Open Android’s AI To Rivals, Google Calls It “Unwarranted” April 28, 2026
  • Airtel Money links with Absa Bank Kenya to court SME payments April 28, 2026
  • China Blocks Meta’s $2B Manus Deal After Months Of Review April 27, 2026
  • Nigeria Lifts $32.8M Meta Fine For Privacy Breach, Raising Questions About Enforcement Trust April 27, 2026
  • Microsoft and OpenAI Restructure Partnership, End Revenue Sharing and Exclusivity April 27, 2026
  • Microsoft & Meta Reveal Large Layoffs Despite Massive AI Investment April 24, 2026

Browse Archives

April 2026
MTWTFSS
 12345
6789101112
13141516171819
20212223242526
27282930 
« Mar    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Subscribe

Continue reading

Chat with TechBooky AI
💬
TechBooky AI ✕
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.