Addressing the IoT Security Challenge

Chani Agarwal, Pre-Sales Engineer for Rahi Systems, discusses the security challenges facing IoT, and how businesses can safeguard themselves against the possible threat of a cyberattack


The Internet of Things is already transforming entire industries and bringing an array of benefits to organisations of all sizes. However, the devices that comprise the IoT have notoriously weak security, creating a massive attack surface to be exploited by malicious actors. Security has typically been an afterthought, but organisations need to put procedures and controls in place to reduce the risk of a cyberattack.

An IoT device can be anything with a unique ID that is attached to the network, and the number of IoT devices has been growing on a very large scale. One research estimates that by 2025 there will be about 75 billion devices connected to the Internet.

The sheer size of the IoT makes security a big challenge. The traditional IT environment, including computers, networking devices and the like, typically includes hundreds, maybe thousands of devices. Enterprise initiatives can increase quickly in scale to include hundreds of thousands of devices. These devices generate huge volumes of data that is distributed across the environment from the edge to the cloud.


How secure are IoT devices?

Internet of Things devices are also much more diverse than traditional IT devices, and there are very few standards in place for managing and securing them. Security controls typically aren’t implemented on the Internet of Things devices themselves because of limited battery life. Also, IoT devices don’t have a lot of computing power, so they can’t provide encryption and other security services.

In light of these challenges, organisations should adopt a layered approach to IoT security. As an initial step, organisations need to safeguard IoT devices from external attack. This requires a firewall with IoT-specific protocols and Layer 7 application signatures. Additionally, network segmentation should be used to prevent the lateral proliferation of threats.

IoT devices should be monitored for anomalous behaviour. Organisations should collect and analyse log files using a security information and event management (SIEM) solution.

Advanced threat prevention (ATP) is also essential. Because IoT devices lack security controls, hackers are able to find vulnerabilities and attack the devices with unknown malware, so-called zero-day attacks. The 2016 distributed denial of service (DDoS) attack on DNS provider Dyn is probably the most famous example. The attack leveraged a huge botnet of IP video cameras, residential routers and other consumer IoT devices that had been infected with the Mirai malware. The attack took down major websites, including Amazon, Netflix, Twitter and the New York Times.


READ MORE: Why Today’s Global Businesses Need a Cloud-Delivered Firewall Solution



There are many other forms of advanced malware that exploit Internet of Things devices to form botnets, and signature-based malware detection is ineffective against these threats. The Juniper Sky Advanced Threat Protection solution combines cloud-based threat detection with the SRX NGFW to identify and block zero-day attacks. It also employs a sandbox where malware is detonated in a contained environment and patented machine learning capabilities that analyze and adapt to the malware.

Many enterprises that implement Internet of Things applications try to move security features toward the network edge. A better approach is to have end-to-end, pervasive security, after all the network is only as strong as its weakest link. If someone can hack into an IoT device (as innocent as your “smart” coffee machine or Smart TV), odds are high that they can hack into the entire network. In addition, the data generated by the IoT is going to be omnipresent, so security will need to be everywhere.

Most important, IoT security should not be an afterthought. If you’re planning an Internet of Things initiative, it’s crucial you look for assistance in developing a security strategy and implementing the right processes and tools.


Rahi Systems delivers a suite of solutions and services that optimises the cost, performance, scalability, manageability and efficiency of today’s integrated environment.

Chani Agarwal

Chani Agarwal is a network presales engineer for Rahi Systems. Chani has also worked as a business process analyst focused on audit and risk management for IT.

Six ways to maintain compliance and remain secure

Patrick Spencer VP at Kiteworks • 16th September 2024

With approximately 3.4 billion malicious emails circulating daily, it is crucial for organisations to implement strong safeguards to protect against phishing and business email compromise (BEC) attacks. It is a problem that is not going to go away. In fact, email phishing scams continue to rise, with news of Screwfix customers being targeted breaking at...

Enriching the Edge-Cloud Continuum with eLxr

Jeff Reser • 12th September 2024

At the global Debian conference this summer, the eLxr Project was launched, delivering the first release of a Debian derivative that inherits the intelligent edge capabilities of Debian, with plans to expand these for a streamlined edge-to-cloud deployment approach. eLxr is an open source, enterprise-grade Linux distribution that addresses the unique challenges of near-edge networks...

Embracing digital AI recruitment without rocking the boat

Katherine Loranger • 11th September 2024

Artificial intelligence (AI) is set to become indispensable in business operations. For global enterprises, AI offers significant benefits by simplifying complexity and enabling confident decisions—when used in the right way. Those HR recruitment teams that seamlessly integrate AI technologies will optimise their recruitment practices and will have the opportunity to better realise their commitment to...

Why a data strategy underpins a successful AI strategy

Jim Liddle • 05th September 2024

AI and machine learning offer exciting innovation capabilities for businesses, from next-level predictive analytics to human-like conversational interfaces for functions such as customer service. But despite these tools’ undeniable potential many enterprises today are unprepared to fully leverage AI’s capabilities because they lack a prioritised data strategy. Bringing siloed and far-flung unstructured data repositories into...
The Digital Transformation Expo is coming to London on October 2-3. Register now!