From internet of things to internet of trust
Greater connectivity will bring huge opportunities, but companies and the public must be wary of threats to their data
The number of devices connected to the internet of things (IoT) is set to more than double in the next five years. While a surge in data promises gains in efficiency and productivity, experts warn of the growing threat from state-sponsored hackers.
It isn’t the data on the devices that interests the hackers, says Dr Daniel Prince, a cybersecurity expert and senior lecturer in security and protection science at Lancaster University. It’s the fact that these devices – whether they’re smartphones, laptops or tablets – are connected to the internet.
“By utilising and exploiting internet connections, state-sponsored cybercriminals can launch a myriad of attacks,” Dr Prince explains. “Large-scale botnet attacks, for example, are much more effective if you can gain access to thousands of leaky devices via IoT. Once a device has been compromised, it then provides a ‘digital gateway’ for hackers to infiltrate servers and perpetrate wide-reaching cyber attacks.”
State actors
According to Hiscox, virus infestations, ransomware and distributed denial-of-service attacks are the three most common threats. However, data theft by rogue states is becoming much more widespread, the insurer notes. The fear is that such attacks could make consumers more reluctant to trust companies with their information.
Take the cyber attack on Equifax, one of the world’s leading credit reference agencies, for instance. According to the Sunday Times, the company suffered a state-sponsored cyber attack in which the personal data of 145 million Americans – nearly half the country – and around 13 million Britons was stolen: the largest attack of its kind.
The perpetrators of the Equifax attack, which took place in May 2017 but was only revealed by the FBI in February 2020, were allegedly a team of elite hackers from the Chinese People's Liberation Army (PLA). But there are other rogue states involved. According to a 2018 article in The Wall Street Journal by cybersecurity expert and author Timothy W. Martin, North Korea subjects its southern neighbour to seventeen attacks every second.
Whether attacks that lead to data breaches are state sponsored or perpetrated by criminal networks, Hiscox, which produces an annual Cyber Readiness Report, says they have reached “a new intensity in terms of both frequency and cost”.
A question of trust
In the face of such events, how can businesses act to regain consumer trust? The first step is to invest greater resources into safeguarding customer data, embedding cybersecurity best practice in their DNA.
For a workforce to be truly cyber-ready, everyone from the CEO to the most junior member of staff must be on board
At Lancaster University, Dr Prince works with a number of SMEs to help them inculcate a culture of cybersecurity from top to bottom. It’s not enough to instil these values in senior staff, he notes.
“For a workforce to be truly cyber-ready, everyone from the CEO to the most junior member of staff must be on board. If the culture is instilled in a company in the early stages, then there’s a much greater chance that it will remain an integral part of the company culture as it grows.”
But even making cybersecurity a central plank in a company’s ethos isn’t enough. A culture of cyber readiness must extend to all companies in the supply chain. A company is only as strong as its weakest link, Dr Prince says.
He gives the example of third-party entities that use personal data supplied to them by credit reporting agencies. Such agencies may not employ the same level of security measures as their suppliers, rendering their databases vulnerable to attack. This could be a huge problem for the company that supplied the data, he says.
“The onus is on the owner of the data – in this case the credit agency – to ensure that it only supplies personal information to those that have proven cyber defences in place.”
Preparing for the worst
But to really restore consumer confidence, organisations – particularly those responsible for holding personal data – must implement a highly developed after-market contingency strategy that prepares them for the worst-case scenario. For example, credit reporting agencies are identity providers and should have internal process and systems in place that constantly cross-check records.
“If they find that a hacker has created a fake identity using stolen data, the system should report it to other agencies and expunge the fraudulent data record. It should not be the problem of the user to clean up the mistake of the company,” adds Dr Prince.
Finally, the general public also have a role to play in realising that in cyber space, even seemingly free products come at a price – data. It may be unclear who will have access to this data, or how it will be used.
“Ultimately, if we want to protect IoT from hackers, regulators must demand greater governance, accountability and transparency from tech companies, while we must be more cyber aware ourselves,” Dr Prince concludes.